fffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) io_setup(0x3, &(0x7f0000000200)) 01:00:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)=""/201, &(0x7f0000000040)=0xc9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000100), &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x400}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000340)={r4, 0x8, 0x47, "bfb80abbbeb9fa054bc90b39a7f0c925205cdf8e54fdc577fa30854bd0d0f6dc89600594483fd394e22c014dc05320e0500f7de70b7286661b5ae7847fd53e1bb42b7480f08a52"}, 0x4f) listen(r1, 0x400000001ffffffd) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r1, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, 0x0) ioctl$VT_OPENQRY(r7, 0x5600, &(0x7f0000000000)) ioctl$KVM_HAS_DEVICE_ATTR(r7, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8, 0x7, &(0x7f00000003c0)=0xffffffffffff7fff}) sendmmsg(r6, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) 01:00:49 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 174.920173][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:00:49 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = open(&(0x7f0000000100)='./file1\x00', 0x260942, 0x15c) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[]}, 0x1, 0x0, 0x0, 0x24044002}, 0x4040081) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="140080008d1718bafeb44feb32af4d31819ba95cce5c58c7a7d61fbe01d172511efd55a87c6fdd4a9d2cc5c173c61b711111e235b0ff8a3333109228cf599c4e3a1ca91b1618d2010c610764be39530a1d5f77b51d62fc99ea81e0d5f3f338b14b46b91b50f9ac45388db9bd45eb4b1c8b5b324f8889468a3c2f0b9c0a236428d95e8057b8352824ebf40b9a838f2a9ee8b1ccf001467d980730d172a6d7fb7bcad9d91d8328c912e8f5acef5f1b3b5f784f0f3abf4cd205f72d993e6728397fc4039cf5421a452f3b1bcc9b93", @ANYRES16, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040cc0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f00000003c0)) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) clone(0xd1102103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f00000000c0)=0x3) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) sigaltstack(&(0x7f0000feb000/0x12000)=nil, 0x0) io_setup(0x401, &(0x7f00000004c0)) epoll_create1(0x0) socket$alg(0x26, 0x5, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) [ 175.313419][ T8598] IPVS: ftp: loaded support on port[0] = 21 01:00:50 executing program 5: ppoll(&(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) 01:00:50 executing program 4: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x80000000000000d, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) 01:00:50 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x159}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1026e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:00:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = open(&(0x7f0000000100)='./file1\x00', 0x260942, 0x15c) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[]}, 0x1, 0x0, 0x0, 0x24044002}, 0x4040081) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="140080008d1718bafeb44feb32af4d31819ba95cce5c58c7a7d61fbe01d172511efd55a87c6fdd4a9d2cc5c173c61b711111e235b0ff8a3333109228cf599c4e3a1ca91b1618d2010c610764be39530a1d5f77b51d62fc99ea81e0d5f3f338b14b46b91b50f9ac45388db9bd45eb4b1c8b5b324f8889468a3c2f0b9c0a236428d95e8057b8352824ebf40b9a838f2a9ee8b1ccf001467d980730d172a6d7fb7bcad9d91d8328c912e8f5acef5f1b3b5f784f0f3abf4cd205f72d993e6728397fc4039cf5421a452f3b1bcc9b93", @ANYRES16, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040cc0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f00000003c0)) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) clone(0xd1102103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f00000000c0)=0x3) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) sigaltstack(&(0x7f0000feb000/0x12000)=nil, 0x0) io_setup(0x401, &(0x7f00000004c0)) epoll_create1(0x0) socket$alg(0x26, 0x5, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) 01:00:50 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:50 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = open(&(0x7f0000000100)='./file1\x00', 0x260942, 0x15c) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[]}, 0x1, 0x0, 0x0, 0x24044002}, 0x4040081) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="140080008d1718bafeb44feb32af4d31819ba95cce5c58c7a7d61fbe01d172511efd55a87c6fdd4a9d2cc5c173c61b711111e235b0ff8a3333109228cf599c4e3a1ca91b1618d2010c610764be39530a1d5f77b51d62fc99ea81e0d5f3f338b14b46b91b50f9ac45388db9bd45eb4b1c8b5b324f8889468a3c2f0b9c0a236428d95e8057b8352824ebf40b9a838f2a9ee8b1ccf001467d980730d172a6d7fb7bcad9d91d8328c912e8f5acef5f1b3b5f784f0f3abf4cd205f72d993e6728397fc4039cf5421a452f3b1bcc9b93", @ANYRES16, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040cc0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f00000003c0)) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) clone(0xd1102103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f00000000c0)=0x3) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) sigaltstack(&(0x7f0000feb000/0x12000)=nil, 0x0) io_setup(0x401, &(0x7f00000004c0)) epoll_create1(0x0) socket$alg(0x26, 0x5, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) 01:00:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:00:50 executing program 3: pipe(0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) getpeername(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/171, 0xab}, {&(0x7f0000000580)=""/69, 0x45}, {0x0}, {0x0}, {&(0x7f0000000440)=""/50, 0x32}, {0x0}, {&(0x7f0000000980)=""/213, 0xd5}], 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c40)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000d40)=0xe8) lstat(&(0x7f0000000d80)='./file0/file0\x00', 0x0) setreuid(0x0, 0x0) setresuid(0x0, 0x0, 0x0) open(0x0, 0x1141042, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) socket$inet_udplite(0x2, 0x2, 0x88) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) ioprio_set$uid(0x2, r3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x403662521ed92188}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') preadv(r9, &(0x7f00000017c0), 0x3a8, 0x0) stat(&(0x7f0000001180)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) setuid(0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') r11 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) r12 = eventfd2(0x0, 0x140800) r13 = syz_open_procfs(0x0, 0x0) preadv(r13, &(0x7f00000017c0), 0x3a8, 0x0) r14 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r15) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000000800)=[{0x0}, {&(0x7f0000000380)="a53d165780f28852ae3187209e764a82c1af774e26e51a6b3406c03b0f380e660512c864b5105a15704d517c859157093f08cbe2fdcd1f5f4df8ee141cb3c7df2f4aa700fecf7cb90e1c8533fb4ced4280557c38fe96cf88473f8f5a564cd00a5faef5ec2596ce3e5b39d9167d44bdc8e66a3c5143d6e9e7fc33dbb221c4fef0f07bac660c7ebffa42ad098d94d6121fb39b0a3c2aac3002a2ea469092cb9b", 0x9f}, {&(0x7f0000000480)}, {&(0x7f0000000540)="a7c74460610627fb4a45bdfb7b2d6a5a6fe9ec6633a07f1b5e01ee0100621050b9ae73ce1be732180adf66f302893d15997fe274b4e51f74141e5fa2bd56d86493bd322e73c1d557e1c481fcde81b731d5093a5316f019b2e0538bd0ec0f73e73bfe342ce31a3a6c367e09a14863b37498513d5f25a511ee6dfb955606aed714e797008e8350716f985d4e3fb2a1c32ff30439f845b6ae16720ab5a0c9486ef458edefa77edab4404ca7e27a12bb395acd919f9f6037eec9df003d4f593c6d", 0xbf}, {&(0x7f0000000640)}, {&(0x7f0000000700)="549019177026deb79a2590a1bc36ec094bd6c3e313cccd47d4aa496c43c20641fd0cf8ce19ebc65d3c54ca3dad2ed236361257a9d0aa4f51", 0x38}, {&(0x7f00000007c0)}], 0x7, &(0x7f0000000f00)=ANY=[@ANYRES32, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="000000001c00000000000000010000", @ANYRES32, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000001000000", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYRESOCT=0x0, @ANYRES32, @ANYBLOB="000001000000ddaf0511", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="00000000300000000000003edf1921000100000077c7239bb3a263c9adad628924e8984440e839dcec075cd7da05e4546323c0b54e6e1d33580bda43c74dcbfe185ae235f93fb0bf478510226684c37eedda43b977e6aeed80e04dd10124094c1bb2ff47aa3a3c648f28a95c773b948ff861ece367101090d2058703e01c2db3e3193a2879632f9f8f", @ANYRES32=r10, @ANYRES32=r11, @ANYRES32, @ANYRES32=r12, @ANYRES32, @ANYRES32=r13, @ANYRES32, @ANYRES32, @ANYBLOB="07000000000000000100000002000000", @ANYPTR, @ANYRES32=r15, @ANYRES32, @ANYBLOB='\x00\x00'], 0x153, 0x48081}, 0x40) stat(&(0x7f0000001180)='./bus\x00', &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x403662521ed92188}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) stat(&(0x7f0000001180)='./bus\x00', &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') eventfd2(0x20, 0x140800) r19 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') preadv(r19, &(0x7f00000017c0), 0x3a8, 0x0) setuid(0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYBLOB="0200000001000d00", @ANYRES32=0x0, @ANYBLOB="02000f00", @ANYRES32, @ANYBLOB="02000100", @ANYRES32, @ANYBLOB="02000400", @ANYRES32, @ANYBLOB="02000100", @ANYRES32, @ANYRES32, @ANYBLOB="0200", @ANYRES32=r4, @ANYBLOB="040000000000000008000400", @ANYRES32=r8, @ANYRES32=r16, @ANYBLOB="08000400", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r18, @ANYBLOB="100005000000000020000200"], 0x19, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x403662521ed92188}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') r20 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') preadv(r20, &(0x7f00000017c0), 0x3a8, 0x0) r21 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getegid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000000800)=[{0x0}, {&(0x7f0000000380)="a53d165780f28852ae3187209e764a82c1af774e26e51a6b3406c03b0f380e660512c864b5105a15704d517c859157093f08cbe2fdcd1f5f4df8ee141cb3c7df2f4aa700fecf7cb90e1c8533fb4ced4280557c38fe96cf88473f8f5a564cd00a5faef5ec2596ce3e5b39d9167d44bdc8e66a3c5143d6e9e7fc33dbb221c4fef0f07bac660c7ebffa42ad098d94d6121fb39b0a3c2aac3002a2ea469092cb9b63b9359f0f1d63907c850a7c6b493cfdd5864df1dda47e1ee87f91f513a133c0a096039cfeaefb7bcc3fc48438d9d4e673c6", 0xd1}, {&(0x7f0000000480)}, {&(0x7f0000000540)="a7c74460610627fb4a45bdfb7b2d6a5a6fe9ec6633a07f1b5e01ee0100621050b9ae73ce1be732180adf66f302893d15997fe274b4e51f74141e5fa2bd56d86493bd322e73c1d557e1c481fcde81b731d5093a5316f019b2e0538bd0ec0f73e73bfe342ce31a3a6c367e09a14863b37498513d5f25a511ee6dfb955606aed714e797008e8350716f985d4e3fb2a1c32ff30439f845b6ae16720ab5a0c9486ef458edefa77edab4404ca7e27a12bb395acd919f9f6037eec9df003d4f593c6d5445cda910fbb19c22", 0xc8}, {0x0}, {&(0x7f0000000700)}, {&(0x7f00000007c0)}], 0x7, 0x0, 0x0, 0x48081}, 0x40) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r22 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r22, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r22, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r22, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r22, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r22, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r22, &(0x7f0000000000)=ANY=[], 0xfdbe) [ 175.738658][ T8628] IPVS: ftp: loaded support on port[0] = 21 01:00:50 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = open(&(0x7f0000000100)='./file1\x00', 0x260942, 0x15c) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[]}, 0x1, 0x0, 0x0, 0x24044002}, 0x4040081) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="140080008d1718bafeb44feb32af4d31819ba95cce5c58c7a7d61fbe01d172511efd55a87c6fdd4a9d2cc5c173c61b711111e235b0ff8a3333109228cf599c4e3a1ca91b1618d2010c610764be39530a1d5f77b51d62fc99ea81e0d5f3f338b14b46b91b50f9ac45388db9bd45eb4b1c8b5b324f8889468a3c2f0b9c0a236428d95e8057b8352824ebf40b9a838f2a9ee8b1ccf001467d980730d172a6d7fb7bcad9d91d8328c912e8f5acef5f1b3b5f784f0f3abf4cd205f72d993e6728397fc4039cf5421a452f3b1bcc9b93", @ANYRES16, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040cc0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f00000003c0)) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) clone(0xd1102103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f00000000c0)=0x3) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) sigaltstack(&(0x7f0000feb000/0x12000)=nil, 0x0) io_setup(0x401, &(0x7f00000004c0)) epoll_create1(0x0) socket$alg(0x26, 0x5, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) 01:00:50 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) [ 175.910510][ T8638] IPVS: ftp: loaded support on port[0] = 21 [ 176.151172][ T8651] IPVS: ftp: loaded support on port[0] = 21 01:00:51 executing program 5: ppoll(&(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) 01:00:51 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = open(&(0x7f0000000100)='./file1\x00', 0x260942, 0x15c) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[]}, 0x1, 0x0, 0x0, 0x24044002}, 0x4040081) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="140080008d1718bafeb44feb32af4d31819ba95cce5c58c7a7d61fbe01d172511efd55a87c6fdd4a9d2cc5c173c61b711111e235b0ff8a3333109228cf599c4e3a1ca91b1618d2010c610764be39530a1d5f77b51d62fc99ea81e0d5f3f338b14b46b91b50f9ac45388db9bd45eb4b1c8b5b324f8889468a3c2f0b9c0a236428d95e8057b8352824ebf40b9a838f2a9ee8b1ccf001467d980730d172a6d7fb7bcad9d91d8328c912e8f5acef5f1b3b5f784f0f3abf4cd205f72d993e6728397fc4039cf5421a452f3b1bcc9b93", @ANYRES16, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040cc0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f00000003c0)) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) clone(0xd1102103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f00000000c0)=0x3) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) sigaltstack(&(0x7f0000feb000/0x12000)=nil, 0x0) io_setup(0x401, &(0x7f00000004c0)) epoll_create1(0x0) socket$alg(0x26, 0x5, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) 01:00:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:00:51 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = open(&(0x7f0000000100)='./file1\x00', 0x260942, 0x15c) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[]}, 0x1, 0x0, 0x0, 0x24044002}, 0x4040081) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="140080008d1718bafeb44feb32af4d31819ba95cce5c58c7a7d61fbe01d172511efd55a87c6fdd4a9d2cc5c173c61b711111e235b0ff8a3333109228cf599c4e3a1ca91b1618d2010c610764be39530a1d5f77b51d62fc99ea81e0d5f3f338b14b46b91b50f9ac45388db9bd45eb4b1c8b5b324f8889468a3c2f0b9c0a236428d95e8057b8352824ebf40b9a838f2a9ee8b1ccf001467d980730d172a6d7fb7bcad9d91d8328c912e8f5acef5f1b3b5f784f0f3abf4cd205f72d993e6728397fc4039cf5421a452f3b1bcc9b93", @ANYRES16, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040cc0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f00000003c0)) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) clone(0xd1102103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f00000000c0)=0x3) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) sigaltstack(&(0x7f0000feb000/0x12000)=nil, 0x0) io_setup(0x401, &(0x7f00000004c0)) epoll_create1(0x0) socket$alg(0x26, 0x5, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) 01:00:51 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) [ 176.639523][ T8676] IPVS: ftp: loaded support on port[0] = 21 [ 176.691865][ T8678] IPVS: ftp: loaded support on port[0] = 21 01:00:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000340)=0x2, 0x4) sendmmsg(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="7cb14711329ebb98dacd44a34691a526f4a77a91cd0a3f5f394a74eaa8922f5d7e070900000000", 0x27}, {&(0x7f0000000740)="a6ebeff2aec1c7219be7d2959bc14587d78c264e51000000000000000000000000dd0668a27804ac0f6846694943b94941fe0ceecd02", 0x36}], 0x2}}], 0x1, 0x0) 01:00:51 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = open(&(0x7f0000000100)='./file1\x00', 0x260942, 0x15c) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[]}, 0x1, 0x0, 0x0, 0x24044002}, 0x4040081) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="140080008d1718bafeb44feb32af4d31819ba95cce5c58c7a7d61fbe01d172511efd55a87c6fdd4a9d2cc5c173c61b711111e235b0ff8a3333109228cf599c4e3a1ca91b1618d2010c610764be39530a1d5f77b51d62fc99ea81e0d5f3f338b14b46b91b50f9ac45388db9bd45eb4b1c8b5b324f8889468a3c2f0b9c0a236428d95e8057b8352824ebf40b9a838f2a9ee8b1ccf001467d980730d172a6d7fb7bcad9d91d8328c912e8f5acef5f1b3b5f784f0f3abf4cd205f72d993e6728397fc4039cf5421a452f3b1bcc9b93", @ANYRES16, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040cc0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f00000003c0)) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) clone(0xd1102103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f00000000c0)=0x3) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) sigaltstack(&(0x7f0000feb000/0x12000)=nil, 0x0) io_setup(0x401, &(0x7f00000004c0)) epoll_create1(0x0) socket$alg(0x26, 0x5, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) 01:00:51 executing program 1: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6202e57f7f000001"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = dup(r0) listen(r1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f00000001c0), 0x4) r2 = socket(0x2, 0x1, 0x0) connect$unix(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="defe5cd4199b55320784"], 0x10) write(r2, &(0x7f0000000380)="67b6", 0x2) 01:00:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:00:51 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) [ 177.049185][ T8703] IPVS: ftp: loaded support on port[0] = 21 01:00:52 executing program 5: ppoll(&(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) 01:00:52 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 01:00:52 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4, 0x2}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 01:00:52 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:00:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:00:52 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66a145232e6f55791c010002000270f7f8", 0x16}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 177.410696][ T8722] overlayfs: failed to resolve './file1': -2 01:00:52 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:52 executing program 3: [ 177.525864][ T8733] FAT-fs (loop1): bogus logical sector size 31061 [ 177.535151][ T8733] FAT-fs (loop1): Can't find a valid FAT filesystem 01:00:52 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:52 executing program 3: 01:00:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 01:00:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:00:52 executing program 1: 01:00:52 executing program 3: 01:00:52 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:52 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:00:53 executing program 1: 01:00:53 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:53 executing program 3: 01:00:53 executing program 1: 01:00:53 executing program 3: 01:00:53 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:53 executing program 1: 01:00:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 01:00:53 executing program 3: 01:00:53 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:00:53 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:00:53 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:53 executing program 1: 01:00:53 executing program 3: 01:00:54 executing program 3: 01:00:54 executing program 1: 01:00:54 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:00:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 01:00:54 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:54 executing program 3: 01:00:54 executing program 1: 01:00:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:00:54 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:00:54 executing program 1: 01:00:54 executing program 3: 01:00:54 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:54 executing program 3: 01:00:54 executing program 1: 01:00:54 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 01:00:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:00:55 executing program 1: 01:00:55 executing program 3: 01:00:55 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:55 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:00:55 executing program 1: 01:00:55 executing program 3: 01:00:55 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, 0x0, 0x20000, 0x0) 01:00:55 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:00:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) r1 = socket(0x2b, 0x1, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r2 = socket(0x10, 0x3, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000080)={r4}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={r4, 0x4}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000180)={r5, @in={{0x2, 0x4e23, @multicast1}}}, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='reno\x00', 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'lo\x00'}) 01:00:55 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0x238) 01:00:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 01:00:56 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, 0x0, 0x20000, 0x0) 01:00:56 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:00:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:00:56 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, 0x0, 0x20000, 0x0) 01:00:56 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:00:56 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 01:00:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) r1 = socket(0x2b, 0x1, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r2 = socket(0x10, 0x3, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000080)={r4}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={r4, 0x4}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000180)={r5, @in={{0x2, 0x4e23, @multicast1}}}, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='reno\x00', 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'lo\x00'}) 01:00:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:00:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:00:56 executing program 2: io_setup(0x3, &(0x7f0000000200)) 01:00:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000002, 0x4], [0xc1]}) [ 182.183428][ T8924] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop3 [ 182.213351][ T8924] BTRFS error (device loop3): superblock checksum mismatch [ 182.247802][ T8924] BTRFS error (device loop3): open_ctree failed [ 182.322925][ T8932] BTRFS error (device loop3): superblock checksum mismatch [ 182.380883][ T8932] BTRFS error (device loop3): open_ctree failed 01:00:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 01:00:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:00:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:00:57 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) [ 182.736151][ T8945] BTRFS error (device loop3): superblock checksum mismatch 01:00:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) r1 = socket(0x2b, 0x1, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r2 = socket(0x10, 0x3, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000080)={r4}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={r4, 0x4}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000180)={r5, @in={{0x2, 0x4e23, @multicast1}}}, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='reno\x00', 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'lo\x00'}) [ 182.797939][ T8945] BTRFS error (device loop3): open_ctree failed 01:00:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:00:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:00:57 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) [ 183.086877][ T8975] BTRFS error (device loop3): superblock checksum mismatch 01:00:57 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) [ 183.127953][ T8975] BTRFS error (device loop3): open_ctree failed 01:00:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 183.289681][ T8987] BTRFS error (device loop3): superblock checksum mismatch [ 183.361084][ T8987] BTRFS error (device loop3): open_ctree failed 01:00:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 01:00:58 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 01:00:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:00:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:00:58 executing program 2: openat$pfkey(0xffffffffffffff9c, 0x0, 0x20000, 0x0) 01:00:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) r1 = socket(0x2b, 0x1, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r2 = socket(0x10, 0x3, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000080)={r4}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={r4, 0x4}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000180)={r5, @in={{0x2, 0x4e23, @multicast1}}}, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='reno\x00', 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'lo\x00'}) 01:00:58 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:00:58 executing program 2: openat$pfkey(0xffffffffffffff9c, 0x0, 0x20000, 0x0) [ 183.750751][ T9006] BTRFS error (device loop3): superblock checksum mismatch 01:00:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 183.818603][ T9006] BTRFS error (device loop3): open_ctree failed 01:00:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:00:58 executing program 2: openat$pfkey(0xffffffffffffff9c, 0x0, 0x20000, 0x0) 01:00:58 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) [ 184.057692][ T9030] BTRFS error (device loop3): superblock checksum mismatch [ 184.097945][ T9030] BTRFS error (device loop3): open_ctree failed 01:00:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 01:00:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:00:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:00:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 184.492892][ T9043] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00b10efd9a:0 old:/dev/loop3 new:/dev/loop2 [ 184.518512][ T9044] BTRFS error (device loop3): superblock checksum mismatch 01:00:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 184.588703][ T9044] BTRFS error (device loop3): open_ctree failed 01:00:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:00:59 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:00:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:00:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 184.705394][ T9058] BTRFS error (device loop2): superblock checksum mismatch [ 184.778508][ T9058] BTRFS error (device loop2): open_ctree failed 01:00:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 184.877168][ T9072] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00b10efd9a:0 old:/dev/loop3 new:/dev/loop1 [ 184.878435][ T9067] BTRFS error (device loop3): superblock checksum mismatch 01:00:59 executing program 1: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000680)) getegid() lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000600)) fstat(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) readlinkat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=""/204, 0xcc) keyctl$chown(0x4, 0x0, 0x0, r0) socket$inet_tcp(0x2, 0x1, 0x0) setgroups(0x0, 0x0) syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x3e3, 0x3bc177af4b1a627b) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000380), &(0x7f00000003c0)=0x4) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000300), 0x0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) clock_gettime(0x0, &(0x7f0000000440)) prctl$PR_GET_CHILD_SUBREAPER(0x25) r2 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0x3, 0x6, 0x0, 0xffffffe1, 0x16, 0x2, 0x8, 0x5f, 0x4, 0x100, 0x4, 0x963}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(0x0, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@md5={0x1, "e5bb395f55c063cd645af21b63c76d9d"}, 0x11, 0x1c48963f684a34b5) unshare(0x60020000) [ 185.007726][ T9067] BTRFS error (device loop3): open_ctree failed 01:00:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 185.072326][ T9079] BTRFS error (device loop2): superblock checksum mismatch [ 185.167755][ T9079] BTRFS error (device loop2): open_ctree failed [ 185.231231][ T9085] IPVS: ftp: loaded support on port[0] = 21 01:01:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 01:01:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:00 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 185.409459][ T9095] BTRFS error (device loop2): superblock checksum mismatch [ 185.421097][ T9097] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00b10efd9a:0 old:/dev/loop2 new:/dev/loop3 01:01:00 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:00 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) [ 185.517758][ T9095] BTRFS error (device loop2): open_ctree failed 01:01:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 185.714145][ T9113] BTRFS error (device loop3): superblock checksum mismatch 01:01:00 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 185.778016][ T9113] BTRFS error (device loop3): open_ctree failed 01:01:00 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 185.853581][ T9121] BTRFS error (device loop2): superblock checksum mismatch [ 185.897812][ T9121] BTRFS error (device loop2): open_ctree failed [ 185.937776][ T9126] BTRFS error (device loop1): superblock checksum mismatch 01:01:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 186.019273][ T9126] BTRFS error (device loop1): open_ctree failed [ 186.050063][ T9131] BTRFS error (device loop3): superblock checksum mismatch 01:01:00 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 186.148210][ T9131] BTRFS error (device loop3): open_ctree failed [ 186.165667][ T9141] BTRFS error (device loop2): superblock checksum mismatch 01:01:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) 01:01:01 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 186.278373][ T9141] BTRFS error (device loop2): open_ctree failed [ 186.304109][ T9148] BTRFS error (device loop1): superblock checksum mismatch [ 186.348019][ T9148] BTRFS error (device loop1): open_ctree failed 01:01:01 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 186.439816][ T9157] BTRFS error (device loop3): superblock checksum mismatch 01:01:01 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:01 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 186.508231][ T9157] BTRFS error (device loop3): open_ctree failed 01:01:01 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 186.574247][ T9164] BTRFS error (device loop2): superblock checksum mismatch [ 186.708054][ T9164] BTRFS error (device loop2): open_ctree failed [ 186.736461][ T9180] BTRFS error (device loop1): superblock checksum mismatch 01:01:01 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 186.778529][ T9180] BTRFS error (device loop1): open_ctree failed [ 186.804044][ T9185] BTRFS error (device loop3): superblock checksum mismatch 01:01:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:01 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 186.897744][ T9185] BTRFS error (device loop3): open_ctree failed 01:01:01 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 187.026332][ T9201] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00b10efd9a:0 old:/dev/loop2 new:/dev/loop1 [ 187.041286][ T9194] BTRFS error (device loop2): superblock checksum mismatch 01:01:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) [ 187.173324][ T9194] BTRFS error (device loop2): open_ctree failed [ 187.200101][ T9207] BTRFS error (device loop3): superblock checksum mismatch 01:01:02 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 187.267702][ T9207] BTRFS error (device loop3): open_ctree failed [ 187.280800][ T9212] BTRFS error (device loop1): superblock checksum mismatch 01:01:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 187.387659][ T9212] BTRFS error (device loop1): open_ctree failed 01:01:02 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:02 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 187.535187][ T9223] BTRFS error (device loop2): superblock checksum mismatch [ 187.586482][ T9232] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00b10efd9a:0 old:/dev/loop2 new:/dev/loop3 01:01:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 187.717714][ T9223] BTRFS error (device loop2): open_ctree failed 01:01:02 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:02 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 187.875739][ T9250] BTRFS error (device loop3): superblock checksum mismatch [ 187.931647][ T9254] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00b10efd9a:0 old:/dev/loop3 new:/dev/loop2 [ 187.977719][ T9250] BTRFS error (device loop3): open_ctree failed 01:01:02 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) 01:01:02 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 188.194194][ T9270] BTRFS error (device loop2): superblock checksum mismatch [ 188.251230][ T9270] BTRFS error (device loop2): open_ctree failed [ 188.265142][ T9277] BTRFS error (device loop3): superblock checksum mismatch 01:01:03 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:03 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 188.348017][ T9277] BTRFS error (device loop3): open_ctree failed 01:01:03 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 188.553293][ T9298] BTRFS error (device loop2): superblock checksum mismatch [ 188.577956][ T9298] BTRFS error (device loop2): open_ctree failed 01:01:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 188.682045][ T9306] BTRFS error (device loop3): superblock checksum mismatch 01:01:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 188.728729][ T9306] BTRFS error (device loop3): open_ctree failed 01:01:03 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 188.863442][ T9319] BTRFS error (device loop2): superblock checksum mismatch 01:01:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:03 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 188.988580][ T9319] BTRFS error (device loop2): open_ctree failed [ 189.026610][ T9328] BTRFS error (device loop3): superblock checksum mismatch 01:01:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 189.107703][ T9328] BTRFS error (device loop3): open_ctree failed 01:01:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 01:01:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:04 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:04 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 189.319540][ T9344] BTRFS error (device loop2): superblock checksum mismatch [ 189.411842][ T9344] BTRFS error (device loop2): open_ctree failed 01:01:04 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) [ 189.547082][ T9358] BTRFS error (device loop3): superblock checksum mismatch 01:01:04 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 189.627809][ T9358] BTRFS error (device loop3): open_ctree failed 01:01:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 189.784948][ T9375] BTRFS error (device loop2): superblock checksum mismatch 01:01:04 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) [ 189.897742][ T9375] BTRFS error (device loop2): open_ctree failed 01:01:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 189.943296][ T9386] BTRFS error (device loop3): superblock checksum mismatch 01:01:04 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 190.047757][ T9386] BTRFS error (device loop3): open_ctree failed 01:01:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x3, 0x0) [ 190.171086][ T9399] BTRFS error (device loop2): superblock checksum mismatch 01:01:05 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x3, 0x0) 01:01:05 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 190.289088][ T9399] BTRFS error (device loop2): open_ctree failed 01:01:05 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) [ 190.390332][ T9412] BTRFS error (device loop3): superblock checksum mismatch 01:01:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:05 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x3, 0x0) [ 190.538331][ T9412] BTRFS error (device loop3): open_ctree failed 01:01:05 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) [ 190.591502][ T9433] BTRFS error (device loop2): superblock checksum mismatch 01:01:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:05 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) [ 190.698261][ T9433] BTRFS error (device loop2): open_ctree failed 01:01:05 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x3, 0x0) [ 190.840683][ T9449] BTRFS error (device loop3): superblock checksum mismatch 01:01:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 190.912661][ T9460] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00b10efd9a:0 old:/dev/loop3 new:/dev/loop2 01:01:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x3, 0x0) [ 190.998250][ T9449] BTRFS error (device loop3): open_ctree failed 01:01:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:05 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 191.192946][ T9473] BTRFS error (device loop2): superblock checksum mismatch 01:01:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x3, 0x0) 01:01:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 191.371103][ T9473] BTRFS error (device loop2): open_ctree failed 01:01:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x3, 0x0) [ 191.435835][ T9484] BTRFS error (device loop3): superblock checksum mismatch [ 191.497791][ T9484] BTRFS error (device loop3): open_ctree failed 01:01:06 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:06 executing program 4: pipe(0x0) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x3, 0x0) 01:01:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 191.755651][ T9511] BTRFS error (device loop2): superblock checksum mismatch [ 191.785768][ T9515] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00b10efd9a:0 old:/dev/loop2 new:/dev/loop3 01:01:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x3, 0x0) 01:01:06 executing program 4: pipe(0x0) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) [ 191.878724][ T9511] BTRFS error (device loop2): open_ctree failed 01:01:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x3, 0x0) 01:01:06 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:06 executing program 4: pipe(0x0) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 192.144448][ T9544] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00b10efd9a:0 old:/dev/loop3 new:/dev/loop2 [ 192.146490][ T9541] BTRFS error (device loop3): superblock checksum mismatch 01:01:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:07 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) [ 192.368769][ T9541] BTRFS error (device loop3): open_ctree failed 01:01:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x3, 0x0) [ 192.418468][ T9561] BTRFS error (device loop2): superblock checksum mismatch [ 192.478378][ T9561] BTRFS error (device loop2): open_ctree failed 01:01:07 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:07 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x3, 0x0) 01:01:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:07 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) [ 192.814719][ T9588] BTRFS error (device loop2): superblock checksum mismatch 01:01:07 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 192.908316][ T9588] BTRFS error (device loop2): open_ctree failed 01:01:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x3, 0x0) 01:01:07 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x3, 0x0) [ 193.264767][ T9630] BTRFS error (device loop2): superblock checksum mismatch 01:01:08 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 193.318043][ T9630] BTRFS error (device loop2): open_ctree failed 01:01:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x3, 0x0) 01:01:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:08 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x3, 0x0) 01:01:08 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x3, 0x0) 01:01:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 01:01:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x3, 0x0) 01:01:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:09 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:09 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 01:01:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x3, 0x0) 01:01:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:09 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x3, 0x0) 01:01:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 01:01:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:10 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x3, 0x0) 01:01:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x3, 0x0) 01:01:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 01:01:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x3, 0x0) 01:01:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:10 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:10 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x3, 0x0) 01:01:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x3, 0x0) 01:01:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 01:01:11 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x3, 0x0) 01:01:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x3, 0x0) 01:01:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 01:01:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x3, 0x0) 01:01:11 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:11 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x3, 0x0) 01:01:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x3, 0x0) 01:01:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x3, 0x0) 01:01:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x3, 0x0) 01:01:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x3, 0x0) 01:01:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x3, 0x0) 01:01:11 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x3, 0x0) 01:01:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x3, 0x0) 01:01:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x3, 0x0) 01:01:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x3, 0x0) 01:01:12 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:12 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x3, 0x0) 01:01:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x3, 0x0) 01:01:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x3, 0x0) 01:01:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x3, 0x0) 01:01:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:12 executing program 5: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x3, 0x0) 01:01:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x3, 0x0) 01:01:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 01:01:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x3, 0x0) 01:01:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x3, 0x0) 01:01:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:13 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:13 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x3, 0x0) 01:01:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x3, 0x0) 01:01:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x3, 0x0) 01:01:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x3, 0x0) 01:01:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x3, 0x0) 01:01:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x3, 0x0) 01:01:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x3, 0x0) 01:01:14 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:14 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x3, 0x0) 01:01:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x3, 0x0) 01:01:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x3, 0x0) 01:01:14 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 199.759543][T10093] BTRFS error (device loop1): superblock checksum mismatch [ 199.810230][T10093] BTRFS error (device loop1): open_ctree failed 01:01:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x3, 0x0) [ 199.900478][T10101] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:01:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 199.962847][ T2506] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 199.977737][ T2506] Buffer I/O error on dev loop1, logical block 0, async page read 01:01:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x3, 0x0) 01:01:14 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x3, 0x0) 01:01:15 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x3, 0x0) 01:01:15 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x3, 0x0) 01:01:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:15 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x3, 0x0) 01:01:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x3, 0x0) 01:01:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x3, 0x0) 01:01:15 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:15 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:16 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x3, 0x0) 01:01:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x3, 0x0) 01:01:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:16 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x3, 0x0) 01:01:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x3, 0x0) 01:01:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x3, 0x0) 01:01:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:16 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:17 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x3, 0x0) 01:01:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x3, 0x0) 01:01:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:17 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x3, 0x0) 01:01:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x3, 0x0) 01:01:17 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x3, 0x0) 01:01:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x3, 0x0) 01:01:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:18 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x3, 0x0) 01:01:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x3, 0x0) 01:01:18 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x3, 0x0) 01:01:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x3, 0x0) 01:01:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x3, 0x0) 01:01:18 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:18 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x3, 0x0) 01:01:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x3, 0x0) 01:01:18 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x3, 0x0) 01:01:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x3, 0x0) 01:01:19 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x3, 0x0) 01:01:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x3, 0x0) 01:01:19 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x3, 0x0) 01:01:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x3, 0x0) 01:01:19 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x3, 0x0) 01:01:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:20 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:20 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x3, 0x0) 01:01:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:20 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:21 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x0, 0x0}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:21 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:21 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x0, 0x0}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x0, 0x0}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x0, 0x0}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x0, 0x0}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:22 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 207.469774][ T9342] rpcbind: server not responding, timed out 01:01:22 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x0, 0x0}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:22 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:22 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:23 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:23 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:23 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:23 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:23 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:23 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:23 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:23 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:23 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:24 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:24 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:24 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:24 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:24 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:24 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:24 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:25 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:25 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:25 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:25 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:25 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:25 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:26 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:26 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:27 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:27 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:27 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:27 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:27 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:28 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:28 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:28 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:28 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:28 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:29 executing program 4: pipe(&(0x7f0000000080)) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) 01:01:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:29 executing program 4: pipe(&(0x7f0000000080)) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) 01:01:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:30 executing program 4: pipe(&(0x7f0000000080)) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) 01:01:30 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) 01:01:30 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:01:30 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040032, 0xffffffffffffffff, 0x0) 01:01:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x0, 0x0}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) 01:01:30 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 01:01:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:01:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) 01:01:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:01:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x0, 0x0}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) 01:01:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) 01:01:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 01:01:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x0, 0x0}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:31 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 01:01:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) 01:01:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 01:01:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) 01:01:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 01:01:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) 01:01:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 01:01:32 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x3ded5adb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 01:01:32 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) 01:01:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 01:01:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:01:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 01:01:32 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:01:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x3, 0x0) 01:01:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x0, 0x0) 01:01:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:01:33 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 01:01:33 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x3, 0x0) [ 218.952211][T11217] BTRFS error (device loop4): superblock checksum mismatch 01:01:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x0, 0x0) 01:01:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) [ 219.077737][T11217] BTRFS error (device loop4): open_ctree failed [ 219.133053][T11224] BTRFS error (device loop0): superblock checksum mismatch 01:01:34 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 219.218012][T11224] BTRFS error (device loop0): open_ctree failed 01:01:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) [ 219.447327][T11265] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00b10efd9a:0 old:/dev/loop5 new:/dev/loop0 01:01:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x0, 0x0) [ 219.498746][T11267] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00b10efd9a:0 old:/dev/loop5 new:/dev/loop4 [ 219.552730][T11255] BTRFS error (device loop5): superblock checksum mismatch 01:01:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 01:01:34 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 219.747692][T11255] BTRFS error (device loop5): open_ctree failed 01:01:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 219.814704][T11291] BTRFS error (device loop4): superblock checksum mismatch 01:01:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) [ 219.908606][T11291] BTRFS error (device loop4): open_ctree failed 01:01:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 01:01:34 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:34 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 01:01:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 220.240013][T11317] BTRFS error (device loop5): superblock checksum mismatch [ 220.272811][T11318] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00b10efd9a:0 old:/dev/loop5 new:/dev/loop4 01:01:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 220.354758][T11317] BTRFS error (device loop5): open_ctree failed 01:01:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 01:01:35 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:35 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 220.600890][T11343] BTRFS error (device loop4): superblock checksum mismatch 01:01:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x0, 0x0) 01:01:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 220.667754][T11343] BTRFS error (device loop4): open_ctree failed 01:01:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) [ 220.845947][T11355] BTRFS error (device loop5): superblock checksum mismatch 01:01:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x0, 0x0) 01:01:35 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 220.938149][T11355] BTRFS error (device loop5): open_ctree failed 01:01:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 01:01:35 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 221.192473][T11386] BTRFS error (device loop4): superblock checksum mismatch 01:01:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x0, 0x0) [ 221.307735][T11386] BTRFS error (device loop4): open_ctree failed [ 221.323694][T11400] BTRFS error (device loop5): superblock checksum mismatch 01:01:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 01:01:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 221.461604][T11400] BTRFS error (device loop5): open_ctree failed 01:01:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 01:01:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x0, 0x0) 01:01:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) [ 221.747816][T11430] BTRFS error (device loop4): superblock checksum mismatch [ 221.828003][T11430] BTRFS error (device loop4): open_ctree failed [ 221.852965][T11443] BTRFS error (device loop5): superblock checksum mismatch 01:01:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x0, 0x0) [ 221.988397][T11443] BTRFS error (device loop5): open_ctree failed 01:01:36 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 01:01:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) 01:01:36 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x0, 0x0) 01:01:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 222.271462][T11467] BTRFS error (device loop4): superblock checksum mismatch 01:01:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 01:01:37 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 222.437971][T11467] BTRFS error (device loop4): open_ctree failed 01:01:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x0, 0x0) 01:01:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) 01:01:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 01:01:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:37 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x0, 0x0) 01:01:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) [ 222.882812][T11521] BTRFS error (device loop4): superblock checksum mismatch 01:01:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) [ 222.977743][T11521] BTRFS error (device loop4): open_ctree failed 01:01:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x0, 0x0) 01:01:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x0, 0x0) 01:01:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) 01:01:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 01:01:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x0, 0x0) 01:01:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 223.425598][T11562] BTRFS error (device loop4): superblock checksum mismatch 01:01:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 223.558200][T11562] BTRFS error (device loop4): open_ctree failed 01:01:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) 01:01:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 01:01:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x0, 0x0) 01:01:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 01:01:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 223.879881][T11600] BTRFS error (device loop4): superblock checksum mismatch 01:01:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x0, 0x0) [ 223.997937][T11600] BTRFS error (device loop4): open_ctree failed 01:01:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 01:01:38 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) 01:01:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 01:01:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x0, 0x0) 01:01:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 01:01:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x0, 0x0) 01:01:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 01:01:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:39 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 01:01:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 01:01:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x3, 0x0) [ 224.825250][T11677] BTRFS error (device loop1): superblock checksum mismatch 01:01:39 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) [ 224.978200][T11677] BTRFS error (device loop1): open_ctree failed 01:01:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 01:01:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x3, 0x0) 01:01:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 01:01:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:40 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 01:01:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 01:01:40 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x3, 0x0) 01:01:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 01:01:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 01:01:40 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x3, 0x0) 01:01:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 01:01:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x3, 0x0) 01:01:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:41 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) [ 226.305630][T11795] BTRFS error (device loop3): superblock checksum mismatch 01:01:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) [ 226.378362][T11795] BTRFS error (device loop3): open_ctree failed 01:01:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x3, 0x0) 01:01:41 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 01:01:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 01:01:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 01:01:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x3, 0x0) 01:01:41 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) [ 226.863891][T11831] BTRFS error (device loop3): superblock checksum mismatch [ 226.927716][T11831] BTRFS error (device loop3): open_ctree failed 01:01:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 01:01:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:41 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x3, 0x0) 01:01:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x3, 0x0) 01:01:41 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 01:01:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 01:01:42 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x3, 0x0) 01:01:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x3, 0x0) 01:01:42 executing program 3 (fault-call:3 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:42 executing program 2 (fault-call:3 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:42 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 227.704235][T11901] FAULT_INJECTION: forcing a failure. [ 227.704235][T11901] name failslab, interval 1, probability 0, space 0, times 1 01:01:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x3, 0x0) 01:01:42 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x3, 0x0) [ 227.812102][T11909] FAULT_INJECTION: forcing a failure. [ 227.812102][T11909] name failslab, interval 1, probability 0, space 0, times 1 [ 227.822618][T11901] CPU: 1 PID: 11901 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 227.832616][T11901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.832622][T11901] Call Trace: [ 227.832640][T11901] dump_stack+0x1fb/0x318 [ 227.832657][T11901] should_fail+0x555/0x770 [ 227.832674][T11901] __should_failslab+0x11a/0x160 01:01:42 executing program 3 (fault-call:3 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 227.832688][T11901] ? __se_sys_memfd_create+0x10a/0x4b0 [ 227.832697][T11901] should_failslab+0x9/0x20 [ 227.832704][T11901] __kmalloc+0x7a/0x340 [ 227.832718][T11901] __se_sys_memfd_create+0x10a/0x4b0 [ 227.832730][T11901] ? do_syscall_64+0x1d/0x1c0 [ 227.832742][T11901] __x64_sys_memfd_create+0x5b/0x70 [ 227.832753][T11901] do_syscall_64+0xf7/0x1c0 [ 227.832767][T11901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.832778][T11901] RIP: 0033:0x45a639 [ 227.832788][T11901] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 227.832793][T11901] RSP: 002b:00007fda2e1e7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 227.832803][T11901] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a639 [ 227.832808][T11901] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 227.832814][T11901] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 227.832825][T11901] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fda2e1e86d4 [ 227.846159][T11901] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 227.907587][T11909] CPU: 1 PID: 11909 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 227.933177][T11909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.933183][T11909] Call Trace: [ 227.933201][T11909] dump_stack+0x1fb/0x318 [ 227.933216][T11909] should_fail+0x555/0x770 [ 227.933232][T11909] __should_failslab+0x11a/0x160 [ 227.933243][T11909] ? __se_sys_memfd_create+0x10a/0x4b0 [ 227.933251][T11909] should_failslab+0x9/0x20 [ 227.933258][T11909] __kmalloc+0x7a/0x340 [ 227.933269][T11909] __se_sys_memfd_create+0x10a/0x4b0 [ 227.933280][T11909] ? do_syscall_64+0x1d/0x1c0 [ 227.933291][T11909] __x64_sys_memfd_create+0x5b/0x70 [ 227.933302][T11909] do_syscall_64+0xf7/0x1c0 [ 227.933316][T11909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.933324][T11909] RIP: 0033:0x45a639 [ 227.933337][T11909] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 228.071226][T11909] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 228.079619][T11909] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a639 [ 228.087571][T11909] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 228.099701][T11909] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 228.107752][T11909] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9557cb76d4 [ 228.115704][T11909] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 228.222620][T11922] FAULT_INJECTION: forcing a failure. [ 228.222620][T11922] name failslab, interval 1, probability 0, space 0, times 0 [ 228.251391][T11922] CPU: 1 PID: 11922 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 228.259416][T11922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.259423][T11922] Call Trace: [ 228.259441][T11922] dump_stack+0x1fb/0x318 [ 228.259458][T11922] should_fail+0x555/0x770 [ 228.259476][T11922] __should_failslab+0x11a/0x160 [ 228.259488][T11922] ? shmem_alloc_inode+0x1b/0x40 [ 228.259497][T11922] should_failslab+0x9/0x20 [ 228.259505][T11922] kmem_cache_alloc+0x56/0x2e0 [ 228.259515][T11922] ? shmem_match+0x180/0x180 [ 228.259531][T11922] shmem_alloc_inode+0x1b/0x40 [ 228.259538][T11922] ? shmem_match+0x180/0x180 [ 228.259546][T11922] new_inode_pseudo+0x68/0x240 [ 228.259556][T11922] new_inode+0x28/0x1c0 [ 228.273053][T11922] shmem_get_inode+0x108/0x6e0 [ 228.273070][T11922] __shmem_file_setup+0x129/0x280 [ 228.273084][T11922] shmem_file_setup+0x2f/0x40 [ 228.338287][T11922] __se_sys_memfd_create+0x28e/0x4b0 [ 228.343583][T11922] ? do_syscall_64+0x1d/0x1c0 [ 228.348274][T11922] __x64_sys_memfd_create+0x5b/0x70 [ 228.353482][T11922] do_syscall_64+0xf7/0x1c0 [ 228.358002][T11922] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.363898][T11922] RIP: 0033:0x45a639 [ 228.367889][T11922] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 228.388207][T11922] RSP: 002b:00007fda2e1e7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 228.396631][T11922] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a639 [ 228.404614][T11922] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 228.412595][T11922] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 01:01:43 executing program 2 (fault-call:3 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:43 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x3, 0x0) 01:01:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 228.420577][T11922] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fda2e1e86d4 [ 228.428555][T11922] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:43 executing program 3 (fault-call:3 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:43 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 228.536894][T11939] FAULT_INJECTION: forcing a failure. [ 228.536894][T11939] name failslab, interval 1, probability 0, space 0, times 0 [ 228.566060][T11939] CPU: 1 PID: 11939 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 228.573987][T11939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.584050][T11939] Call Trace: [ 228.587477][T11939] dump_stack+0x1fb/0x318 [ 228.591808][T11939] should_fail+0x555/0x770 [ 228.596423][T11939] __should_failslab+0x11a/0x160 [ 228.601476][T11939] ? shmem_alloc_inode+0x1b/0x40 [ 228.606404][T11939] should_failslab+0x9/0x20 [ 228.610919][T11939] kmem_cache_alloc+0x56/0x2e0 [ 228.615690][T11939] ? shmem_match+0x180/0x180 [ 228.620275][T11939] shmem_alloc_inode+0x1b/0x40 [ 228.625063][T11939] ? shmem_match+0x180/0x180 [ 228.629655][T11939] new_inode_pseudo+0x68/0x240 [ 228.634444][T11939] new_inode+0x28/0x1c0 [ 228.638752][T11939] shmem_get_inode+0x108/0x6e0 [ 228.643517][T11939] __shmem_file_setup+0x129/0x280 [ 228.648541][T11939] shmem_file_setup+0x2f/0x40 [ 228.653210][T11939] __se_sys_memfd_create+0x28e/0x4b0 [ 228.658608][T11939] ? do_syscall_64+0x1d/0x1c0 [ 228.663349][T11939] __x64_sys_memfd_create+0x5b/0x70 [ 228.668540][T11939] do_syscall_64+0xf7/0x1c0 [ 228.673033][T11939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.679011][T11939] RIP: 0033:0x45a639 [ 228.682919][T11939] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 228.702510][T11939] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 228.710948][T11939] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a639 [ 228.719029][T11939] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 228.726984][T11939] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 228.734944][T11939] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9557cb76d4 [ 228.742901][T11939] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 228.762435][T11941] FAULT_INJECTION: forcing a failure. [ 228.762435][T11941] name failslab, interval 1, probability 0, space 0, times 0 [ 228.776054][T11941] CPU: 1 PID: 11941 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 01:01:43 executing program 2 (fault-call:3 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 228.783975][T11941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.783982][T11941] Call Trace: [ 228.784001][T11941] dump_stack+0x1fb/0x318 [ 228.784020][T11941] should_fail+0x555/0x770 [ 228.784039][T11941] __should_failslab+0x11a/0x160 [ 228.784050][T11941] ? security_inode_alloc+0x36/0x1e0 [ 228.784063][T11941] should_failslab+0x9/0x20 [ 228.784077][T11941] kmem_cache_alloc+0x56/0x2e0 [ 228.784087][T11941] ? rcu_read_lock_sched_held+0x10b/0x170 [ 228.784097][T11941] security_inode_alloc+0x36/0x1e0 01:01:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x3, 0x0) [ 228.806588][T11941] inode_init_always+0x3b5/0x920 [ 228.842510][T11941] ? shmem_match+0x180/0x180 [ 228.847107][T11941] new_inode_pseudo+0x7f/0x240 [ 228.851888][T11941] new_inode+0x28/0x1c0 [ 228.856050][T11941] shmem_get_inode+0x108/0x6e0 [ 228.860827][T11941] __shmem_file_setup+0x129/0x280 [ 228.865858][T11941] shmem_file_setup+0x2f/0x40 [ 228.870543][T11941] __se_sys_memfd_create+0x28e/0x4b0 [ 228.875833][T11941] ? do_syscall_64+0x1d/0x1c0 [ 228.880605][T11941] __x64_sys_memfd_create+0x5b/0x70 [ 228.885896][T11941] do_syscall_64+0xf7/0x1c0 [ 228.890414][T11941] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.896306][T11941] RIP: 0033:0x45a639 [ 228.900205][T11941] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 228.919817][T11941] RSP: 002b:00007fda2e1e7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 228.928234][T11941] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a639 [ 228.940815][T11941] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 228.948795][T11941] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 228.956773][T11941] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fda2e1e86d4 [ 228.964767][T11941] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:43 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x3, 0x0) 01:01:43 executing program 3 (fault-call:3 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 229.104737][T11954] FAULT_INJECTION: forcing a failure. [ 229.104737][T11954] name failslab, interval 1, probability 0, space 0, times 0 [ 229.123682][T11954] CPU: 1 PID: 11954 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 229.131703][T11954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.141770][T11954] Call Trace: [ 229.145073][T11954] dump_stack+0x1fb/0x318 [ 229.149417][T11954] should_fail+0x555/0x770 [ 229.153853][T11954] __should_failslab+0x11a/0x160 [ 229.158800][T11954] ? security_inode_alloc+0x36/0x1e0 [ 229.164100][T11954] should_failslab+0x9/0x20 [ 229.168608][T11954] kmem_cache_alloc+0x56/0x2e0 [ 229.173384][T11954] ? rcu_read_lock_sched_held+0x10b/0x170 [ 229.179111][T11954] security_inode_alloc+0x36/0x1e0 [ 229.184235][T11954] inode_init_always+0x3b5/0x920 [ 229.189179][T11954] ? shmem_match+0x180/0x180 [ 229.193775][T11954] new_inode_pseudo+0x7f/0x240 [ 229.198547][T11954] new_inode+0x28/0x1c0 [ 229.202714][T11954] shmem_get_inode+0x108/0x6e0 [ 229.207491][T11954] __shmem_file_setup+0x129/0x280 [ 229.212525][T11954] shmem_file_setup+0x2f/0x40 [ 229.217325][T11954] __se_sys_memfd_create+0x28e/0x4b0 [ 229.222596][T11954] ? do_syscall_64+0x1d/0x1c0 [ 229.227266][T11954] __x64_sys_memfd_create+0x5b/0x70 [ 229.232452][T11954] do_syscall_64+0xf7/0x1c0 [ 229.236939][T11954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.242894][T11954] RIP: 0033:0x45a639 [ 229.246777][T11954] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 229.266392][T11954] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 229.274789][T11954] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a639 [ 229.283005][T11954] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 229.291050][T11954] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 01:01:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x3, 0x0) [ 229.299004][T11954] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9557cb76d4 [ 229.306960][T11954] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:44 executing program 2 (fault-call:3 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:44 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x3, 0x0) 01:01:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 229.424038][T11968] FAULT_INJECTION: forcing a failure. [ 229.424038][T11968] name failslab, interval 1, probability 0, space 0, times 0 [ 229.447589][T11968] CPU: 1 PID: 11968 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 229.455534][T11968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.465592][T11968] Call Trace: [ 229.469046][T11968] dump_stack+0x1fb/0x318 [ 229.473394][T11968] should_fail+0x555/0x770 [ 229.477826][T11968] __should_failslab+0x11a/0x160 [ 229.482773][T11968] ? __d_alloc+0x2d/0x6e0 [ 229.487106][T11968] should_failslab+0x9/0x20 [ 229.491614][T11968] kmem_cache_alloc+0x56/0x2e0 [ 229.496386][T11968] __d_alloc+0x2d/0x6e0 [ 229.500545][T11968] ? lockdep_init_map+0x2a/0x680 [ 229.505485][T11968] d_alloc_pseudo+0x1d/0x70 [ 229.509984][T11968] alloc_file_pseudo+0xc3/0x260 [ 229.514823][T11968] __shmem_file_setup+0x1a2/0x280 [ 229.519848][T11968] shmem_file_setup+0x2f/0x40 [ 229.524521][T11968] __se_sys_memfd_create+0x28e/0x4b0 [ 229.529788][T11968] ? do_syscall_64+0x1d/0x1c0 [ 229.534448][T11968] __x64_sys_memfd_create+0x5b/0x70 [ 229.539628][T11968] do_syscall_64+0xf7/0x1c0 [ 229.544111][T11968] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.549981][T11968] RIP: 0033:0x45a639 [ 229.553867][T11968] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 229.573451][T11968] RSP: 002b:00007fda2e1e7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 229.581850][T11968] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a639 [ 229.589814][T11968] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 229.597776][T11968] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 229.605747][T11968] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fda2e1e86d4 [ 229.613699][T11968] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:44 executing program 3 (fault-call:3 fault-nth:4): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 229.644371][T11975] FAULT_INJECTION: forcing a failure. [ 229.644371][T11975] name failslab, interval 1, probability 0, space 0, times 0 [ 229.661756][T11975] CPU: 0 PID: 11975 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 229.669684][T11975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.679739][T11975] Call Trace: [ 229.679760][T11975] dump_stack+0x1fb/0x318 [ 229.679775][T11975] should_fail+0x555/0x770 [ 229.679793][T11975] __should_failslab+0x11a/0x160 [ 229.691841][T11975] ? __d_alloc+0x2d/0x6e0 [ 229.701123][T11975] should_failslab+0x9/0x20 [ 229.705621][T11975] kmem_cache_alloc+0x56/0x2e0 [ 229.710393][T11975] __d_alloc+0x2d/0x6e0 [ 229.714540][T11975] ? lockdep_init_map+0x2a/0x680 [ 229.719459][T11975] d_alloc_pseudo+0x1d/0x70 [ 229.723941][T11975] alloc_file_pseudo+0xc3/0x260 [ 229.728993][T11975] __shmem_file_setup+0x1a2/0x280 [ 229.733995][T11975] shmem_file_setup+0x2f/0x40 [ 229.738651][T11975] __se_sys_memfd_create+0x28e/0x4b0 [ 229.743945][T11975] ? do_syscall_64+0x1d/0x1c0 [ 229.748621][T11975] __x64_sys_memfd_create+0x5b/0x70 [ 229.753805][T11975] do_syscall_64+0xf7/0x1c0 [ 229.758424][T11975] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.764302][T11975] RIP: 0033:0x45a639 [ 229.768179][T11975] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:01:44 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 229.788459][T11975] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 229.796865][T11975] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a639 [ 229.804914][T11975] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 229.812861][T11975] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 229.820809][T11975] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9557cb76d4 [ 229.828761][T11975] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x3, 0x0) [ 229.905340][T11982] FAULT_INJECTION: forcing a failure. [ 229.905340][T11982] name failslab, interval 1, probability 0, space 0, times 0 01:01:44 executing program 2 (fault-call:3 fault-nth:4): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 229.980861][T11982] CPU: 0 PID: 11982 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 229.988806][T11982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.988813][T11982] Call Trace: [ 229.988832][T11982] dump_stack+0x1fb/0x318 [ 229.988848][T11982] should_fail+0x555/0x770 [ 229.988865][T11982] __should_failslab+0x11a/0x160 [ 229.988876][T11982] ? __alloc_file+0x2c/0x390 [ 229.988886][T11982] should_failslab+0x9/0x20 [ 229.988895][T11982] kmem_cache_alloc+0x56/0x2e0 01:01:44 executing program 3 (fault-call:3 fault-nth:5): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 229.988908][T11982] __alloc_file+0x2c/0x390 [ 229.988920][T11982] alloc_empty_file+0xac/0x1b0 [ 229.988933][T11982] alloc_file+0x60/0x4c0 [ 230.006640][T11982] alloc_file_pseudo+0x1d4/0x260 [ 230.006668][T11982] __shmem_file_setup+0x1a2/0x280 [ 230.016039][T11982] shmem_file_setup+0x2f/0x40 [ 230.016054][T11982] __se_sys_memfd_create+0x28e/0x4b0 [ 230.016064][T11982] ? do_syscall_64+0x1d/0x1c0 [ 230.016077][T11982] __x64_sys_memfd_create+0x5b/0x70 [ 230.025135][T11982] do_syscall_64+0xf7/0x1c0 [ 230.025150][T11982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.025159][T11982] RIP: 0033:0x45a639 [ 230.025170][T11982] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.034319][T11982] RSP: 002b:00007fda2e1e7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 230.034329][T11982] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a639 [ 230.034335][T11982] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 230.034341][T11982] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 230.034347][T11982] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fda2e1e86d4 [ 230.034352][T11982] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 230.246805][T12000] FAULT_INJECTION: forcing a failure. [ 230.246805][T12000] name failslab, interval 1, probability 0, space 0, times 0 [ 230.267748][T12000] CPU: 0 PID: 12000 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 230.275712][T12000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.276053][T12002] FAULT_INJECTION: forcing a failure. [ 230.276053][T12002] name failslab, interval 1, probability 0, space 0, times 0 [ 230.285799][T12000] Call Trace: [ 230.285821][T12000] dump_stack+0x1fb/0x318 [ 230.285836][T12000] should_fail+0x555/0x770 [ 230.285853][T12000] __should_failslab+0x11a/0x160 [ 230.285866][T12000] ? __alloc_file+0x2c/0x390 [ 230.285877][T12000] should_failslab+0x9/0x20 [ 230.285884][T12000] kmem_cache_alloc+0x56/0x2e0 [ 230.285896][T12000] __alloc_file+0x2c/0x390 [ 230.285906][T12000] alloc_empty_file+0xac/0x1b0 [ 230.285915][T12000] alloc_file+0x60/0x4c0 [ 230.285930][T12000] alloc_file_pseudo+0x1d4/0x260 [ 230.285946][T12000] __shmem_file_setup+0x1a2/0x280 [ 230.285959][T12000] shmem_file_setup+0x2f/0x40 [ 230.285968][T12000] __se_sys_memfd_create+0x28e/0x4b0 [ 230.285983][T12000] ? do_syscall_64+0x1d/0x1c0 [ 230.367153][T12000] __x64_sys_memfd_create+0x5b/0x70 [ 230.372363][T12000] do_syscall_64+0xf7/0x1c0 [ 230.376861][T12000] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.382746][T12000] RIP: 0033:0x45a639 [ 230.386632][T12000] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.406250][T12000] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 230.414648][T12000] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a639 [ 230.422613][T12000] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 230.430582][T12000] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 230.438573][T12000] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9557cb76d4 [ 230.446655][T12000] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 230.454633][T12002] CPU: 1 PID: 12002 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 230.462540][T12002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.462546][T12002] Call Trace: [ 230.462563][T12002] dump_stack+0x1fb/0x318 [ 230.462579][T12002] should_fail+0x555/0x770 [ 230.462594][T12002] __should_failslab+0x11a/0x160 [ 230.462609][T12002] ? security_file_alloc+0x36/0x200 01:01:45 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x3, 0x0) [ 230.489842][T12002] should_failslab+0x9/0x20 [ 230.489854][T12002] kmem_cache_alloc+0x56/0x2e0 [ 230.489868][T12002] security_file_alloc+0x36/0x200 [ 230.489882][T12002] __alloc_file+0xde/0x390 [ 230.489894][T12002] alloc_empty_file+0xac/0x1b0 [ 230.489905][T12002] alloc_file+0x60/0x4c0 [ 230.489920][T12002] alloc_file_pseudo+0x1d4/0x260 [ 230.489940][T12002] __shmem_file_setup+0x1a2/0x280 [ 230.489952][T12002] shmem_file_setup+0x2f/0x40 [ 230.489964][T12002] __se_sys_memfd_create+0x28e/0x4b0 [ 230.489975][T12002] ? do_syscall_64+0x1d/0x1c0 01:01:45 executing program 2 (fault-call:3 fault-nth:5): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 230.489988][T12002] __x64_sys_memfd_create+0x5b/0x70 [ 230.489998][T12002] do_syscall_64+0xf7/0x1c0 [ 230.490011][T12002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.490021][T12002] RIP: 0033:0x45a639 [ 230.490034][T12002] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.504470][T12002] RSP: 002b:00007fda2e1e7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 01:01:45 executing program 3 (fault-call:3 fault-nth:6): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x3, 0x0) [ 230.504481][T12002] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a639 [ 230.504486][T12002] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 230.504493][T12002] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 230.504499][T12002] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fda2e1e86d4 [ 230.504505][T12002] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 230.753085][T12012] FAULT_INJECTION: forcing a failure. [ 230.753085][T12012] name failslab, interval 1, probability 0, space 0, times 0 [ 230.763624][T12013] FAULT_INJECTION: forcing a failure. [ 230.763624][T12013] name failslab, interval 1, probability 0, space 0, times 0 [ 230.766124][T12012] CPU: 1 PID: 12012 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 230.786376][T12012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.796431][T12012] Call Trace: [ 230.799723][T12012] dump_stack+0x1fb/0x318 [ 230.804058][T12012] should_fail+0x555/0x770 [ 230.808467][T12012] __should_failslab+0x11a/0x160 [ 230.813388][T12012] ? security_file_alloc+0x36/0x200 [ 230.818572][T12012] should_failslab+0x9/0x20 [ 230.823075][T12012] kmem_cache_alloc+0x56/0x2e0 [ 230.827826][T12012] security_file_alloc+0x36/0x200 [ 230.832850][T12012] __alloc_file+0xde/0x390 [ 230.837275][T12012] alloc_empty_file+0xac/0x1b0 [ 230.842028][T12012] alloc_file+0x60/0x4c0 [ 230.846273][T12012] alloc_file_pseudo+0x1d4/0x260 [ 230.851211][T12012] __shmem_file_setup+0x1a2/0x280 [ 230.856217][T12012] shmem_file_setup+0x2f/0x40 [ 230.860884][T12012] __se_sys_memfd_create+0x28e/0x4b0 [ 230.866256][T12012] ? do_syscall_64+0x1d/0x1c0 [ 230.870918][T12012] __x64_sys_memfd_create+0x5b/0x70 [ 230.876104][T12012] do_syscall_64+0xf7/0x1c0 [ 230.880603][T12012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.886480][T12012] RIP: 0033:0x45a639 [ 230.890361][T12012] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.909952][T12012] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 230.918368][T12012] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a639 [ 230.926327][T12012] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 230.934283][T12012] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 230.942247][T12012] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9557cb76d4 01:01:45 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x3, 0x0) [ 230.950199][T12012] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 230.964892][T12013] CPU: 0 PID: 12013 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 230.972815][T12013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.982887][T12013] Call Trace: [ 230.982904][T12013] dump_stack+0x1fb/0x318 [ 230.982922][T12013] should_fail+0x555/0x770 [ 230.982940][T12013] __should_failslab+0x11a/0x160 [ 230.990552][T12013] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 230.990562][T12013] should_failslab+0x9/0x20 [ 230.990570][T12013] __kmalloc+0x7a/0x340 [ 230.990578][T12013] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 230.990590][T12013] tomoyo_realpath_from_path+0xdc/0x7c0 [ 230.990607][T12013] tomoyo_path_perm+0x192/0x850 [ 230.990646][T12013] tomoyo_path_truncate+0x1c/0x20 [ 230.990656][T12013] security_path_truncate+0xd5/0x150 [ 230.990670][T12013] do_sys_ftruncate+0x493/0x710 [ 231.036367][T12013] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 231.036381][T12013] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 231.036390][T12013] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 231.036400][T12013] ? do_syscall_64+0x1d/0x1c0 [ 231.036414][T12013] __x64_sys_ftruncate+0x60/0x70 [ 231.036426][T12013] do_syscall_64+0xf7/0x1c0 [ 231.036440][T12013] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.036450][T12013] RIP: 0033:0x45a607 01:01:45 executing program 2 (fault-call:3 fault-nth:6): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 231.036459][T12013] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 231.036468][T12013] RSP: 002b:00007fda2e1e7a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 231.046663][T12013] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a607 [ 231.046669][T12013] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000005 [ 231.046675][T12013] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 231.046680][T12013] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000005 [ 231.046687][T12013] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 231.057017][T12013] ERROR: Out of memory at tomoyo_realpath_from_path. 01:01:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x3, 0x0) 01:01:46 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 231.272314][T12029] FAULT_INJECTION: forcing a failure. [ 231.272314][T12029] name failslab, interval 1, probability 0, space 0, times 0 [ 231.296369][T12029] CPU: 0 PID: 12029 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 231.304305][T12029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.314365][T12029] Call Trace: [ 231.317660][T12029] dump_stack+0x1fb/0x318 [ 231.322006][T12029] should_fail+0x555/0x770 [ 231.326404][T12029] __should_failslab+0x11a/0x160 [ 231.331326][T12029] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 231.337024][T12029] should_failslab+0x9/0x20 [ 231.341509][T12029] __kmalloc+0x7a/0x340 [ 231.345645][T12029] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 231.351355][T12029] tomoyo_realpath_from_path+0xdc/0x7c0 [ 231.356884][T12029] tomoyo_path_perm+0x192/0x850 [ 231.361730][T12029] tomoyo_path_truncate+0x1c/0x20 [ 231.366730][T12029] security_path_truncate+0xd5/0x150 [ 231.371993][T12029] do_sys_ftruncate+0x493/0x710 [ 231.376823][T12029] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 231.382530][T12029] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 231.387974][T12029] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 231.393669][T12029] ? do_syscall_64+0x1d/0x1c0 [ 231.398327][T12029] __x64_sys_ftruncate+0x60/0x70 [ 231.403243][T12029] do_syscall_64+0xf7/0x1c0 [ 231.407725][T12029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.413618][T12029] RIP: 0033:0x45a607 [ 231.417508][T12029] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 231.437116][T12029] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 231.445508][T12029] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a607 [ 231.453475][T12029] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000005 [ 231.461440][T12029] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 01:01:46 executing program 3 (fault-call:3 fault-nth:7): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 231.469405][T12029] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000005 [ 231.477367][T12029] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 231.491798][T12029] ERROR: Out of memory at tomoyo_realpath_from_path. 01:01:46 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x3, 0x0) 01:01:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 231.663065][T12042] FAULT_INJECTION: forcing a failure. [ 231.663065][T12042] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 231.676332][T12042] CPU: 1 PID: 12042 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 231.684225][T12042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.694401][T12042] Call Trace: [ 231.697689][T12042] dump_stack+0x1fb/0x318 [ 231.702022][T12042] should_fail+0x555/0x770 [ 231.706555][T12042] should_fail_alloc_page+0x55/0x60 [ 231.711755][T12042] prepare_alloc_pages+0x283/0x460 [ 231.716859][T12042] __alloc_pages_nodemask+0xb2/0x5d0 [ 231.722130][T12042] kmem_getpages+0x4d/0xa00 [ 231.726611][T12042] cache_grow_begin+0x7e/0x2c0 [ 231.731442][T12042] cache_alloc_refill+0x311/0x3f0 [ 231.736555][T12042] ? check_preemption_disabled+0xb7/0x2a0 [ 231.742264][T12042] __kmalloc+0x318/0x340 [ 231.746493][T12042] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 231.752193][T12042] tomoyo_realpath_from_path+0xdc/0x7c0 [ 231.757836][T12042] tomoyo_path_perm+0x192/0x850 [ 231.762711][T12042] tomoyo_path_truncate+0x1c/0x20 [ 231.767736][T12042] security_path_truncate+0xd5/0x150 [ 231.773155][T12042] do_sys_ftruncate+0x493/0x710 [ 231.777999][T12042] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 231.783825][T12042] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 231.789371][T12042] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 231.795078][T12042] ? do_syscall_64+0x1d/0x1c0 [ 231.799886][T12042] __x64_sys_ftruncate+0x60/0x70 [ 231.804965][T12042] do_syscall_64+0xf7/0x1c0 [ 231.809471][T12042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.815360][T12042] RIP: 0033:0x45a607 [ 231.819266][T12042] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 231.839018][T12042] RSP: 002b:00007fda2e1e7a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 231.847545][T12042] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a607 [ 231.856069][T12042] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000005 [ 231.864038][T12042] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 231.872620][T12042] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000005 [ 231.880584][T12042] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:46 executing program 2 (fault-call:3 fault-nth:7): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x3, 0x0) 01:01:46 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 232.061257][T12055] FAULT_INJECTION: forcing a failure. [ 232.061257][T12055] name failslab, interval 1, probability 0, space 0, times 0 01:01:46 executing program 3 (fault-call:3 fault-nth:8): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 232.102535][T12055] CPU: 0 PID: 12055 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 232.110475][T12055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.120794][T12055] Call Trace: [ 232.124117][T12055] dump_stack+0x1fb/0x318 [ 232.128468][T12055] should_fail+0x555/0x770 [ 232.132915][T12055] __should_failslab+0x11a/0x160 [ 232.137986][T12055] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 232.143698][T12055] should_failslab+0x9/0x20 [ 232.148187][T12055] __kmalloc+0x7a/0x340 [ 232.152321][T12055] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 232.158019][T12055] tomoyo_realpath_from_path+0xdc/0x7c0 [ 232.163547][T12055] tomoyo_path_perm+0x192/0x850 [ 232.168421][T12055] tomoyo_path_truncate+0x1c/0x20 [ 232.173448][T12055] security_path_truncate+0xd5/0x150 [ 232.178712][T12055] do_sys_ftruncate+0x493/0x710 [ 232.183548][T12055] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 232.189256][T12055] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 232.194699][T12055] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 232.200406][T12055] ? do_syscall_64+0x1d/0x1c0 [ 232.205063][T12055] __x64_sys_ftruncate+0x60/0x70 [ 232.209975][T12055] do_syscall_64+0xf7/0x1c0 [ 232.214456][T12055] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.220323][T12055] RIP: 0033:0x45a607 [ 232.224194][T12055] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 232.243777][T12055] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 232.252168][T12055] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a607 [ 232.260123][T12055] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000005 [ 232.268077][T12055] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 232.276220][T12055] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000005 [ 232.284175][T12055] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 232.294328][T12055] ERROR: Out of memory at tomoyo_realpath_from_path. 01:01:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:47 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x3, 0x0) [ 232.428148][T12071] FAULT_INJECTION: forcing a failure. [ 232.428148][T12071] name failslab, interval 1, probability 0, space 0, times 0 [ 232.446807][T12071] CPU: 1 PID: 12071 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 232.454904][T12071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.464958][T12071] Call Trace: [ 232.468236][T12071] dump_stack+0x1fb/0x318 [ 232.472552][T12071] should_fail+0x555/0x770 [ 232.476950][T12071] __should_failslab+0x11a/0x160 [ 232.481889][T12071] ? tomoyo_encode2+0x273/0x5a0 [ 232.486728][T12071] should_failslab+0x9/0x20 [ 232.491208][T12071] __kmalloc+0x7a/0x340 [ 232.495398][T12071] tomoyo_encode2+0x273/0x5a0 [ 232.500155][T12071] ? dynamic_dname+0xf0/0xf0 [ 232.504727][T12071] tomoyo_realpath_from_path+0x769/0x7c0 [ 232.510363][T12071] tomoyo_path_perm+0x192/0x850 [ 232.515226][T12071] tomoyo_path_truncate+0x1c/0x20 [ 232.520228][T12071] security_path_truncate+0xd5/0x150 [ 232.525493][T12071] do_sys_ftruncate+0x493/0x710 [ 232.530325][T12071] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 232.536021][T12071] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 232.541468][T12071] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 232.547174][T12071] ? do_syscall_64+0x1d/0x1c0 [ 232.551830][T12071] __x64_sys_ftruncate+0x60/0x70 [ 232.556746][T12071] do_syscall_64+0xf7/0x1c0 [ 232.561256][T12071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.567160][T12071] RIP: 0033:0x45a607 [ 232.571069][T12071] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 232.591011][T12071] RSP: 002b:00007fda2e1e7a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 232.599425][T12071] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a607 [ 232.607375][T12071] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000005 [ 232.615323][T12071] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 232.623272][T12071] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000005 [ 232.631224][T12071] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 232.642829][T12071] ERROR: Out of memory at tomoyo_realpath_from_path. 01:01:47 executing program 2 (fault-call:3 fault-nth:8): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x3, 0x0) 01:01:47 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:47 executing program 3 (fault-call:3 fault-nth:9): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 232.885228][T12086] FAULT_INJECTION: forcing a failure. [ 232.885228][T12086] name failslab, interval 1, probability 0, space 0, times 0 [ 232.927684][T12086] CPU: 1 PID: 12086 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 232.935610][T12086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.945674][T12086] Call Trace: [ 232.945693][T12086] dump_stack+0x1fb/0x318 [ 232.945709][T12086] should_fail+0x555/0x770 [ 232.945725][T12086] __should_failslab+0x11a/0x160 [ 232.945738][T12086] ? tomoyo_encode2+0x273/0x5a0 [ 232.945747][T12086] should_failslab+0x9/0x20 [ 232.945755][T12086] __kmalloc+0x7a/0x340 [ 232.945767][T12086] tomoyo_encode2+0x273/0x5a0 [ 232.945780][T12086] ? dynamic_dname+0xf0/0xf0 [ 232.945791][T12086] tomoyo_realpath_from_path+0x769/0x7c0 [ 232.945806][T12086] tomoyo_path_perm+0x192/0x850 [ 232.945838][T12086] tomoyo_path_truncate+0x1c/0x20 [ 233.001082][T12086] security_path_truncate+0xd5/0x150 [ 233.006377][T12086] do_sys_ftruncate+0x493/0x710 [ 233.011237][T12086] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 233.016964][T12086] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 233.022426][T12086] ? trace_irq_disable_rcuidle+0x23/0x1e0 01:01:47 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x3, 0x0) [ 233.028154][T12086] ? do_syscall_64+0x1d/0x1c0 [ 233.032831][T12086] __x64_sys_ftruncate+0x60/0x70 [ 233.037772][T12086] do_syscall_64+0xf7/0x1c0 [ 233.042262][T12086] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.048134][T12086] RIP: 0033:0x45a607 [ 233.052010][T12086] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 233.071601][T12086] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 233.080076][T12086] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a607 [ 233.088022][T12086] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000005 [ 233.095968][T12086] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 233.103937][T12086] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000005 [ 233.111969][T12086] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 233.120745][T12086] ERROR: Out of memory at tomoyo_realpath_from_path. 01:01:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x3, 0x0) 01:01:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 233.249743][T12104] FAULT_INJECTION: forcing a failure. [ 233.249743][T12104] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 233.269273][T12104] CPU: 1 PID: 12104 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 233.277208][T12104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.287270][T12104] Call Trace: [ 233.290644][T12104] dump_stack+0x1fb/0x318 [ 233.295006][T12104] should_fail+0x555/0x770 [ 233.299420][T12104] should_fail_alloc_page+0x55/0x60 [ 233.304609][T12104] prepare_alloc_pages+0x283/0x460 [ 233.309711][T12104] __alloc_pages_nodemask+0xb2/0x5d0 [ 233.314986][T12104] alloc_pages_vma+0x4f7/0xd50 [ 233.321475][T12104] shmem_alloc_and_acct_page+0x425/0xbb0 [ 233.327096][T12104] shmem_getpage_gfp+0x2313/0x2a90 [ 233.332197][T12104] shmem_write_begin+0xcb/0x1b0 [ 233.337025][T12104] generic_perform_write+0x25d/0x4e0 [ 233.343250][T12104] __generic_file_write_iter+0x235/0x500 [ 233.348907][T12104] generic_file_write_iter+0x48e/0x630 [ 233.354372][T12104] __vfs_write+0x5a1/0x740 [ 233.358799][T12104] vfs_write+0x275/0x590 [ 233.363035][T12104] __x64_sys_pwrite64+0x162/0x1d0 [ 233.368061][T12104] do_syscall_64+0xf7/0x1c0 [ 233.372553][T12104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.378436][T12104] RIP: 0033:0x414437 [ 233.382321][T12104] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 233.401907][T12104] RSP: 002b:00007fda2e1e7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 233.410390][T12104] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000414437 [ 233.418368][T12104] RDX: 0000000000000048 RSI: 00000000200002c0 RDI: 0000000000000005 [ 233.426447][T12104] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 233.434403][T12104] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 233.442465][T12104] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:48 executing program 2 (fault-call:3 fault-nth:9): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:48 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x3, 0x0) 01:01:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:48 executing program 3 (fault-call:3 fault-nth:10): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 233.654533][T12121] FAULT_INJECTION: forcing a failure. [ 233.654533][T12121] name failslab, interval 1, probability 0, space 0, times 0 [ 233.667439][T12121] CPU: 0 PID: 12121 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 233.675422][T12121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.685683][T12121] Call Trace: [ 233.689179][T12121] dump_stack+0x1fb/0x318 [ 233.693600][T12121] should_fail+0x555/0x770 [ 233.698011][T12121] __should_failslab+0x11a/0x160 [ 233.702936][T12121] ? xas_create+0x1197/0x1910 [ 233.707940][T12121] should_failslab+0x9/0x20 [ 233.712421][T12121] kmem_cache_alloc+0x56/0x2e0 [ 233.717369][T12121] xas_create+0x1197/0x1910 [ 233.721861][T12121] xas_create_range+0x142/0x700 [ 233.726730][T12121] shmem_add_to_page_cache+0x91e/0x1290 [ 233.732277][T12121] shmem_getpage_gfp+0x121e/0x2a90 [ 233.737379][T12121] shmem_write_begin+0xcb/0x1b0 [ 233.742642][T12121] generic_perform_write+0x25d/0x4e0 [ 233.747907][T12121] __generic_file_write_iter+0x235/0x500 [ 233.753533][T12121] generic_file_write_iter+0x48e/0x630 [ 233.758987][T12121] __vfs_write+0x5a1/0x740 [ 233.763411][T12121] vfs_write+0x275/0x590 [ 233.767646][T12121] __x64_sys_pwrite64+0x162/0x1d0 [ 233.772658][T12121] do_syscall_64+0xf7/0x1c0 [ 233.777142][T12121] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.783011][T12121] RIP: 0033:0x414437 [ 233.786905][T12121] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 233.806498][T12121] RSP: 002b:00007f9557cb6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 233.814907][T12121] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000414437 [ 233.822958][T12121] RDX: 0000000000000048 RSI: 00000000200002c0 RDI: 0000000000000005 [ 233.830908][T12121] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 233.838871][T12121] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 233.847956][T12121] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 233.939986][T12133] FAULT_INJECTION: forcing a failure. [ 233.939986][T12133] name failslab, interval 1, probability 0, space 0, times 0 [ 233.965180][T12133] CPU: 0 PID: 12133 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 233.973113][T12133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.983181][T12133] Call Trace: 01:01:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x3, 0x0) 01:01:48 executing program 2 (fault-call:3 fault-nth:10): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 233.986486][T12133] dump_stack+0x1fb/0x318 [ 233.990831][T12133] should_fail+0x555/0x770 [ 233.995258][T12133] __should_failslab+0x11a/0x160 [ 234.000205][T12133] ? getname_flags+0xba/0x640 [ 234.004886][T12133] should_failslab+0x9/0x20 [ 234.009391][T12133] kmem_cache_alloc+0x56/0x2e0 [ 234.014167][T12133] ? check_preemption_disabled+0xb7/0x2a0 [ 234.019896][T12133] getname_flags+0xba/0x640 [ 234.024418][T12133] getname+0x19/0x20 [ 234.028303][T12133] do_sys_open+0x261/0x560 [ 234.032736][T12133] __x64_sys_open+0x87/0x90 [ 234.037225][T12133] do_syscall_64+0xf7/0x1c0 [ 234.041734][T12133] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.047617][T12133] RIP: 0033:0x4143d1 [ 234.051491][T12133] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 234.071085][T12133] RSP: 002b:00007fda2e1e7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 234.079478][T12133] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 234.087436][T12133] RDX: 00007fda2e1e7b0a RSI: 0000000000000002 RDI: 00007fda2e1e7b00 [ 234.095390][T12133] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 234.103343][T12133] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 234.111297][T12133] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:48 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x3, 0x0) 01:01:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:49 executing program 3 (fault-call:3 fault-nth:11): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 234.226464][T12143] FAULT_INJECTION: forcing a failure. [ 234.226464][T12143] name failslab, interval 1, probability 0, space 0, times 0 [ 234.245113][T12143] CPU: 1 PID: 12143 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 234.253047][T12143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.263125][T12143] Call Trace: [ 234.266422][T12143] dump_stack+0x1fb/0x318 [ 234.270907][T12143] should_fail+0x555/0x770 [ 234.275325][T12143] __should_failslab+0x11a/0x160 [ 234.280257][T12143] ? getname_flags+0xba/0x640 [ 234.285008][T12143] should_failslab+0x9/0x20 [ 234.289499][T12143] kmem_cache_alloc+0x56/0x2e0 [ 234.294242][T12143] ? check_preemption_disabled+0xb7/0x2a0 [ 234.300212][T12143] getname_flags+0xba/0x640 [ 234.304703][T12143] getname+0x19/0x20 [ 234.308576][T12143] do_sys_open+0x261/0x560 [ 234.312984][T12143] __x64_sys_open+0x87/0x90 [ 234.317497][T12143] do_syscall_64+0xf7/0x1c0 [ 234.321997][T12143] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.327874][T12143] RIP: 0033:0x4143d1 [ 234.331743][T12143] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 234.351330][T12143] RSP: 002b:00007f9557cb6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 234.359738][T12143] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 234.367710][T12143] RDX: 00007f9557cb6b0a RSI: 0000000000000002 RDI: 00007f9557cb6b00 01:01:49 executing program 2 (fault-call:3 fault-nth:11): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 234.375659][T12143] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 234.383612][T12143] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 234.391567][T12143] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x3, 0x0) 01:01:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 234.529571][T12156] FAULT_INJECTION: forcing a failure. [ 234.529571][T12156] name failslab, interval 1, probability 0, space 0, times 0 [ 234.556237][T12156] CPU: 1 PID: 12156 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 234.563055][T12158] FAULT_INJECTION: forcing a failure. [ 234.563055][T12158] name failslab, interval 1, probability 0, space 0, times 0 [ 234.564254][T12156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.564260][T12156] Call Trace: [ 234.564277][T12156] dump_stack+0x1fb/0x318 [ 234.564301][T12156] should_fail+0x555/0x770 [ 234.599212][T12156] __should_failslab+0x11a/0x160 [ 234.604153][T12156] ? getname_flags+0xba/0x640 [ 234.608821][T12156] should_failslab+0x9/0x20 [ 234.613309][T12156] kmem_cache_alloc+0x56/0x2e0 [ 234.618060][T12156] ? check_preemption_disabled+0xb7/0x2a0 [ 234.623881][T12156] getname_flags+0xba/0x640 [ 234.628372][T12156] getname+0x19/0x20 [ 234.632250][T12156] do_sys_open+0x261/0x560 [ 234.636664][T12156] __x64_sys_open+0x87/0x90 [ 234.641316][T12156] do_syscall_64+0xf7/0x1c0 [ 234.645817][T12156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.651713][T12156] RIP: 0033:0x4143d1 [ 234.655605][T12156] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 234.675200][T12156] RSP: 002b:00007fda2e1e7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 234.683598][T12156] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 234.691553][T12156] RDX: 00007fda2e1e7b0a RSI: 0000000000000002 RDI: 00007fda2e1e7b00 [ 234.699650][T12156] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 234.707615][T12156] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 234.715576][T12156] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:49 executing program 3 (fault-call:3 fault-nth:12): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 234.723547][T12158] CPU: 0 PID: 12158 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 234.731446][T12158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.741512][T12158] Call Trace: [ 234.744815][T12158] dump_stack+0x1fb/0x318 [ 234.749159][T12158] should_fail+0x555/0x770 [ 234.753588][T12158] __should_failslab+0x11a/0x160 [ 234.758541][T12158] ? __alloc_file+0x2c/0x390 [ 234.763114][T12158] should_failslab+0x9/0x20 [ 234.768444][T12158] kmem_cache_alloc+0x56/0x2e0 [ 234.773196][T12158] __alloc_file+0x2c/0x390 [ 234.777601][T12158] alloc_empty_file+0xac/0x1b0 [ 234.782348][T12158] path_openat+0x9e/0x4420 [ 234.787267][T12158] ? __kasan_kmalloc+0x178/0x1b0 [ 234.792185][T12158] ? __lock_acquire+0xc75/0x1be0 [ 234.797106][T12158] ? cache_alloc_refill+0x3b1/0x3f0 [ 234.802305][T12158] do_filp_open+0x192/0x3d0 [ 234.806792][T12158] ? _raw_spin_unlock+0x2c/0x50 [ 234.811629][T12158] do_sys_open+0x29f/0x560 [ 234.816025][T12158] __x64_sys_open+0x87/0x90 [ 234.820508][T12158] do_syscall_64+0xf7/0x1c0 [ 234.825007][T12158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.830878][T12158] RIP: 0033:0x4143d1 [ 234.834751][T12158] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 234.854347][T12158] RSP: 002b:00007f9557cb6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 234.862745][T12158] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 234.870702][T12158] RDX: 00007f9557cb6b0a RSI: 0000000000000002 RDI: 00007f9557cb6b00 [ 234.878662][T12158] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 234.886626][T12158] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 234.894596][T12158] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:49 executing program 2 (fault-call:3 fault-nth:12): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 234.959655][T12162] FAULT_INJECTION: forcing a failure. [ 234.959655][T12162] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 234.972909][T12162] CPU: 0 PID: 12162 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 234.980801][T12162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.990853][T12162] Call Trace: [ 234.990872][T12162] dump_stack+0x1fb/0x318 [ 234.990889][T12162] should_fail+0x555/0x770 [ 234.990906][T12162] should_fail_alloc_page+0x55/0x60 01:01:49 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x3, 0x0) [ 234.990914][T12162] prepare_alloc_pages+0x283/0x460 [ 234.990931][T12162] __alloc_pages_nodemask+0xb2/0x5d0 [ 235.003051][T12162] ? __kasan_check_write+0x14/0x20 [ 235.003069][T12162] kmem_getpages+0x4d/0xa00 [ 235.003082][T12162] cache_grow_begin+0x7e/0x2c0 [ 235.003097][T12162] cache_alloc_refill+0x311/0x3f0 [ 235.003107][T12162] ? check_preemption_disabled+0xb7/0x2a0 [ 235.003122][T12162] kmem_cache_alloc+0x2b9/0x2e0 [ 235.003131][T12162] ? getname_flags+0xba/0x640 [ 235.003145][T12162] getname_flags+0xba/0x640 [ 235.003159][T12162] getname+0x19/0x20 [ 235.003172][T12162] do_sys_open+0x261/0x560 [ 235.013479][T12162] __x64_sys_open+0x87/0x90 [ 235.013495][T12162] do_syscall_64+0xf7/0x1c0 [ 235.013510][T12162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.013519][T12162] RIP: 0033:0x4143d1 [ 235.013528][T12162] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 235.013534][T12162] RSP: 002b:00007fda2e1e7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 235.013544][T12162] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 235.013549][T12162] RDX: 00007fda2e1e7b0a RSI: 0000000000000002 RDI: 00007fda2e1e7b00 [ 235.013555][T12162] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 235.013561][T12162] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 235.013566][T12162] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x3, 0x0) [ 235.288727][T12180] FAULT_INJECTION: forcing a failure. [ 235.288727][T12180] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 235.301976][T12180] CPU: 1 PID: 12180 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 235.309868][T12180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.319940][T12180] Call Trace: [ 235.323244][T12180] dump_stack+0x1fb/0x318 [ 235.327588][T12180] should_fail+0x555/0x770 [ 235.332194][T12180] should_fail_alloc_page+0x55/0x60 [ 235.337391][T12180] prepare_alloc_pages+0x283/0x460 [ 235.342669][T12180] __alloc_pages_nodemask+0xb2/0x5d0 [ 235.347951][T12180] ? __kasan_check_write+0x14/0x20 [ 235.353070][T12180] kmem_getpages+0x4d/0xa00 [ 235.358016][T12180] cache_grow_begin+0x7e/0x2c0 [ 235.362778][T12180] cache_alloc_refill+0x311/0x3f0 [ 235.367958][T12180] ? check_preemption_disabled+0xb7/0x2a0 [ 235.373692][T12180] kmem_cache_alloc+0x2b9/0x2e0 [ 235.378543][T12180] ? getname_flags+0xba/0x640 [ 235.383302][T12180] getname_flags+0xba/0x640 [ 235.387803][T12180] getname+0x19/0x20 [ 235.391691][T12180] do_sys_open+0x261/0x560 [ 235.396089][T12180] __x64_sys_open+0x87/0x90 [ 235.400583][T12180] do_syscall_64+0xf7/0x1c0 [ 235.405091][T12180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.410985][T12180] RIP: 0033:0x4143d1 [ 235.414856][T12180] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 235.434446][T12180] RSP: 002b:00007f9557cb6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 235.442850][T12180] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 235.450819][T12180] RDX: 00007f9557cb6b0a RSI: 0000000000000002 RDI: 00007f9557cb6b00 [ 235.458788][T12180] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 235.466905][T12180] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 235.474976][T12180] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:50 executing program 3 (fault-call:3 fault-nth:13): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:50 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x3, 0x0) 01:01:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 235.652850][T12194] FAULT_INJECTION: forcing a failure. [ 235.652850][T12194] name failslab, interval 1, probability 0, space 0, times 0 01:01:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x3, 0x0) [ 235.705874][T12194] CPU: 1 PID: 12194 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 235.713959][T12194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.724127][T12194] Call Trace: [ 235.727422][T12194] dump_stack+0x1fb/0x318 [ 235.731849][T12194] should_fail+0x555/0x770 [ 235.736263][T12194] __should_failslab+0x11a/0x160 [ 235.741193][T12194] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 235.746911][T12194] should_failslab+0x9/0x20 [ 235.751420][T12194] __kmalloc+0x7a/0x340 [ 235.755570][T12194] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 235.761279][T12194] tomoyo_realpath_from_path+0xdc/0x7c0 [ 235.766835][T12194] tomoyo_check_open_permission+0x1ce/0x9d0 [ 235.772770][T12194] tomoyo_file_open+0x141/0x190 [ 235.777612][T12194] security_file_open+0x65/0x2f0 [ 235.782535][T12194] do_dentry_open+0x351/0x10c0 [ 235.787301][T12194] vfs_open+0x73/0x80 [ 235.791277][T12194] path_openat+0x1397/0x4420 [ 235.795872][T12194] do_filp_open+0x192/0x3d0 [ 235.800369][T12194] do_sys_open+0x29f/0x560 [ 235.804771][T12194] __x64_sys_open+0x87/0x90 [ 235.809254][T12194] do_syscall_64+0xf7/0x1c0 [ 235.813737][T12194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.819704][T12194] RIP: 0033:0x4143d1 [ 235.823634][T12194] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 235.843228][T12194] RSP: 002b:00007fda2e1e7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 235.851625][T12194] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 235.859580][T12194] RDX: 00007fda2e1e7b0a RSI: 0000000000000002 RDI: 00007fda2e1e7b00 [ 235.867541][T12194] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 235.875505][T12194] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 235.883487][T12194] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 235.892127][T12194] ERROR: Out of memory at tomoyo_realpath_from_path. 01:01:50 executing program 2 (fault-call:3 fault-nth:13): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:50 executing program 3 (fault-call:3 fault-nth:14): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 236.155266][T12214] FAULT_INJECTION: forcing a failure. [ 236.155266][T12214] name failslab, interval 1, probability 0, space 0, times 0 [ 236.168441][T12214] CPU: 0 PID: 12214 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 236.176337][T12214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.176349][T12214] Call Trace: [ 236.176368][T12214] dump_stack+0x1fb/0x318 [ 236.176384][T12214] should_fail+0x555/0x770 [ 236.176401][T12214] __should_failslab+0x11a/0x160 [ 236.176416][T12214] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 236.189765][T12214] should_failslab+0x9/0x20 [ 236.189775][T12214] __kmalloc+0x7a/0x340 [ 236.189786][T12214] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 236.189800][T12214] tomoyo_realpath_from_path+0xdc/0x7c0 [ 236.189820][T12214] tomoyo_check_open_permission+0x1ce/0x9d0 [ 236.189855][T12214] tomoyo_file_open+0x141/0x190 [ 236.240270][T12214] security_file_open+0x65/0x2f0 [ 236.245205][T12214] do_dentry_open+0x351/0x10c0 [ 236.249985][T12214] vfs_open+0x73/0x80 [ 236.253972][T12214] path_openat+0x1397/0x4420 [ 236.258607][T12214] do_filp_open+0x192/0x3d0 [ 236.263138][T12214] do_sys_open+0x29f/0x560 [ 236.267567][T12214] __x64_sys_open+0x87/0x90 [ 236.272086][T12214] do_syscall_64+0xf7/0x1c0 [ 236.276600][T12214] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.282489][T12214] RIP: 0033:0x4143d1 [ 236.286383][T12214] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 236.305989][T12214] RSP: 002b:00007f9557cb6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 236.306001][T12214] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 236.306006][T12214] RDX: 00007f9557cb6b0a RSI: 0000000000000002 RDI: 00007f9557cb6b00 [ 236.306011][T12214] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 236.306016][T12214] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 236.306022][T12214] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:51 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x3, 0x0) [ 236.325942][T12214] ERROR: Out of memory at tomoyo_realpath_from_path. [ 236.382250][T12220] FAULT_INJECTION: forcing a failure. [ 236.382250][T12220] name failslab, interval 1, probability 0, space 0, times 0 [ 236.395405][T12220] CPU: 0 PID: 12220 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 236.403319][T12220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.403324][T12220] Call Trace: [ 236.403344][T12220] dump_stack+0x1fb/0x318 [ 236.403360][T12220] should_fail+0x555/0x770 [ 236.403380][T12220] __should_failslab+0x11a/0x160 [ 236.430378][T12220] ? security_file_alloc+0x36/0x200 [ 236.435594][T12220] should_failslab+0x9/0x20 [ 236.440112][T12220] kmem_cache_alloc+0x56/0x2e0 [ 236.444888][T12220] security_file_alloc+0x36/0x200 [ 236.449930][T12220] __alloc_file+0xde/0x390 [ 236.454351][T12220] alloc_empty_file+0xac/0x1b0 [ 236.454365][T12220] path_openat+0x9e/0x4420 [ 236.454378][T12220] ? __kasan_kmalloc+0x178/0x1b0 [ 236.454394][T12220] ? __lock_acquire+0xc75/0x1be0 [ 236.463554][T12220] ? rcu_read_lock_sched_held+0x10b/0x170 01:01:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x3, 0x0) 01:01:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:51 executing program 3 (fault-call:3 fault-nth:15): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 236.463594][T12220] do_filp_open+0x192/0x3d0 [ 236.463609][T12220] ? _raw_spin_unlock+0x2c/0x50 [ 236.463632][T12220] do_sys_open+0x29f/0x560 [ 236.463646][T12220] __x64_sys_open+0x87/0x90 [ 236.463657][T12220] do_syscall_64+0xf7/0x1c0 [ 236.463670][T12220] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.463680][T12220] RIP: 0033:0x4143d1 [ 236.463693][T12220] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 236.463698][T12220] RSP: 002b:00007fda2e1e7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 236.463707][T12220] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 236.463717][T12220] RDX: 00007fda2e1e7b0a RSI: 0000000000000002 RDI: 00007fda2e1e7b00 [ 236.493191][T12220] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 236.493198][T12220] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 236.493204][T12220] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x3, 0x0) [ 236.674943][T12238] FAULT_INJECTION: forcing a failure. [ 236.674943][T12238] name failslab, interval 1, probability 0, space 0, times 0 01:01:51 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x3, 0x0) 01:01:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 236.745877][T12238] CPU: 1 PID: 12238 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 236.753829][T12238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.763992][T12238] Call Trace: [ 236.767439][T12238] dump_stack+0x1fb/0x318 [ 236.771789][T12238] should_fail+0x555/0x770 [ 236.776340][T12238] __should_failslab+0x11a/0x160 [ 236.781267][T12238] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 236.786984][T12238] should_failslab+0x9/0x20 [ 236.791609][T12238] __kmalloc+0x7a/0x340 [ 236.795867][T12238] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 236.801606][T12238] tomoyo_realpath_from_path+0xdc/0x7c0 [ 236.807142][T12238] tomoyo_check_open_permission+0x1ce/0x9d0 [ 236.813060][T12238] tomoyo_file_open+0x141/0x190 [ 236.817904][T12238] security_file_open+0x65/0x2f0 [ 236.822850][T12238] do_dentry_open+0x351/0x10c0 [ 236.827619][T12238] vfs_open+0x73/0x80 [ 236.831604][T12238] path_openat+0x1397/0x4420 [ 236.836198][T12238] do_filp_open+0x192/0x3d0 [ 236.840714][T12238] do_sys_open+0x29f/0x560 [ 236.845124][T12238] __x64_sys_open+0x87/0x90 [ 236.849613][T12238] do_syscall_64+0xf7/0x1c0 [ 236.854107][T12238] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.859993][T12238] RIP: 0033:0x4143d1 [ 236.864057][T12238] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 236.883904][T12238] RSP: 002b:00007fda2e1e7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 236.892303][T12238] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 236.900399][T12238] RDX: 00007fda2e1e7b0a RSI: 0000000000000002 RDI: 00007fda2e1e7b00 [ 236.908600][T12238] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 236.916681][T12238] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 236.924665][T12238] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 236.934151][T12238] ERROR: Out of memory at tomoyo_realpath_from_path. 01:01:51 executing program 2 (fault-call:3 fault-nth:14): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 237.107366][T12257] FAULT_INJECTION: forcing a failure. [ 237.107366][T12257] name failslab, interval 1, probability 0, space 0, times 0 [ 237.127952][T12257] CPU: 0 PID: 12257 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 237.135876][T12257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.135882][T12257] Call Trace: [ 237.135900][T12257] dump_stack+0x1fb/0x318 [ 237.135919][T12257] should_fail+0x555/0x770 [ 237.135936][T12257] __should_failslab+0x11a/0x160 [ 237.135948][T12257] ? security_file_alloc+0x36/0x200 [ 237.135959][T12257] should_failslab+0x9/0x20 [ 237.135967][T12257] kmem_cache_alloc+0x56/0x2e0 [ 237.135982][T12257] security_file_alloc+0x36/0x200 [ 237.135995][T12257] __alloc_file+0xde/0x390 [ 237.136009][T12257] alloc_empty_file+0xac/0x1b0 [ 237.178337][T12257] path_openat+0x9e/0x4420 [ 237.178352][T12257] ? __kasan_kmalloc+0x178/0x1b0 [ 237.178369][T12257] ? __lock_acquire+0xc75/0x1be0 [ 237.178380][T12257] ? rcu_read_lock_sched_held+0x10b/0x170 [ 237.178417][T12257] do_filp_open+0x192/0x3d0 [ 237.178431][T12257] ? _raw_spin_unlock+0x2c/0x50 [ 237.178454][T12257] do_sys_open+0x29f/0x560 [ 237.187992][T12257] __x64_sys_open+0x87/0x90 [ 237.188006][T12257] do_syscall_64+0xf7/0x1c0 [ 237.188020][T12257] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.188030][T12257] RIP: 0033:0x4143d1 [ 237.188040][T12257] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 237.188045][T12257] RSP: 002b:00007f9557cb6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 237.188054][T12257] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 237.188059][T12257] RDX: 00007f9557cb6b0a RSI: 0000000000000002 RDI: 00007f9557cb6b00 [ 237.188064][T12257] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 01:01:52 executing program 2 (fault-call:3 fault-nth:15): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:52 executing program 3 (fault-call:3 fault-nth:16): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 237.188069][T12257] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 237.188074][T12257] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:52 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x3, 0x0) 01:01:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x3, 0x0) 01:01:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 237.476983][T12268] FAULT_INJECTION: forcing a failure. [ 237.476983][T12268] name failslab, interval 1, probability 0, space 0, times 0 [ 237.486808][T12269] FAULT_INJECTION: forcing a failure. [ 237.486808][T12269] name failslab, interval 1, probability 0, space 0, times 0 [ 237.514614][T12269] CPU: 1 PID: 12269 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 237.522571][T12269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.532633][T12269] Call Trace: [ 237.535932][T12269] dump_stack+0x1fb/0x318 [ 237.540278][T12269] should_fail+0x555/0x770 [ 237.544725][T12269] __should_failslab+0x11a/0x160 [ 237.549760][T12269] ? tomoyo_encode2+0x273/0x5a0 [ 237.554698][T12269] should_failslab+0x9/0x20 [ 237.559211][T12269] __kmalloc+0x7a/0x340 [ 237.563373][T12269] tomoyo_encode2+0x273/0x5a0 [ 237.568052][T12269] tomoyo_realpath_from_path+0x769/0x7c0 [ 237.573682][T12269] tomoyo_check_open_permission+0x1ce/0x9d0 [ 237.579594][T12269] tomoyo_file_open+0x141/0x190 [ 237.584440][T12269] security_file_open+0x65/0x2f0 [ 237.589389][T12269] do_dentry_open+0x351/0x10c0 [ 237.594158][T12269] vfs_open+0x73/0x80 [ 237.598133][T12269] path_openat+0x1397/0x4420 [ 237.602761][T12269] do_filp_open+0x192/0x3d0 [ 237.607281][T12269] do_sys_open+0x29f/0x560 [ 237.611711][T12269] __x64_sys_open+0x87/0x90 [ 237.616228][T12269] do_syscall_64+0xf7/0x1c0 [ 237.620726][T12269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.626610][T12269] RIP: 0033:0x4143d1 [ 237.630495][T12269] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 237.653399][T12269] RSP: 002b:00007fda2e1e7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 237.663223][T12269] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 237.671192][T12269] RDX: 00007fda2e1e7b0a RSI: 0000000000000002 RDI: 00007fda2e1e7b00 [ 237.679515][T12269] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 237.687617][T12269] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 237.695844][T12269] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 237.705756][T12268] CPU: 1 PID: 12268 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 237.713667][T12268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.723809][T12268] Call Trace: [ 237.727114][T12268] dump_stack+0x1fb/0x318 [ 237.731452][T12268] should_fail+0x555/0x770 [ 237.735889][T12268] __should_failslab+0x11a/0x160 [ 237.740838][T12268] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 237.746268][T12269] ERROR: Out of memory at tomoyo_realpath_from_path. [ 237.746689][T12268] should_failslab+0x9/0x20 [ 237.758026][T12268] __kmalloc+0x7a/0x340 [ 237.758039][T12268] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 237.758053][T12268] tomoyo_realpath_from_path+0xdc/0x7c0 [ 237.758071][T12268] tomoyo_check_open_permission+0x1ce/0x9d0 [ 237.758106][T12268] tomoyo_file_open+0x141/0x190 [ 237.758118][T12268] security_file_open+0x65/0x2f0 [ 237.758132][T12268] do_dentry_open+0x351/0x10c0 [ 237.758154][T12268] vfs_open+0x73/0x80 [ 237.758165][T12268] path_openat+0x1397/0x4420 [ 237.758210][T12268] do_filp_open+0x192/0x3d0 [ 237.768069][T12268] do_sys_open+0x29f/0x560 [ 237.768085][T12268] __x64_sys_open+0x87/0x90 [ 237.768100][T12268] do_syscall_64+0xf7/0x1c0 [ 237.768114][T12268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.768123][T12268] RIP: 0033:0x4143d1 [ 237.768132][T12268] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 237.768136][T12268] RSP: 002b:00007f9557cb6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 237.768144][T12268] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 237.768150][T12268] RDX: 00007f9557cb6b0a RSI: 0000000000000002 RDI: 00007f9557cb6b00 [ 237.768155][T12268] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 237.768160][T12268] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 237.768165][T12268] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 237.801081][T12268] ERROR: Out of memory at tomoyo_realpath_from_path. 01:01:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:52 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x3, 0x0) 01:01:52 executing program 3 (fault-call:3 fault-nth:17): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x3, 0x0) 01:01:53 executing program 2 (fault-call:3 fault-nth:16): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 238.203615][T12298] FAULT_INJECTION: forcing a failure. [ 238.203615][T12298] name failslab, interval 1, probability 0, space 0, times 0 [ 238.240422][T12298] CPU: 0 PID: 12298 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 238.248355][T12298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.258470][T12298] Call Trace: [ 238.258493][T12298] dump_stack+0x1fb/0x318 [ 238.258511][T12298] should_fail+0x555/0x770 [ 238.258529][T12298] __should_failslab+0x11a/0x160 [ 238.258542][T12298] ? tomoyo_encode2+0x273/0x5a0 [ 238.258555][T12298] should_failslab+0x9/0x20 [ 238.266148][T12298] __kmalloc+0x7a/0x340 [ 238.266187][T12298] tomoyo_encode2+0x273/0x5a0 [ 238.266205][T12298] tomoyo_realpath_from_path+0x769/0x7c0 [ 238.266224][T12298] tomoyo_check_open_permission+0x1ce/0x9d0 [ 238.266262][T12298] tomoyo_file_open+0x141/0x190 [ 238.289075][T12298] security_file_open+0x65/0x2f0 [ 238.299449][T12298] do_dentry_open+0x351/0x10c0 [ 238.299469][T12298] vfs_open+0x73/0x80 [ 238.299481][T12298] path_openat+0x1397/0x4420 [ 238.299528][T12298] do_filp_open+0x192/0x3d0 [ 238.319986][T12298] do_sys_open+0x29f/0x560 [ 238.320005][T12298] __x64_sys_open+0x87/0x90 [ 238.320019][T12298] do_syscall_64+0xf7/0x1c0 [ 238.320033][T12298] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.320041][T12298] RIP: 0033:0x4143d1 [ 238.320051][T12298] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 238.320056][T12298] RSP: 002b:00007fda2e1e7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 238.320065][T12298] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 238.320071][T12298] RDX: 00007fda2e1e7b0a RSI: 0000000000000002 RDI: 00007fda2e1e7b00 [ 238.320076][T12298] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 238.320081][T12298] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 238.320086][T12298] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 238.335492][T12298] ERROR: Out of memory at tomoyo_realpath_from_path. 01:01:53 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x3, 0x0) [ 238.450453][T12305] FAULT_INJECTION: forcing a failure. [ 238.450453][T12305] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 238.463683][T12305] CPU: 1 PID: 12305 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 238.471573][T12305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.481632][T12305] Call Trace: [ 238.484923][T12305] dump_stack+0x1fb/0x318 [ 238.489255][T12305] should_fail+0x555/0x770 [ 238.493687][T12305] should_fail_alloc_page+0x55/0x60 [ 238.498893][T12305] prepare_alloc_pages+0x283/0x460 [ 238.504058][T12305] __alloc_pages_nodemask+0xb2/0x5d0 [ 238.504091][T12305] kmem_getpages+0x4d/0xa00 [ 238.513850][T12305] cache_grow_begin+0x7e/0x2c0 [ 238.513866][T12305] cache_alloc_refill+0x311/0x3f0 [ 238.513877][T12305] ? check_preemption_disabled+0xb7/0x2a0 [ 238.513892][T12305] __kmalloc+0x318/0x340 [ 238.513903][T12305] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 238.513915][T12305] tomoyo_realpath_from_path+0xdc/0x7c0 [ 238.513932][T12305] tomoyo_check_open_permission+0x1ce/0x9d0 [ 238.529602][T12305] tomoyo_file_open+0x141/0x190 [ 238.529616][T12305] security_file_open+0x65/0x2f0 [ 238.529631][T12305] do_dentry_open+0x351/0x10c0 [ 238.529652][T12305] vfs_open+0x73/0x80 [ 238.529665][T12305] path_openat+0x1397/0x4420 [ 238.539626][T12305] do_filp_open+0x192/0x3d0 [ 238.539658][T12305] do_sys_open+0x29f/0x560 [ 238.539673][T12305] __x64_sys_open+0x87/0x90 [ 238.539686][T12305] do_syscall_64+0xf7/0x1c0 [ 238.539700][T12305] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.539709][T12305] RIP: 0033:0x4143d1 [ 238.539718][T12305] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 238.539723][T12305] RSP: 002b:00007f9557cb6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 238.539731][T12305] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 238.539737][T12305] RDX: 00007f9557cb6b0a RSI: 0000000000000002 RDI: 00007f9557cb6b00 [ 238.539742][T12305] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 238.539748][T12305] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 238.539754][T12305] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:53 executing program 3 (fault-call:3 fault-nth:18): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:53 executing program 2 (fault-call:3 fault-nth:17): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 239.014891][T12330] FAULT_INJECTION: forcing a failure. [ 239.014891][T12330] name failslab, interval 1, probability 0, space 0, times 0 [ 239.047701][T12330] CPU: 0 PID: 12330 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 239.055632][T12330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.065691][T12330] Call Trace: [ 239.068991][T12330] dump_stack+0x1fb/0x318 [ 239.073334][T12330] should_fail+0x555/0x770 [ 239.077797][T12330] __should_failslab+0x11a/0x160 [ 239.082749][T12330] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 239.088470][T12330] should_failslab+0x9/0x20 [ 239.088481][T12330] __kmalloc+0x7a/0x340 [ 239.088492][T12330] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 239.088505][T12330] tomoyo_realpath_from_path+0xdc/0x7c0 [ 239.104506][T12330] tomoyo_path_number_perm+0x166/0x640 01:01:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x3, 0x0) [ 239.104546][T12330] ? smack_file_ioctl+0x226/0x2e0 [ 239.104561][T12330] ? __fget+0x431/0x510 [ 239.124701][T12330] tomoyo_file_ioctl+0x23/0x30 [ 239.129472][T12330] security_file_ioctl+0x6d/0xd0 [ 239.134408][T12330] __x64_sys_ioctl+0xa3/0x120 [ 239.139094][T12330] do_syscall_64+0xf7/0x1c0 [ 239.143607][T12330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.149491][T12330] RIP: 0033:0x45a4a7 01:01:53 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x3, 0x0) [ 239.149502][T12330] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 239.149507][T12330] RSP: 002b:00007fda2e1e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 239.149518][T12330] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 239.149524][T12330] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 239.149530][T12330] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 239.149536][T12330] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 01:01:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 239.149542][T12330] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 239.190187][T12330] ERROR: Out of memory at tomoyo_realpath_from_path. [ 239.247062][T12334] FAULT_INJECTION: forcing a failure. [ 239.247062][T12334] name failslab, interval 1, probability 0, space 0, times 0 [ 239.271193][T12334] CPU: 0 PID: 12334 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 239.279148][T12334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.289206][T12334] Call Trace: [ 239.292496][T12334] dump_stack+0x1fb/0x318 [ 239.296854][T12334] should_fail+0x555/0x770 [ 239.301274][T12334] __should_failslab+0x11a/0x160 [ 239.306350][T12334] ? loop_set_fd+0x1470/0x1470 [ 239.311122][T12334] should_failslab+0x9/0x20 [ 239.315818][T12334] kmem_cache_alloc_trace+0x5d/0x2f0 [ 239.321215][T12334] ? __kthread_create_on_node+0xb2/0x3b0 [ 239.326852][T12334] ? loop_set_fd+0x1470/0x1470 [ 239.331605][T12334] __kthread_create_on_node+0xb2/0x3b0 [ 239.337175][T12334] ? loop_set_fd+0x1470/0x1470 [ 239.342062][T12334] kthread_create_on_node+0x72/0xa0 [ 239.347356][T12334] ? lockdep_init_map+0x2a/0x680 [ 239.352275][T12334] ? __kthread_init_worker+0x5a/0xe0 [ 239.357559][T12334] loop_set_fd+0x6a8/0x1470 [ 239.362183][T12334] ? check_preemption_disabled+0xb7/0x2a0 [ 239.367887][T12334] ? tomoyo_path_number_perm+0x4e1/0x640 [ 239.373507][T12334] lo_ioctl+0xd5/0x2200 [ 239.377646][T12334] ? __kasan_slab_free+0x12a/0x1e0 [ 239.382733][T12334] ? kasan_slab_free+0xe/0x10 [ 239.387406][T12334] ? kfree+0x115/0x200 [ 239.391581][T12334] ? tomoyo_path_number_perm+0x4e1/0x640 [ 239.397202][T12334] ? tomoyo_file_ioctl+0x23/0x30 [ 239.402127][T12334] ? security_file_ioctl+0x6d/0xd0 [ 239.407222][T12334] ? __x64_sys_ioctl+0xa3/0x120 [ 239.412085][T12334] ? do_syscall_64+0xf7/0x1c0 [ 239.416880][T12334] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.422936][T12334] ? debug_check_no_obj_freed+0x505/0x5b0 [ 239.428647][T12334] ? rcu_lock_release+0x9/0x30 [ 239.433498][T12334] ? rcu_lock_release+0x9/0x30 [ 239.438240][T12334] ? lo_release+0x1f0/0x1f0 [ 239.442720][T12334] blkdev_ioctl+0x807/0x2980 [ 239.447320][T12334] ? tomoyo_path_number_perm+0x53e/0x640 [ 239.453026][T12334] block_ioctl+0xbd/0x100 [ 239.457331][T12334] ? blkdev_iopoll+0x100/0x100 [ 239.462187][T12334] do_vfs_ioctl+0x744/0x1730 [ 239.466761][T12334] ? __fget+0x431/0x510 [ 239.470934][T12334] ? tomoyo_file_ioctl+0x23/0x30 [ 239.475857][T12334] ? security_file_ioctl+0xa1/0xd0 [ 239.480955][T12334] __x64_sys_ioctl+0xe3/0x120 [ 239.485622][T12334] do_syscall_64+0xf7/0x1c0 [ 239.490121][T12334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.495992][T12334] RIP: 0033:0x45a4a7 [ 239.499887][T12334] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 239.519472][T12334] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 239.527863][T12334] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 239.535813][T12334] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 239.544206][T12334] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 239.552159][T12334] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 239.560111][T12334] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x3, 0x0) 01:01:54 executing program 2 (fault-call:3 fault-nth:18): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:54 executing program 3 (fault-call:3 fault-nth:19): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:54 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x3, 0x0) 01:01:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 239.820775][T12361] FAULT_INJECTION: forcing a failure. [ 239.820775][T12361] name failslab, interval 1, probability 0, space 0, times 0 [ 239.837772][T12361] CPU: 0 PID: 12361 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 239.845697][T12361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.855753][T12361] Call Trace: [ 239.859052][T12361] dump_stack+0x1fb/0x318 [ 239.863397][T12361] should_fail+0x555/0x770 01:01:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x3, 0x0) [ 239.867824][T12361] __should_failslab+0x11a/0x160 [ 239.872787][T12361] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 239.878515][T12361] should_failslab+0x9/0x20 [ 239.878528][T12361] __kmalloc+0x7a/0x340 [ 239.878541][T12361] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 239.878553][T12361] tomoyo_realpath_from_path+0xdc/0x7c0 [ 239.878573][T12361] tomoyo_path_number_perm+0x166/0x640 [ 239.887230][T12361] ? smack_file_ioctl+0x226/0x2e0 [ 239.887241][T12361] ? __fget+0x431/0x510 [ 239.887257][T12361] tomoyo_file_ioctl+0x23/0x30 [ 239.887269][T12361] security_file_ioctl+0x6d/0xd0 [ 239.887282][T12361] __x64_sys_ioctl+0xa3/0x120 [ 239.887296][T12361] do_syscall_64+0xf7/0x1c0 [ 239.887312][T12361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.898621][T12361] RIP: 0033:0x45a4a7 [ 239.898632][T12361] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 239.898637][T12361] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 239.898648][T12361] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 239.898654][T12361] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 239.898659][T12361] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 239.898665][T12361] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 239.898670][T12361] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 239.951898][T12361] ERROR: Out of memory at tomoyo_realpath_from_path. [ 240.031665][T12376] FAULT_INJECTION: forcing a failure. [ 240.031665][T12376] name failslab, interval 1, probability 0, space 0, times 0 [ 240.047911][T12376] CPU: 1 PID: 12376 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 240.055994][T12376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.066062][T12376] Call Trace: [ 240.066080][T12376] dump_stack+0x1fb/0x318 [ 240.066097][T12376] should_fail+0x555/0x770 [ 240.066116][T12376] __should_failslab+0x11a/0x160 [ 240.083044][T12376] ? __kernfs_new_node+0x97/0x6b0 [ 240.088071][T12376] should_failslab+0x9/0x20 [ 240.092735][T12376] kmem_cache_alloc+0x56/0x2e0 [ 240.097490][T12376] __kernfs_new_node+0x97/0x6b0 [ 240.097506][T12376] ? __kasan_check_write+0x14/0x20 [ 240.097518][T12376] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 240.097532][T12376] kernfs_new_node+0x97/0x170 [ 240.097545][T12376] __kernfs_create_file+0x4a/0x2f0 [ 240.097557][T12376] sysfs_add_file_mode_ns+0x2dc/0x3a0 01:01:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 240.097573][T12376] internal_create_group+0x4be/0xd80 [ 240.097593][T12376] sysfs_create_group+0x1f/0x30 [ 240.097604][T12376] loop_set_fd+0xf54/0x1470 [ 240.097623][T12376] lo_ioctl+0xd5/0x2200 [ 240.097631][T12376] ? __kasan_slab_free+0x12a/0x1e0 [ 240.097639][T12376] ? kasan_slab_free+0xe/0x10 [ 240.097647][T12376] ? kfree+0x115/0x200 [ 240.097656][T12376] ? tomoyo_path_number_perm+0x4e1/0x640 [ 240.097664][T12376] ? tomoyo_file_ioctl+0x23/0x30 [ 240.097676][T12376] ? security_file_ioctl+0x6d/0xd0 [ 240.107604][T12376] ? __x64_sys_ioctl+0xa3/0x120 [ 240.107615][T12376] ? do_syscall_64+0xf7/0x1c0 [ 240.107627][T12376] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.107643][T12376] ? debug_check_no_obj_freed+0x505/0x5b0 [ 240.107667][T12376] ? rcu_lock_release+0x9/0x30 [ 240.107684][T12376] ? rcu_lock_release+0x9/0x30 [ 240.107695][T12376] ? lo_release+0x1f0/0x1f0 [ 240.107705][T12376] blkdev_ioctl+0x807/0x2980 [ 240.107718][T12376] ? tomoyo_path_number_perm+0x53e/0x640 [ 240.107748][T12376] block_ioctl+0xbd/0x100 [ 240.123118][T12376] ? blkdev_iopoll+0x100/0x100 [ 240.123138][T12376] do_vfs_ioctl+0x744/0x1730 [ 240.123148][T12376] ? __fget+0x431/0x510 [ 240.123164][T12376] ? tomoyo_file_ioctl+0x23/0x30 [ 240.245819][T12376] ? security_file_ioctl+0xa1/0xd0 [ 240.250914][T12376] __x64_sys_ioctl+0xe3/0x120 [ 240.255570][T12376] do_syscall_64+0xf7/0x1c0 [ 240.260054][T12376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.265935][T12376] RIP: 0033:0x45a4a7 [ 240.269818][T12376] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 240.289422][T12376] RSP: 002b:00007fda2e1c6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 240.297832][T12376] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 240.305793][T12376] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 240.313918][T12376] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 240.321957][T12376] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 240.330155][T12376] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:55 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x3, 0x0) 01:01:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x3, 0x0) 01:01:55 executing program 2 (fault-call:3 fault-nth:19): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:55 executing program 3 (fault-call:3 fault-nth:20): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 240.688970][T12399] FAULT_INJECTION: forcing a failure. [ 240.688970][T12399] name failslab, interval 1, probability 0, space 0, times 0 [ 240.702441][T12399] CPU: 0 PID: 12399 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 240.710348][T12399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.720441][T12399] Call Trace: [ 240.723746][T12399] dump_stack+0x1fb/0x318 [ 240.728102][T12399] should_fail+0x555/0x770 [ 240.732517][T12399] __should_failslab+0x11a/0x160 [ 240.737444][T12399] ? __kernfs_new_node+0x97/0x6b0 [ 240.742462][T12399] should_failslab+0x9/0x20 [ 240.746951][T12399] kmem_cache_alloc+0x56/0x2e0 [ 240.751699][T12399] __kernfs_new_node+0x97/0x6b0 [ 240.756532][T12399] ? __schedule+0x876/0xc30 [ 240.761017][T12399] ? bd_set_size+0x97/0xb0 [ 240.765422][T12399] kernfs_create_dir_ns+0x9b/0x230 [ 240.770524][T12399] internal_create_group+0x207/0xd80 [ 240.775840][T12399] sysfs_create_group+0x1f/0x30 [ 240.780674][T12399] loop_set_fd+0xf54/0x1470 [ 240.785165][T12399] lo_ioctl+0xd5/0x2200 [ 240.789303][T12399] ? __kasan_slab_free+0x12a/0x1e0 [ 240.794393][T12399] ? kasan_slab_free+0xe/0x10 [ 240.800091][T12399] ? kfree+0x115/0x200 [ 240.804145][T12399] ? tomoyo_path_number_perm+0x4e1/0x640 [ 240.809757][T12399] ? tomoyo_file_ioctl+0x23/0x30 [ 240.815033][T12399] ? security_file_ioctl+0x6d/0xd0 [ 240.820137][T12399] ? __x64_sys_ioctl+0xa3/0x120 [ 240.824966][T12399] ? do_syscall_64+0xf7/0x1c0 [ 240.829634][T12399] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.835684][T12399] ? debug_check_no_obj_freed+0x505/0x5b0 [ 240.841403][T12399] ? rcu_lock_release+0x9/0x30 [ 240.846161][T12399] ? rcu_lock_release+0x9/0x30 [ 240.850906][T12399] ? lo_release+0x1f0/0x1f0 [ 240.855394][T12399] blkdev_ioctl+0x807/0x2980 [ 240.859970][T12399] ? tomoyo_path_number_perm+0x53e/0x640 [ 240.865597][T12399] block_ioctl+0xbd/0x100 [ 240.869912][T12399] ? blkdev_iopoll+0x100/0x100 [ 240.874668][T12399] do_vfs_ioctl+0x744/0x1730 [ 240.879240][T12399] ? __fget+0x431/0x510 [ 240.883382][T12399] ? tomoyo_file_ioctl+0x23/0x30 [ 240.888308][T12399] ? security_file_ioctl+0xa1/0xd0 [ 240.893414][T12399] __x64_sys_ioctl+0xe3/0x120 [ 240.898087][T12399] do_syscall_64+0xf7/0x1c0 [ 240.902575][T12399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.908457][T12399] RIP: 0033:0x45a4a7 [ 240.912344][T12399] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:01:55 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x3, 0x0) [ 240.931928][T12399] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 240.940413][T12399] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 240.948383][T12399] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 240.956340][T12399] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 240.964300][T12399] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 240.972255][T12399] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 241.100613][T12412] FAULT_INJECTION: forcing a failure. [ 241.100613][T12412] name failslab, interval 1, probability 0, space 0, times 0 [ 241.117696][T12412] CPU: 1 PID: 12412 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 241.127961][T12412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.138021][T12412] Call Trace: [ 241.141318][T12412] dump_stack+0x1fb/0x318 [ 241.145662][T12412] should_fail+0x555/0x770 [ 241.150092][T12412] __should_failslab+0x11a/0x160 [ 241.155022][T12412] ? __kernfs_new_node+0x97/0x6b0 [ 241.160040][T12412] should_failslab+0x9/0x20 [ 241.164543][T12412] kmem_cache_alloc+0x56/0x2e0 [ 241.169305][T12412] __kernfs_new_node+0x97/0x6b0 [ 241.174160][T12412] ? __kasan_check_write+0x14/0x20 [ 241.179276][T12412] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 241.184907][T12412] kernfs_new_node+0x97/0x170 [ 241.189583][T12412] __kernfs_create_file+0x4a/0x2f0 [ 241.194685][T12412] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 241.200094][T12412] internal_create_group+0x4be/0xd80 [ 241.205379][T12412] sysfs_create_group+0x1f/0x30 [ 241.210215][T12412] loop_set_fd+0xf54/0x1470 [ 241.214726][T12412] lo_ioctl+0xd5/0x2200 [ 241.218957][T12412] ? __kasan_slab_free+0x12a/0x1e0 [ 241.224041][T12412] ? kasan_slab_free+0xe/0x10 [ 241.228705][T12412] ? kfree+0x115/0x200 [ 241.232762][T12412] ? tomoyo_path_number_perm+0x4e1/0x640 [ 241.238383][T12412] ? tomoyo_file_ioctl+0x23/0x30 [ 241.243294][T12412] ? security_file_ioctl+0x6d/0xd0 [ 241.248482][T12412] ? __x64_sys_ioctl+0xa3/0x120 [ 241.253320][T12412] ? do_syscall_64+0xf7/0x1c0 [ 241.257981][T12412] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.264035][T12412] ? debug_check_no_obj_freed+0x505/0x5b0 [ 241.269770][T12412] ? rcu_lock_release+0x9/0x30 [ 241.274528][T12412] ? rcu_lock_release+0x9/0x30 [ 241.279273][T12412] ? lo_release+0x1f0/0x1f0 [ 241.283863][T12412] blkdev_ioctl+0x807/0x2980 [ 241.288445][T12412] ? tomoyo_path_number_perm+0x53e/0x640 [ 241.294095][T12412] block_ioctl+0xbd/0x100 [ 241.298424][T12412] ? blkdev_iopoll+0x100/0x100 [ 241.303254][T12412] do_vfs_ioctl+0x744/0x1730 [ 241.307832][T12412] ? __fget+0x431/0x510 [ 241.312011][T12412] ? tomoyo_file_ioctl+0x23/0x30 [ 241.316984][T12412] ? security_file_ioctl+0xa1/0xd0 [ 241.322082][T12412] __x64_sys_ioctl+0xe3/0x120 [ 241.326749][T12412] do_syscall_64+0xf7/0x1c0 [ 241.331355][T12412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.337233][T12412] RIP: 0033:0x45a4a7 [ 241.341120][T12412] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 241.360807][T12412] RSP: 002b:00007fda2e1e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 241.369209][T12412] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 241.377179][T12412] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 241.385231][T12412] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 241.393203][T12412] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 241.401157][T12412] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:56 executing program 2 (fault-call:3 fault-nth:20): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:56 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:56 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x3, 0x0) [ 241.662626][T12428] FAULT_INJECTION: forcing a failure. [ 241.662626][T12428] name failslab, interval 1, probability 0, space 0, times 0 [ 241.675695][T12428] CPU: 0 PID: 12428 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 241.683583][T12428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.693635][T12428] Call Trace: [ 241.696929][T12428] dump_stack+0x1fb/0x318 [ 241.701248][T12428] should_fail+0x555/0x770 [ 241.705659][T12428] __should_failslab+0x11a/0x160 [ 241.710584][T12428] ? radix_tree_node_alloc+0x1a1/0x370 [ 241.716026][T12428] should_failslab+0x9/0x20 [ 241.720519][T12428] kmem_cache_alloc+0x56/0x2e0 [ 241.725273][T12428] radix_tree_node_alloc+0x1a1/0x370 [ 241.730561][T12428] idr_get_free+0x2b8/0x8c0 [ 241.735072][T12428] idr_alloc_cyclic+0x18b/0x550 [ 241.740019][T12428] __kernfs_new_node+0x124/0x6b0 [ 241.744951][T12428] ? bd_set_size+0x97/0xb0 [ 241.749450][T12428] kernfs_create_dir_ns+0x9b/0x230 [ 241.754637][T12428] internal_create_group+0x207/0xd80 [ 241.759921][T12428] sysfs_create_group+0x1f/0x30 [ 241.764780][T12428] loop_set_fd+0xf54/0x1470 [ 241.769281][T12428] lo_ioctl+0xd5/0x2200 [ 241.773418][T12428] ? __kasan_slab_free+0x12a/0x1e0 [ 241.778511][T12428] ? kasan_slab_free+0xe/0x10 [ 241.783165][T12428] ? kfree+0x115/0x200 [ 241.787217][T12428] ? tomoyo_path_number_perm+0x4e1/0x640 [ 241.792841][T12428] ? tomoyo_file_ioctl+0x23/0x30 [ 241.797761][T12428] ? security_file_ioctl+0x6d/0xd0 [ 241.802872][T12428] ? __x64_sys_ioctl+0xa3/0x120 [ 241.807717][T12428] ? do_syscall_64+0xf7/0x1c0 [ 241.812383][T12428] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.818461][T12428] ? debug_check_no_obj_freed+0x505/0x5b0 [ 241.824177][T12428] ? rcu_lock_release+0x9/0x30 [ 241.828942][T12428] ? rcu_lock_release+0x9/0x30 [ 241.833694][T12428] ? lo_release+0x1f0/0x1f0 [ 241.838192][T12428] blkdev_ioctl+0x807/0x2980 [ 241.842775][T12428] ? tomoyo_path_number_perm+0x53e/0x640 [ 241.848403][T12428] block_ioctl+0xbd/0x100 [ 241.853236][T12428] ? blkdev_iopoll+0x100/0x100 [ 241.857986][T12428] do_vfs_ioctl+0x744/0x1730 [ 241.862559][T12428] ? __fget+0x431/0x510 [ 241.866712][T12428] ? tomoyo_file_ioctl+0x23/0x30 [ 241.871671][T12428] ? security_file_ioctl+0xa1/0xd0 [ 241.876835][T12428] __x64_sys_ioctl+0xe3/0x120 [ 241.881501][T12428] do_syscall_64+0xf7/0x1c0 [ 241.891893][T12428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.897852][T12428] RIP: 0033:0x45a4a7 [ 241.901732][T12428] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 241.921330][T12428] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 241.929723][T12428] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 241.937677][T12428] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 241.945813][T12428] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 241.953773][T12428] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 241.961726][T12428] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:56 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:56 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000000)=0x3ff, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 01:01:57 executing program 2 (fault-call:3 fault-nth:21): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:57 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x3, 0x0) [ 242.314364][T12452] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 242.384719][T12457] FAULT_INJECTION: forcing a failure. [ 242.384719][T12457] name failslab, interval 1, probability 0, space 0, times 0 [ 242.417391][T12457] CPU: 0 PID: 12457 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 01:01:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='%trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 242.425330][T12457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.435466][T12457] Call Trace: [ 242.435486][T12457] dump_stack+0x1fb/0x318 [ 242.435502][T12457] should_fail+0x555/0x770 [ 242.435520][T12457] __should_failslab+0x11a/0x160 [ 242.443254][T12457] ? __kernfs_new_node+0x97/0x6b0 [ 242.443266][T12457] should_failslab+0x9/0x20 [ 242.443275][T12457] kmem_cache_alloc+0x56/0x2e0 [ 242.443291][T12457] __kernfs_new_node+0x97/0x6b0 [ 242.443303][T12457] ? __schedule+0x876/0xc30 [ 242.443318][T12457] ? bd_set_size+0x97/0xb0 [ 242.443336][T12457] kernfs_create_dir_ns+0x9b/0x230 [ 242.443353][T12457] internal_create_group+0x207/0xd80 [ 242.452727][T12457] sysfs_create_group+0x1f/0x30 [ 242.452739][T12457] loop_set_fd+0xf54/0x1470 [ 242.452758][T12457] lo_ioctl+0xd5/0x2200 [ 242.452768][T12457] ? __kasan_slab_free+0x12a/0x1e0 [ 242.452775][T12457] ? kasan_slab_free+0xe/0x10 [ 242.452784][T12457] ? kfree+0x115/0x200 [ 242.452794][T12457] ? tomoyo_path_number_perm+0x4e1/0x640 [ 242.452803][T12457] ? tomoyo_file_ioctl+0x23/0x30 [ 242.452812][T12457] ? security_file_ioctl+0x6d/0xd0 [ 242.452825][T12457] ? __x64_sys_ioctl+0xa3/0x120 [ 242.462332][T12457] ? do_syscall_64+0xf7/0x1c0 [ 242.462345][T12457] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.462362][T12457] ? debug_check_no_obj_freed+0x505/0x5b0 [ 242.462386][T12457] ? rcu_lock_release+0x9/0x30 [ 242.462401][T12457] ? rcu_lock_release+0x9/0x30 [ 242.462413][T12457] ? lo_release+0x1f0/0x1f0 [ 242.462422][T12457] blkdev_ioctl+0x807/0x2980 [ 242.462435][T12457] ? tomoyo_path_number_perm+0x53e/0x640 01:01:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)=""/201, &(0x7f0000000040)=0xc9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f00000000c0)={0x0, [], 0x7}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000100), &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x400}, &(0x7f0000000180)=0xc) openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x200, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000340)={r4, 0x8, 0x47, "bfb80abbbeb9fa054bc90b39a7f0c925205cdf8e54fdc577fa30854bd0d0f6dc89600594483fd394e22c014dc05320e0500f7de70b7286661b5ae7847fd53e1bb42b7480f08a52"}, 0x4f) listen(r1, 0x400000001ffffffd) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r1, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, 0x0) ioctl$VT_OPENQRY(r7, 0x5600, &(0x7f0000000000)) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r7, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8, 0x7, &(0x7f00000003c0)=0xffffffffffff7fff}) sendmmsg(r6, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) [ 242.462464][T12457] block_ioctl+0xbd/0x100 [ 242.472060][T12457] ? blkdev_iopoll+0x100/0x100 [ 242.472073][T12457] do_vfs_ioctl+0x744/0x1730 [ 242.472083][T12457] ? __fget+0x431/0x510 [ 242.472099][T12457] ? tomoyo_file_ioctl+0x23/0x30 [ 242.472108][T12457] ? security_file_ioctl+0xa1/0xd0 [ 242.472120][T12457] __x64_sys_ioctl+0xe3/0x120 [ 242.472134][T12457] do_syscall_64+0xf7/0x1c0 [ 242.472147][T12457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.472157][T12457] RIP: 0033:0x45a4a7 [ 242.472166][T12457] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 242.472176][T12457] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 242.481057][T12457] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 242.481064][T12457] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 242.481070][T12457] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 242.481076][T12457] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 242.481082][T12457] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:57 executing program 2 (fault-call:3 fault-nth:22): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:57 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x3, 0x0) 01:01:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='\\trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 242.950968][T12488] FAULT_INJECTION: forcing a failure. [ 242.950968][T12488] name failslab, interval 1, probability 0, space 0, times 0 [ 242.977805][T12488] CPU: 0 PID: 12488 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 242.985730][T12488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.995786][T12488] Call Trace: [ 242.999091][T12488] dump_stack+0x1fb/0x318 [ 243.003431][T12488] should_fail+0x555/0x770 [ 243.007853][T12488] __should_failslab+0x11a/0x160 [ 243.012792][T12488] ? __kernfs_new_node+0x97/0x6b0 [ 243.017821][T12488] should_failslab+0x9/0x20 [ 243.022323][T12488] kmem_cache_alloc+0x56/0x2e0 [ 243.027182][T12488] __kernfs_new_node+0x97/0x6b0 [ 243.032034][T12488] ? bd_set_size+0x97/0xb0 [ 243.036454][T12488] kernfs_create_dir_ns+0x9b/0x230 [ 243.041571][T12488] internal_create_group+0x207/0xd80 [ 243.046871][T12488] sysfs_create_group+0x1f/0x30 [ 243.051719][T12488] loop_set_fd+0xf54/0x1470 [ 243.056237][T12488] lo_ioctl+0xd5/0x2200 [ 243.060396][T12488] ? __kasan_slab_free+0x12a/0x1e0 [ 243.065502][T12488] ? kasan_slab_free+0xe/0x10 [ 243.070170][T12488] ? kfree+0x115/0x200 [ 243.074238][T12488] ? tomoyo_path_number_perm+0x4e1/0x640 [ 243.079874][T12488] ? tomoyo_file_ioctl+0x23/0x30 [ 243.084817][T12488] ? security_file_ioctl+0x6d/0xd0 [ 243.089927][T12488] ? __x64_sys_ioctl+0xa3/0x120 [ 243.094775][T12488] ? do_syscall_64+0xf7/0x1c0 [ 243.099458][T12488] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.105531][T12488] ? debug_check_no_obj_freed+0x505/0x5b0 [ 243.111275][T12488] ? rcu_lock_release+0x9/0x30 [ 243.116065][T12488] ? rcu_lock_release+0x9/0x30 [ 243.120836][T12488] ? lo_release+0x1f0/0x1f0 [ 243.125338][T12488] blkdev_ioctl+0x807/0x2980 [ 243.129931][T12488] ? tomoyo_path_number_perm+0x53e/0x640 [ 243.135561][T12488] block_ioctl+0xbd/0x100 [ 243.139862][T12488] ? blkdev_iopoll+0x100/0x100 [ 243.144611][T12488] do_vfs_ioctl+0x744/0x1730 [ 243.149176][T12488] ? __fget+0x431/0x510 [ 243.153323][T12488] ? tomoyo_file_ioctl+0x23/0x30 [ 243.158241][T12488] ? security_file_ioctl+0xa1/0xd0 [ 243.163327][T12488] __x64_sys_ioctl+0xe3/0x120 [ 243.167982][T12488] do_syscall_64+0xf7/0x1c0 [ 243.172459][T12488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.178327][T12488] RIP: 0033:0x45a4a7 [ 243.182195][T12488] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:01:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)=""/201, &(0x7f0000000040)=0xc9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f00000000c0)={0x0, [], 0x7}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000100), &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x400}, &(0x7f0000000180)=0xc) openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x200, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000340)={r4, 0x8, 0x47, "bfb80abbbeb9fa054bc90b39a7f0c925205cdf8e54fdc577fa30854bd0d0f6dc89600594483fd394e22c014dc05320e0500f7de70b7286661b5ae7847fd53e1bb42b7480f08a52"}, 0x4f) listen(r1, 0x400000001ffffffd) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r1, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, 0x0) ioctl$VT_OPENQRY(r7, 0x5600, &(0x7f0000000000)) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r7, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8, 0x7, &(0x7f00000003c0)=0xffffffffffff7fff}) sendmmsg(r6, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) 01:01:58 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 243.201871][T12488] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 243.210256][T12488] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 243.218278][T12488] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 243.226263][T12488] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 243.234217][T12488] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 243.242176][T12488] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:58 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x3, 0x0) 01:01:58 executing program 2 (fault-call:3 fault-nth:23): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='b%rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:58 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x3, 0x0) [ 243.609585][T12516] FAULT_INJECTION: forcing a failure. [ 243.609585][T12516] name failslab, interval 1, probability 0, space 0, times 0 [ 243.625304][T12516] CPU: 1 PID: 12516 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 243.633579][T12516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.643647][T12516] Call Trace: [ 243.646948][T12516] dump_stack+0x1fb/0x318 [ 243.651296][T12516] should_fail+0x555/0x770 [ 243.655731][T12516] __should_failslab+0x11a/0x160 [ 243.660674][T12516] ? __kernfs_new_node+0x97/0x6b0 [ 243.665702][T12516] should_failslab+0x9/0x20 [ 243.670203][T12516] kmem_cache_alloc+0x56/0x2e0 [ 243.674970][T12516] __kernfs_new_node+0x97/0x6b0 [ 243.679834][T12516] ? mutex_unlock+0xd/0x10 [ 243.684256][T12516] ? kernfs_activate+0x4c7/0x4e0 [ 243.689201][T12516] kernfs_new_node+0x97/0x170 [ 243.693880][T12516] __kernfs_create_file+0x4a/0x2f0 [ 243.698997][T12516] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 243.704378][T12516] internal_create_group+0x4be/0xd80 [ 243.709675][T12516] sysfs_create_group+0x1f/0x30 [ 243.714535][T12516] loop_set_fd+0xf54/0x1470 [ 243.719052][T12516] lo_ioctl+0xd5/0x2200 [ 243.723220][T12516] ? __kasan_slab_free+0x12a/0x1e0 [ 243.728324][T12516] ? kasan_slab_free+0xe/0x10 [ 243.733000][T12516] ? kfree+0x115/0x200 [ 243.737064][T12516] ? tomoyo_path_number_perm+0x4e1/0x640 [ 243.742693][T12516] ? tomoyo_file_ioctl+0x23/0x30 [ 243.747628][T12516] ? security_file_ioctl+0x6d/0xd0 [ 243.752735][T12516] ? __x64_sys_ioctl+0xa3/0x120 [ 243.757581][T12516] ? do_syscall_64+0xf7/0x1c0 [ 243.762254][T12516] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.768323][T12516] ? debug_check_no_obj_freed+0x505/0x5b0 [ 243.774302][T12516] ? rcu_lock_release+0x9/0x30 [ 243.779171][T12516] ? rcu_lock_release+0x9/0x30 [ 243.783911][T12516] ? lo_release+0x1f0/0x1f0 [ 243.788392][T12516] blkdev_ioctl+0x807/0x2980 [ 243.792960][T12516] ? tomoyo_path_number_perm+0x53e/0x640 [ 243.799803][T12516] block_ioctl+0xbd/0x100 [ 243.804112][T12516] ? blkdev_iopoll+0x100/0x100 [ 243.808861][T12516] do_vfs_ioctl+0x744/0x1730 [ 243.813426][T12516] ? __fget+0x431/0x510 [ 243.817568][T12516] ? tomoyo_file_ioctl+0x23/0x30 [ 243.822495][T12516] ? security_file_ioctl+0xa1/0xd0 [ 243.827595][T12516] __x64_sys_ioctl+0xe3/0x120 [ 243.832251][T12516] do_syscall_64+0xf7/0x1c0 [ 243.836756][T12516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.842637][T12516] RIP: 0033:0x45a4a7 [ 243.846525][T12516] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 243.866109][T12516] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 243.874512][T12516] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 243.882475][T12516] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 243.890424][T12516] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 243.898373][T12516] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 01:01:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)=""/201, &(0x7f0000000040)=0xc9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f00000000c0)={0x0, [], 0x7}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000100), &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x400}, &(0x7f0000000180)=0xc) openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x200, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000340)={r4, 0x8, 0x47, "bfb80abbbeb9fa054bc90b39a7f0c925205cdf8e54fdc577fa30854bd0d0f6dc89600594483fd394e22c014dc05320e0500f7de70b7286661b5ae7847fd53e1bb42b7480f08a52"}, 0x4f) listen(r1, 0x400000001ffffffd) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r1, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, 0x0) ioctl$VT_OPENQRY(r7, 0x5600, &(0x7f0000000000)) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r7, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8, 0x7, &(0x7f00000003c0)=0xffffffffffff7fff}) sendmmsg(r6, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) 01:01:58 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 243.906340][T12516] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:58 executing program 2 (fault-call:3 fault-nth:24): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:58 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x3, 0x0) [ 244.182791][T12544] FAULT_INJECTION: forcing a failure. [ 244.182791][T12544] name failslab, interval 1, probability 0, space 0, times 0 [ 244.199314][T12544] CPU: 1 PID: 12544 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 244.207236][T12544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.217286][T12544] Call Trace: [ 244.217307][T12544] dump_stack+0x1fb/0x318 [ 244.217324][T12544] should_fail+0x555/0x770 [ 244.217341][T12544] __should_failslab+0x11a/0x160 [ 244.234269][T12544] ? __kernfs_new_node+0x97/0x6b0 [ 244.239297][T12544] should_failslab+0x9/0x20 [ 244.243908][T12544] kmem_cache_alloc+0x56/0x2e0 [ 244.243924][T12544] __kernfs_new_node+0x97/0x6b0 [ 244.243944][T12544] ? mutex_unlock+0xd/0x10 [ 244.257958][T12544] ? kernfs_activate+0x4c7/0x4e0 [ 244.262931][T12544] kernfs_new_node+0x97/0x170 [ 244.267630][T12544] __kernfs_create_file+0x4a/0x2f0 [ 244.272779][T12544] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 244.278169][T12544] internal_create_group+0x4be/0xd80 [ 244.283462][T12544] sysfs_create_group+0x1f/0x30 [ 244.283474][T12544] loop_set_fd+0xf54/0x1470 [ 244.283493][T12544] lo_ioctl+0xd5/0x2200 [ 244.297220][T12544] ? __kasan_slab_free+0x12a/0x1e0 [ 244.302333][T12544] ? kasan_slab_free+0xe/0x10 [ 244.307009][T12544] ? kfree+0x115/0x200 [ 244.311080][T12544] ? tomoyo_path_number_perm+0x4e1/0x640 [ 244.316717][T12544] ? tomoyo_file_ioctl+0x23/0x30 [ 244.321650][T12544] ? security_file_ioctl+0x6d/0xd0 [ 244.326759][T12544] ? __x64_sys_ioctl+0xa3/0x120 [ 244.331613][T12544] ? do_syscall_64+0xf7/0x1c0 [ 244.336292][T12544] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.342361][T12544] ? debug_check_no_obj_freed+0x505/0x5b0 [ 244.348099][T12544] ? rcu_lock_release+0x9/0x30 [ 244.352871][T12544] ? rcu_lock_release+0x9/0x30 [ 244.357641][T12544] ? lo_release+0x1f0/0x1f0 [ 244.362146][T12544] blkdev_ioctl+0x807/0x2980 [ 244.366739][T12544] ? tomoyo_path_number_perm+0x53e/0x640 [ 244.372395][T12544] block_ioctl+0xbd/0x100 [ 244.376723][T12544] ? blkdev_iopoll+0x100/0x100 [ 244.381494][T12544] do_vfs_ioctl+0x744/0x1730 [ 244.386183][T12544] ? __fget+0x431/0x510 [ 244.390352][T12544] ? tomoyo_file_ioctl+0x23/0x30 [ 244.395334][T12544] ? security_file_ioctl+0xa1/0xd0 [ 244.400450][T12544] __x64_sys_ioctl+0xe3/0x120 [ 244.405157][T12544] do_syscall_64+0xf7/0x1c0 [ 244.409752][T12544] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.415637][T12544] RIP: 0033:0x45a4a7 01:01:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='b\\rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 244.419526][T12544] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 244.439137][T12544] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 244.447556][T12544] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 244.455531][T12544] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 244.463607][T12544] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 244.471595][T12544] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 01:01:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1d1) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000180)='./file0\x00', 0x90002) sendfile(r3, r3, 0x0, 0x8800000) [ 244.479584][T12544] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:01:59 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:01:59 executing program 2 (fault-call:3 fault-nth:25): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:59 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:01:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='bt\\fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 244.816964][T12571] FAULT_INJECTION: forcing a failure. [ 244.816964][T12571] name failslab, interval 1, probability 0, space 0, times 0 [ 244.834555][T12571] CPU: 0 PID: 12571 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 244.842479][T12571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.852530][T12571] Call Trace: [ 244.852549][T12571] dump_stack+0x1fb/0x318 [ 244.852565][T12571] should_fail+0x555/0x770 [ 244.852585][T12571] __should_failslab+0x11a/0x160 [ 244.869505][T12571] ? __kernfs_new_node+0x97/0x6b0 [ 244.869515][T12571] should_failslab+0x9/0x20 [ 244.869524][T12571] kmem_cache_alloc+0x56/0x2e0 [ 244.869537][T12571] __kernfs_new_node+0x97/0x6b0 [ 244.869552][T12571] ? mutex_unlock+0xd/0x10 [ 244.869561][T12571] ? kernfs_activate+0x4c7/0x4e0 [ 244.869576][T12571] kernfs_new_node+0x97/0x170 [ 244.869589][T12571] __kernfs_create_file+0x4a/0x2f0 [ 244.869601][T12571] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 244.869620][T12571] internal_create_group+0x4be/0xd80 [ 244.869643][T12571] sysfs_create_group+0x1f/0x30 [ 244.869654][T12571] loop_set_fd+0xf54/0x1470 [ 244.869675][T12571] lo_ioctl+0xd5/0x2200 [ 244.879438][T12571] ? __kasan_slab_free+0x12a/0x1e0 [ 244.879447][T12571] ? kasan_slab_free+0xe/0x10 [ 244.879457][T12571] ? kfree+0x115/0x200 [ 244.879466][T12571] ? tomoyo_path_number_perm+0x4e1/0x640 [ 244.879474][T12571] ? tomoyo_file_ioctl+0x23/0x30 [ 244.879484][T12571] ? security_file_ioctl+0x6d/0xd0 [ 244.879492][T12571] ? __x64_sys_ioctl+0xa3/0x120 [ 244.879502][T12571] ? do_syscall_64+0xf7/0x1c0 [ 244.879514][T12571] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.879528][T12571] ? debug_check_no_obj_freed+0x505/0x5b0 [ 244.879552][T12571] ? rcu_lock_release+0x9/0x30 [ 244.989823][T12571] ? rcu_lock_release+0x9/0x30 [ 244.994596][T12571] ? lo_release+0x1f0/0x1f0 [ 244.999110][T12571] blkdev_ioctl+0x807/0x2980 [ 245.003712][T12571] ? tomoyo_path_number_perm+0x53e/0x640 [ 245.009468][T12571] block_ioctl+0xbd/0x100 [ 245.013794][T12571] ? blkdev_iopoll+0x100/0x100 [ 245.018561][T12571] do_vfs_ioctl+0x744/0x1730 [ 245.023146][T12571] ? __fget+0x431/0x510 [ 245.027418][T12571] ? tomoyo_file_ioctl+0x23/0x30 [ 245.032346][T12571] ? security_file_ioctl+0xa1/0xd0 [ 245.037461][T12571] __x64_sys_ioctl+0xe3/0x120 [ 245.042284][T12571] do_syscall_64+0xf7/0x1c0 [ 245.046804][T12571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.052707][T12571] RIP: 0033:0x45a4a7 [ 245.056598][T12571] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.076197][T12571] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 245.084705][T12571] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 245.092680][T12571] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 245.100666][T12571] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 245.108645][T12571] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 01:01:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 245.116616][T12571] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:00 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fanotify_init(0x0, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1d1) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) sendfile(r3, r3, 0x0, 0x8080fffffffe) 01:02:00 executing program 2 (fault-call:3 fault-nth:26): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btr%s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 245.507006][T12604] FAULT_INJECTION: forcing a failure. [ 245.507006][T12604] name failslab, interval 1, probability 0, space 0, times 0 [ 245.536894][T12604] CPU: 0 PID: 12604 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 245.545009][T12604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.555059][T12604] Call Trace: [ 245.558340][T12604] dump_stack+0x1fb/0x318 [ 245.562652][T12604] should_fail+0x555/0x770 [ 245.567055][T12604] __should_failslab+0x11a/0x160 [ 245.571996][T12604] ? __kernfs_new_node+0x97/0x6b0 [ 245.577002][T12604] should_failslab+0x9/0x20 [ 245.581486][T12604] kmem_cache_alloc+0x56/0x2e0 [ 245.586255][T12604] __kernfs_new_node+0x97/0x6b0 [ 245.591198][T12604] ? mutex_unlock+0xd/0x10 [ 245.595605][T12604] ? kernfs_activate+0x4c7/0x4e0 [ 245.600532][T12604] kernfs_new_node+0x97/0x170 [ 245.605189][T12604] __kernfs_create_file+0x4a/0x2f0 [ 245.610278][T12604] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 245.615630][T12604] internal_create_group+0x4be/0xd80 [ 245.620986][T12604] sysfs_create_group+0x1f/0x30 [ 245.625814][T12604] loop_set_fd+0xf54/0x1470 [ 245.630300][T12604] lo_ioctl+0xd5/0x2200 [ 245.634443][T12604] ? __kasan_slab_free+0x12a/0x1e0 [ 245.639594][T12604] ? kasan_slab_free+0xe/0x10 [ 245.644247][T12604] ? kfree+0x115/0x200 [ 245.648310][T12604] ? tomoyo_path_number_perm+0x4e1/0x640 [ 245.654352][T12604] ? tomoyo_file_ioctl+0x23/0x30 [ 245.659263][T12604] ? security_file_ioctl+0x6d/0xd0 [ 245.664351][T12604] ? __x64_sys_ioctl+0xa3/0x120 [ 245.669179][T12604] ? do_syscall_64+0xf7/0x1c0 [ 245.673829][T12604] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.679876][T12604] ? debug_check_no_obj_freed+0x505/0x5b0 [ 245.685685][T12604] ? rcu_lock_release+0x9/0x30 [ 245.690437][T12604] ? rcu_lock_release+0x9/0x30 [ 245.695180][T12604] ? lo_release+0x1f0/0x1f0 [ 245.699657][T12604] blkdev_ioctl+0x807/0x2980 [ 245.704228][T12604] ? tomoyo_path_number_perm+0x53e/0x640 [ 245.709867][T12604] block_ioctl+0xbd/0x100 [ 245.714176][T12604] ? blkdev_iopoll+0x100/0x100 [ 245.718928][T12604] do_vfs_ioctl+0x744/0x1730 [ 245.723492][T12604] ? __fget+0x431/0x510 [ 245.727630][T12604] ? tomoyo_file_ioctl+0x23/0x30 [ 245.732550][T12604] ? security_file_ioctl+0xa1/0xd0 [ 245.737638][T12604] __x64_sys_ioctl+0xe3/0x120 [ 245.742301][T12604] do_syscall_64+0xf7/0x1c0 [ 245.749311][T12604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.755186][T12604] RIP: 0033:0x45a4a7 [ 245.759091][T12604] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.778689][T12604] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 245.787092][T12604] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 245.795055][T12604] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 01:02:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x24, 0x33, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x10, @ipv4=@multicast1=0x4000500}]}]}, 0x24}}, 0x0) [ 245.803006][T12604] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 245.810956][T12604] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 245.818904][T12604] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 245.930054][T12619] openvswitch: netlink: IP tunnel dst address not specified 01:02:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:00 executing program 2 (fault-call:3 fault-nth:27): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 246.229706][T12633] FAULT_INJECTION: forcing a failure. [ 246.229706][T12633] name failslab, interval 1, probability 0, space 0, times 0 [ 246.263144][T12633] CPU: 0 PID: 12633 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 246.271074][T12633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.281134][T12633] Call Trace: [ 246.284542][T12633] dump_stack+0x1fb/0x318 [ 246.288882][T12633] should_fail+0x555/0x770 [ 246.293427][T12633] __should_failslab+0x11a/0x160 [ 246.298362][T12633] ? __kernfs_new_node+0x97/0x6b0 [ 246.303408][T12633] should_failslab+0x9/0x20 [ 246.307916][T12633] kmem_cache_alloc+0x56/0x2e0 [ 246.312684][T12633] __kernfs_new_node+0x97/0x6b0 [ 246.317546][T12633] ? mutex_unlock+0xd/0x10 [ 246.321985][T12633] ? kernfs_activate+0x4c7/0x4e0 [ 246.327017][T12633] kernfs_new_node+0x97/0x170 [ 246.331707][T12633] __kernfs_create_file+0x4a/0x2f0 [ 246.336829][T12633] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 246.342213][T12633] internal_create_group+0x4be/0xd80 [ 246.347514][T12633] sysfs_create_group+0x1f/0x30 [ 246.352370][T12633] loop_set_fd+0xf54/0x1470 [ 246.356901][T12633] lo_ioctl+0xd5/0x2200 [ 246.361053][T12633] ? __kasan_slab_free+0x12a/0x1e0 [ 246.366170][T12633] ? kasan_slab_free+0xe/0x10 [ 246.370865][T12633] ? kfree+0x115/0x200 01:02:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:01 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 246.374939][T12633] ? tomoyo_path_number_perm+0x4e1/0x640 [ 246.380691][T12633] ? tomoyo_file_ioctl+0x23/0x30 [ 246.385627][T12633] ? security_file_ioctl+0x6d/0xd0 [ 246.391357][T12633] ? __x64_sys_ioctl+0xa3/0x120 [ 246.396207][T12633] ? do_syscall_64+0xf7/0x1c0 [ 246.400881][T12633] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.407046][T12633] ? debug_check_no_obj_freed+0x505/0x5b0 [ 246.412782][T12633] ? rcu_lock_release+0x9/0x30 [ 246.417562][T12633] ? rcu_lock_release+0x9/0x30 [ 246.422327][T12633] ? lo_release+0x1f0/0x1f0 [ 246.426981][T12633] blkdev_ioctl+0x807/0x2980 [ 246.431572][T12633] ? tomoyo_path_number_perm+0x53e/0x640 [ 246.437194][T12633] block_ioctl+0xbd/0x100 [ 246.441509][T12633] ? blkdev_iopoll+0x100/0x100 [ 246.446257][T12633] do_vfs_ioctl+0x744/0x1730 [ 246.450844][T12633] ? __fget+0x431/0x510 [ 246.454984][T12633] ? tomoyo_file_ioctl+0x23/0x30 [ 246.459914][T12633] ? security_file_ioctl+0xa1/0xd0 [ 246.465105][T12633] __x64_sys_ioctl+0xe3/0x120 [ 246.469820][T12633] do_syscall_64+0xf7/0x1c0 [ 246.474321][T12633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.480195][T12633] RIP: 0033:0x45a4a7 [ 246.484075][T12633] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 246.504717][T12633] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 246.513104][T12633] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 246.521101][T12633] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 246.529071][T12633] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 246.537028][T12633] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 246.544984][T12633] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:01 executing program 2 (fault-call:3 fault-nth:28): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 246.916299][T12663] FAULT_INJECTION: forcing a failure. [ 246.916299][T12663] name failslab, interval 1, probability 0, space 0, times 0 [ 246.943492][T12663] CPU: 1 PID: 12663 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 246.951437][T12663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.951443][T12663] Call Trace: 01:02:01 executing program 4 (fault-call:1 fault-nth:0): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 246.951464][T12663] dump_stack+0x1fb/0x318 [ 246.951482][T12663] should_fail+0x555/0x770 [ 246.951503][T12663] __should_failslab+0x11a/0x160 [ 246.951517][T12663] ? __kernfs_new_node+0x97/0x6b0 [ 246.951526][T12663] should_failslab+0x9/0x20 [ 246.951534][T12663] kmem_cache_alloc+0x56/0x2e0 [ 246.951547][T12663] __kernfs_new_node+0x97/0x6b0 [ 246.951563][T12663] ? mutex_unlock+0xd/0x10 [ 246.951572][T12663] ? kernfs_activate+0x4c7/0x4e0 [ 246.951589][T12663] kernfs_new_node+0x97/0x170 [ 246.951603][T12663] __kernfs_create_file+0x4a/0x2f0 [ 246.951615][T12663] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 246.951630][T12663] internal_create_group+0x4be/0xd80 [ 246.951650][T12663] sysfs_create_group+0x1f/0x30 [ 246.951660][T12663] loop_set_fd+0xf54/0x1470 [ 246.951681][T12663] lo_ioctl+0xd5/0x2200 [ 246.951689][T12663] ? __kasan_slab_free+0x12a/0x1e0 [ 246.951695][T12663] ? kasan_slab_free+0xe/0x10 [ 246.951708][T12663] ? kfree+0x115/0x200 [ 246.969374][T12663] ? tomoyo_path_number_perm+0x4e1/0x640 [ 246.969385][T12663] ? tomoyo_file_ioctl+0x23/0x30 [ 246.969395][T12663] ? security_file_ioctl+0x6d/0xd0 [ 246.969405][T12663] ? __x64_sys_ioctl+0xa3/0x120 [ 246.969415][T12663] ? do_syscall_64+0xf7/0x1c0 [ 246.969426][T12663] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.969439][T12663] ? debug_check_no_obj_freed+0x505/0x5b0 [ 246.969462][T12663] ? rcu_lock_release+0x9/0x30 [ 246.969477][T12663] ? rcu_lock_release+0x9/0x30 [ 246.969488][T12663] ? lo_release+0x1f0/0x1f0 [ 246.969496][T12663] blkdev_ioctl+0x807/0x2980 [ 246.969509][T12663] ? tomoyo_path_number_perm+0x53e/0x640 [ 246.978951][T12663] block_ioctl+0xbd/0x100 [ 246.978963][T12663] ? blkdev_iopoll+0x100/0x100 [ 246.978975][T12663] do_vfs_ioctl+0x744/0x1730 [ 246.978984][T12663] ? __fget+0x431/0x510 [ 246.979000][T12663] ? tomoyo_file_ioctl+0x23/0x30 [ 246.979010][T12663] ? security_file_ioctl+0xa1/0xd0 [ 246.979022][T12663] __x64_sys_ioctl+0xe3/0x120 [ 246.979035][T12663] do_syscall_64+0xf7/0x1c0 [ 246.979050][T12663] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.988539][T12663] RIP: 0033:0x45a4a7 [ 246.988550][T12663] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 246.988556][T12663] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 246.988566][T12663] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 246.988572][T12663] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 246.988578][T12663] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 246.988582][T12663] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 246.988587][T12663] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 247.104838][T12672] FAULT_INJECTION: forcing a failure. [ 247.104838][T12672] name failslab, interval 1, probability 0, space 0, times 0 [ 247.122372][T12672] CPU: 1 PID: 12672 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 247.127405][T12672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.127412][T12672] Call Trace: [ 247.127429][T12672] dump_stack+0x1fb/0x318 [ 247.127446][T12672] should_fail+0x555/0x770 [ 247.276320][T12672] __should_failslab+0x11a/0x160 [ 247.281241][T12672] ? __se_sys_memfd_create+0x10a/0x4b0 [ 247.286727][T12672] should_failslab+0x9/0x20 [ 247.291206][T12672] __kmalloc+0x7a/0x340 [ 247.295347][T12672] __se_sys_memfd_create+0x10a/0x4b0 [ 247.300610][T12672] ? do_syscall_64+0x1d/0x1c0 [ 247.305269][T12672] __x64_sys_memfd_create+0x5b/0x70 [ 247.310446][T12672] do_syscall_64+0xf7/0x1c0 [ 247.314931][T12672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.320800][T12672] RIP: 0033:0x45a639 [ 247.324672][T12672] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.344393][T12672] RSP: 002b:00007fd4a6890a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 247.352786][T12672] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a639 [ 247.360740][T12672] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 247.368694][T12672] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 247.376643][T12672] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fd4a68916d4 [ 247.384594][T12672] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:02 executing program 4 (fault-call:1 fault-nth:1): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btr\\s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 247.578521][T12685] FAULT_INJECTION: forcing a failure. [ 247.578521][T12685] name failslab, interval 1, probability 0, space 0, times 0 [ 247.630040][T12685] CPU: 1 PID: 12685 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 247.637991][T12685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.648043][T12685] Call Trace: [ 247.648063][T12685] dump_stack+0x1fb/0x318 [ 247.648080][T12685] should_fail+0x555/0x770 [ 247.648098][T12685] __should_failslab+0x11a/0x160 [ 247.648110][T12685] ? shmem_alloc_inode+0x1b/0x40 [ 247.648119][T12685] should_failslab+0x9/0x20 [ 247.648127][T12685] kmem_cache_alloc+0x56/0x2e0 [ 247.648136][T12685] ? shmem_match+0x180/0x180 [ 247.648146][T12685] shmem_alloc_inode+0x1b/0x40 [ 247.648162][T12685] ? shmem_match+0x180/0x180 [ 247.648171][T12685] new_inode_pseudo+0x68/0x240 [ 247.648182][T12685] new_inode+0x28/0x1c0 [ 247.648197][T12685] shmem_get_inode+0x108/0x6e0 [ 247.656362][T12685] __shmem_file_setup+0x129/0x280 [ 247.656381][T12685] shmem_file_setup+0x2f/0x40 [ 247.656394][T12685] __se_sys_memfd_create+0x28e/0x4b0 [ 247.656411][T12685] ? do_syscall_64+0x1d/0x1c0 [ 247.727190][T12685] __x64_sys_memfd_create+0x5b/0x70 [ 247.732656][T12685] do_syscall_64+0xf7/0x1c0 [ 247.737180][T12685] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.743079][T12685] RIP: 0033:0x45a639 [ 247.746970][T12685] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.766707][T12685] RSP: 002b:00007fd4a6890a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 01:02:02 executing program 2 (fault-call:3 fault-nth:29): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 247.775128][T12685] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a639 [ 247.783096][T12685] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 247.791062][T12685] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 247.799115][T12685] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fd4a68916d4 [ 247.807086][T12685] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:02 executing program 4 (fault-call:1 fault-nth:2): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 247.966582][T12700] FAULT_INJECTION: forcing a failure. [ 247.966582][T12700] name failslab, interval 1, probability 0, space 0, times 0 [ 248.005823][T12700] CPU: 0 PID: 12700 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 248.013751][T12700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.013757][T12700] Call Trace: [ 248.013774][T12700] dump_stack+0x1fb/0x318 [ 248.013791][T12700] should_fail+0x555/0x770 [ 248.013808][T12700] __should_failslab+0x11a/0x160 [ 248.013824][T12700] ? __kernfs_new_node+0x97/0x6b0 [ 248.013833][T12700] should_failslab+0x9/0x20 [ 248.013842][T12700] kmem_cache_alloc+0x56/0x2e0 [ 248.013856][T12700] __kernfs_new_node+0x97/0x6b0 [ 248.027324][T12700] ? mutex_unlock+0xd/0x10 [ 248.027337][T12700] ? kernfs_activate+0x4c7/0x4e0 [ 248.027353][T12700] kernfs_new_node+0x97/0x170 [ 248.027366][T12700] __kernfs_create_file+0x4a/0x2f0 [ 248.027378][T12700] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 248.027396][T12700] internal_create_group+0x4be/0xd80 [ 248.027416][T12700] sysfs_create_group+0x1f/0x30 [ 248.036159][T12700] loop_set_fd+0xf54/0x1470 [ 248.036180][T12700] lo_ioctl+0xd5/0x2200 [ 248.036191][T12700] ? __kasan_slab_free+0x12a/0x1e0 [ 248.036197][T12700] ? kasan_slab_free+0xe/0x10 [ 248.036211][T12700] ? kfree+0x115/0x200 [ 248.046605][T12700] ? tomoyo_path_number_perm+0x4e1/0x640 [ 248.046615][T12700] ? tomoyo_file_ioctl+0x23/0x30 [ 248.046625][T12700] ? security_file_ioctl+0x6d/0xd0 [ 248.046633][T12700] ? __x64_sys_ioctl+0xa3/0x120 [ 248.046652][T12700] ? do_syscall_64+0xf7/0x1c0 [ 248.055866][T12700] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.055881][T12700] ? debug_check_no_obj_freed+0x505/0x5b0 [ 248.055907][T12700] ? rcu_lock_release+0x9/0x30 [ 248.055923][T12700] ? rcu_lock_release+0x9/0x30 [ 248.065143][T12700] ? lo_release+0x1f0/0x1f0 [ 248.065165][T12700] blkdev_ioctl+0x807/0x2980 [ 248.065180][T12700] ? tomoyo_path_number_perm+0x53e/0x640 [ 248.065209][T12700] block_ioctl+0xbd/0x100 [ 248.184940][T12700] ? blkdev_iopoll+0x100/0x100 [ 248.189715][T12700] do_vfs_ioctl+0x744/0x1730 [ 248.194295][T12700] ? __fget+0x431/0x510 [ 248.198449][T12700] ? tomoyo_file_ioctl+0x23/0x30 [ 248.203473][T12700] ? security_file_ioctl+0xa1/0xd0 [ 248.208582][T12700] __x64_sys_ioctl+0xe3/0x120 [ 248.213339][T12700] do_syscall_64+0xf7/0x1c0 [ 248.217826][T12700] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.223698][T12700] RIP: 0033:0x45a4a7 [ 248.227581][T12700] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 248.247165][T12700] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 248.255557][T12700] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 01:02:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 248.263511][T12700] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 248.271464][T12700] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 248.279421][T12700] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 248.287385][T12700] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 248.354342][T12716] FAULT_INJECTION: forcing a failure. [ 248.354342][T12716] name failslab, interval 1, probability 0, space 0, times 0 [ 248.378881][T12716] CPU: 0 PID: 12716 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 248.386809][T12716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.396873][T12716] Call Trace: [ 248.400180][T12716] dump_stack+0x1fb/0x318 [ 248.404564][T12716] should_fail+0x555/0x770 [ 248.408999][T12716] __should_failslab+0x11a/0x160 [ 248.413951][T12716] ? security_inode_alloc+0x36/0x1e0 [ 248.419259][T12716] should_failslab+0x9/0x20 [ 248.423771][T12716] kmem_cache_alloc+0x56/0x2e0 [ 248.428626][T12716] ? rcu_read_lock_sched_held+0x10b/0x170 [ 248.434488][T12716] security_inode_alloc+0x36/0x1e0 [ 248.439601][T12716] inode_init_always+0x3b5/0x920 [ 248.444536][T12716] ? shmem_match+0x180/0x180 [ 248.450075][T12716] new_inode_pseudo+0x7f/0x240 [ 248.454900][T12716] new_inode+0x28/0x1c0 [ 248.459072][T12716] shmem_get_inode+0x108/0x6e0 [ 248.463840][T12716] __shmem_file_setup+0x129/0x280 [ 248.469054][T12716] shmem_file_setup+0x2f/0x40 [ 248.473735][T12716] __se_sys_memfd_create+0x28e/0x4b0 [ 248.479013][T12716] ? do_syscall_64+0x1d/0x1c0 [ 248.483687][T12716] __x64_sys_memfd_create+0x5b/0x70 [ 248.488871][T12716] do_syscall_64+0xf7/0x1c0 [ 248.493379][T12716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.499261][T12716] RIP: 0033:0x45a639 [ 248.503135][T12716] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 248.522990][T12716] RSP: 002b:00007fd4a6890a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 248.531394][T12716] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a639 [ 248.539351][T12716] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 248.547321][T12716] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 01:02:03 executing program 4 (fault-call:1 fault-nth:3): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 248.555283][T12716] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fd4a68916d4 [ 248.563244][T12716] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff}) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) socket$nl_generic(0x10, 0x3, 0x10) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 248.652652][T12725] FAULT_INJECTION: forcing a failure. [ 248.652652][T12725] name failslab, interval 1, probability 0, space 0, times 0 [ 248.670488][T12725] CPU: 0 PID: 12725 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 248.678413][T12725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.688482][T12725] Call Trace: [ 248.691784][T12725] dump_stack+0x1fb/0x318 [ 248.696139][T12725] should_fail+0x555/0x770 01:02:03 executing program 2 (fault-call:3 fault-nth:30): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 248.700587][T12725] __should_failslab+0x11a/0x160 [ 248.705541][T12725] ? __d_alloc+0x2d/0x6e0 [ 248.709879][T12725] should_failslab+0x9/0x20 [ 248.714383][T12725] kmem_cache_alloc+0x56/0x2e0 [ 248.714400][T12725] __d_alloc+0x2d/0x6e0 [ 248.714412][T12725] ? lockdep_init_map+0x2a/0x680 [ 248.714424][T12725] d_alloc_pseudo+0x1d/0x70 [ 248.728247][T12725] alloc_file_pseudo+0xc3/0x260 [ 248.728269][T12725] __shmem_file_setup+0x1a2/0x280 [ 248.728283][T12725] shmem_file_setup+0x2f/0x40 [ 248.728295][T12725] __se_sys_memfd_create+0x28e/0x4b0 [ 248.728306][T12725] ? do_syscall_64+0x1d/0x1c0 [ 248.728317][T12725] __x64_sys_memfd_create+0x5b/0x70 [ 248.728330][T12725] do_syscall_64+0xf7/0x1c0 [ 248.769202][T12725] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.775104][T12725] RIP: 0033:0x45a639 [ 248.779009][T12725] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:02:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:03 executing program 4 (fault-call:1 fault-nth:4): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 248.798618][T12725] RSP: 002b:00007fd4a6890a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 248.798632][T12725] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a639 [ 248.798637][T12725] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 248.798642][T12725] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 248.798647][T12725] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fd4a68916d4 [ 248.798652][T12725] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) socket$nl_generic(0x10, 0x3, 0x10) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 248.878500][T12731] FAULT_INJECTION: forcing a failure. [ 248.878500][T12731] name failslab, interval 1, probability 0, space 0, times 0 [ 248.905491][T12731] CPU: 0 PID: 12731 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 248.913492][T12731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.913497][T12731] Call Trace: [ 248.913515][T12731] dump_stack+0x1fb/0x318 [ 248.913531][T12731] should_fail+0x555/0x770 [ 248.913551][T12731] __should_failslab+0x11a/0x160 [ 248.913563][T12731] ? __kernfs_new_node+0x97/0x6b0 [ 248.913572][T12731] should_failslab+0x9/0x20 [ 248.913580][T12731] kmem_cache_alloc+0x56/0x2e0 [ 248.913596][T12731] __kernfs_new_node+0x97/0x6b0 [ 248.926963][T12731] ? mutex_unlock+0xd/0x10 [ 248.926976][T12731] ? kernfs_activate+0x4c7/0x4e0 [ 248.926991][T12731] kernfs_new_node+0x97/0x170 [ 248.927003][T12731] __kernfs_create_file+0x4a/0x2f0 [ 248.927014][T12731] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 248.927032][T12731] internal_create_group+0x4be/0xd80 [ 248.927053][T12731] sysfs_create_group+0x1f/0x30 [ 248.927063][T12731] loop_set_fd+0xf54/0x1470 [ 248.927086][T12731] lo_ioctl+0xd5/0x2200 [ 248.927096][T12731] ? __kasan_slab_free+0x12a/0x1e0 [ 248.927107][T12731] ? kasan_slab_free+0xe/0x10 [ 248.935836][T12731] ? kfree+0x115/0x200 [ 248.935848][T12731] ? tomoyo_path_number_perm+0x4e1/0x640 [ 248.935857][T12731] ? tomoyo_file_ioctl+0x23/0x30 [ 248.935867][T12731] ? security_file_ioctl+0x6d/0xd0 [ 248.935876][T12731] ? __x64_sys_ioctl+0xa3/0x120 [ 248.935887][T12731] ? do_syscall_64+0xf7/0x1c0 [ 248.935897][T12731] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.935912][T12731] ? debug_check_no_obj_freed+0x505/0x5b0 [ 248.935936][T12731] ? rcu_lock_release+0x9/0x30 [ 248.935954][T12731] ? rcu_lock_release+0x9/0x30 [ 248.935964][T12731] ? lo_release+0x1f0/0x1f0 [ 248.935977][T12731] blkdev_ioctl+0x807/0x2980 [ 248.946253][T12731] ? tomoyo_path_number_perm+0x53e/0x640 [ 248.946283][T12731] block_ioctl+0xbd/0x100 [ 248.946292][T12731] ? blkdev_iopoll+0x100/0x100 [ 248.946304][T12731] do_vfs_ioctl+0x744/0x1730 [ 248.946313][T12731] ? __fget+0x431/0x510 [ 248.946328][T12731] ? tomoyo_file_ioctl+0x23/0x30 [ 248.946339][T12731] ? security_file_ioctl+0xa1/0xd0 [ 248.946353][T12731] __x64_sys_ioctl+0xe3/0x120 [ 248.946369][T12731] do_syscall_64+0xf7/0x1c0 [ 248.955603][T12731] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.955615][T12731] RIP: 0033:0x45a4a7 [ 248.955625][T12731] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 248.955630][T12731] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 248.955639][T12731] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 248.955645][T12731] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 248.955651][T12731] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 248.955657][T12731] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 248.955667][T12731] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) socket$nl_generic(0x10, 0x3, 0x10) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 249.275796][T12747] FAULT_INJECTION: forcing a failure. [ 249.275796][T12747] name failslab, interval 1, probability 0, space 0, times 0 [ 249.304272][T12747] CPU: 1 PID: 12747 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 249.312200][T12747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.322259][T12747] Call Trace: [ 249.325540][T12747] dump_stack+0x1fb/0x318 [ 249.329859][T12747] should_fail+0x555/0x770 [ 249.334262][T12747] __should_failslab+0x11a/0x160 [ 249.339200][T12747] ? __alloc_file+0x2c/0x390 [ 249.343776][T12747] should_failslab+0x9/0x20 [ 249.348261][T12747] kmem_cache_alloc+0x56/0x2e0 [ 249.353023][T12747] __alloc_file+0x2c/0x390 [ 249.358032][T12747] alloc_empty_file+0xac/0x1b0 [ 249.362774][T12747] alloc_file+0x60/0x4c0 [ 249.367013][T12747] alloc_file_pseudo+0x1d4/0x260 [ 249.371936][T12747] __shmem_file_setup+0x1a2/0x280 [ 249.376939][T12747] shmem_file_setup+0x2f/0x40 [ 249.381599][T12747] __se_sys_memfd_create+0x28e/0x4b0 [ 249.386870][T12747] ? do_syscall_64+0x1d/0x1c0 [ 249.391551][T12747] __x64_sys_memfd_create+0x5b/0x70 [ 249.396757][T12747] do_syscall_64+0xf7/0x1c0 [ 249.401259][T12747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.407145][T12747] RIP: 0033:0x45a639 [ 249.411033][T12747] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.430619][T12747] RSP: 002b:00007fd4a6890a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 249.439017][T12747] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a639 [ 249.447690][T12747] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 249.455742][T12747] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 249.463789][T12747] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fd4a68916d4 [ 249.471861][T12747] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:04 executing program 4 (fault-call:1 fault-nth:5): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:04 executing program 2 (fault-call:3 fault-nth:31): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 249.649799][T12762] FAULT_INJECTION: forcing a failure. [ 249.649799][T12762] name failslab, interval 1, probability 0, space 0, times 0 [ 249.671793][T12762] CPU: 0 PID: 12762 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 249.679717][T12762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.689773][T12762] Call Trace: [ 249.693072][T12762] dump_stack+0x1fb/0x318 [ 249.697505][T12762] should_fail+0x555/0x770 [ 249.701924][T12762] __should_failslab+0x11a/0x160 [ 249.701938][T12762] ? security_file_alloc+0x36/0x200 [ 249.701948][T12762] should_failslab+0x9/0x20 [ 249.701958][T12762] kmem_cache_alloc+0x56/0x2e0 [ 249.701971][T12762] security_file_alloc+0x36/0x200 [ 249.701985][T12762] __alloc_file+0xde/0x390 [ 249.701998][T12762] alloc_empty_file+0xac/0x1b0 [ 249.712111][T12762] alloc_file+0x60/0x4c0 [ 249.721423][T12762] alloc_file_pseudo+0x1d4/0x260 [ 249.721441][T12762] __shmem_file_setup+0x1a2/0x280 01:02:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff}) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:04 executing program 4 (fault-call:1 fault-nth:6): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 249.721454][T12762] shmem_file_setup+0x2f/0x40 [ 249.721473][T12762] __se_sys_memfd_create+0x28e/0x4b0 [ 249.730883][T12762] ? do_syscall_64+0x1d/0x1c0 [ 249.730899][T12762] __x64_sys_memfd_create+0x5b/0x70 [ 249.730908][T12762] do_syscall_64+0xf7/0x1c0 [ 249.730922][T12762] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.730931][T12762] RIP: 0033:0x45a639 01:02:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 249.730941][T12762] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.730946][T12762] RSP: 002b:00007fd4a6890a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 249.730955][T12762] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a639 [ 249.730960][T12762] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 249.730968][T12762] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 249.740129][T12762] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fd4a68916d4 [ 249.750151][T12762] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 249.915041][T12771] FAULT_INJECTION: forcing a failure. [ 249.915041][T12771] name failslab, interval 1, probability 0, space 0, times 0 [ 249.928587][T12771] CPU: 1 PID: 12771 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 249.936498][T12771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.946550][T12771] Call Trace: [ 249.946570][T12771] dump_stack+0x1fb/0x318 [ 249.946588][T12771] should_fail+0x555/0x770 [ 249.946607][T12771] __should_failslab+0x11a/0x160 [ 249.946620][T12771] ? kzalloc+0x26/0x40 [ 249.946634][T12771] should_failslab+0x9/0x20 [ 249.972150][T12771] __kmalloc+0x7a/0x340 [ 249.976314][T12771] kzalloc+0x26/0x40 [ 249.976327][T12771] kobject_get_path+0xa7/0x1d0 [ 249.976340][T12771] kobject_uevent_env+0x2f2/0x1260 [ 249.976363][T12771] kobject_uevent+0x1f/0x30 [ 249.976373][T12771] loop_set_fd+0xfc3/0x1470 [ 249.976393][T12771] lo_ioctl+0xd5/0x2200 [ 249.985020][T12771] ? __kasan_slab_free+0x12a/0x1e0 [ 249.985035][T12771] ? kasan_slab_free+0xe/0x10 [ 249.985044][T12771] ? kfree+0x115/0x200 [ 249.985054][T12771] ? tomoyo_path_number_perm+0x4e1/0x640 [ 249.985064][T12771] ? tomoyo_file_ioctl+0x23/0x30 [ 249.985074][T12771] ? security_file_ioctl+0x6d/0xd0 [ 249.985082][T12771] ? __x64_sys_ioctl+0xa3/0x120 [ 249.985096][T12771] ? do_syscall_64+0xf7/0x1c0 [ 249.994659][T12771] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.994676][T12771] ? debug_check_no_obj_freed+0x505/0x5b0 [ 249.994704][T12771] ? rcu_lock_release+0x9/0x30 [ 249.994720][T12771] ? rcu_lock_release+0x9/0x30 [ 249.994733][T12771] ? lo_release+0x1f0/0x1f0 [ 250.003342][T12771] blkdev_ioctl+0x807/0x2980 [ 250.003358][T12771] ? tomoyo_path_number_perm+0x53e/0x640 [ 250.003391][T12771] block_ioctl+0xbd/0x100 [ 250.003400][T12771] ? blkdev_iopoll+0x100/0x100 [ 250.003413][T12771] do_vfs_ioctl+0x744/0x1730 [ 250.013149][T12771] ? __fget+0x431/0x510 [ 250.013168][T12771] ? tomoyo_file_ioctl+0x23/0x30 [ 250.013180][T12771] ? security_file_ioctl+0xa1/0xd0 [ 250.013194][T12771] __x64_sys_ioctl+0xe3/0x120 [ 250.013208][T12771] do_syscall_64+0xf7/0x1c0 [ 250.013222][T12771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.022870][T12771] RIP: 0033:0x45a4a7 [ 250.022881][T12771] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 250.022887][T12771] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 250.022898][T12771] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 250.022904][T12771] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 250.022909][T12771] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 250.022915][T12771] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 250.022921][T12771] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 250.096767][T12783] FAULT_INJECTION: forcing a failure. [ 250.096767][T12783] name failslab, interval 1, probability 0, space 0, times 0 [ 250.110724][T12783] CPU: 1 PID: 12783 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 01:02:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 250.126941][T12783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.126947][T12783] Call Trace: [ 250.126965][T12783] dump_stack+0x1fb/0x318 [ 250.126983][T12783] should_fail+0x555/0x770 [ 250.127000][T12783] __should_failslab+0x11a/0x160 [ 250.155100][T12783] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 250.155111][T12783] should_failslab+0x9/0x20 [ 250.155120][T12783] __kmalloc+0x7a/0x340 [ 250.155130][T12783] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 250.155141][T12783] tomoyo_realpath_from_path+0xdc/0x7c0 [ 250.155158][T12783] tomoyo_path_perm+0x192/0x850 [ 250.171207][T12783] tomoyo_path_truncate+0x1c/0x20 [ 250.171218][T12783] security_path_truncate+0xd5/0x150 [ 250.171232][T12783] do_sys_ftruncate+0x493/0x710 [ 250.171246][T12783] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 250.171260][T12783] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 250.187186][T12783] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 250.187199][T12783] ? do_syscall_64+0x1d/0x1c0 [ 250.187213][T12783] __x64_sys_ftruncate+0x60/0x70 [ 250.187225][T12783] do_syscall_64+0xf7/0x1c0 [ 250.187242][T12783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.207764][T12783] RIP: 0033:0x45a607 [ 250.207774][T12783] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 250.207779][T12783] RSP: 002b:00007fd4a6890a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 250.207788][T12783] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a607 01:02:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x0, 0x0}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 250.207794][T12783] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000005 [ 250.207799][T12783] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 250.207805][T12783] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000005 [ 250.207811][T12783] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 250.256332][T12783] ERROR: Out of memory at tomoyo_realpath_from_path. 01:02:05 executing program 2 (fault-call:3 fault-nth:32): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:05 executing program 4 (fault-call:1 fault-nth:7): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 250.616725][T12804] FAULT_INJECTION: forcing a failure. [ 250.616725][T12804] name failslab, interval 1, probability 0, space 0, times 0 [ 250.651129][T12804] CPU: 1 PID: 12804 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 250.659072][T12804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.669126][T12804] Call Trace: [ 250.672419][T12804] dump_stack+0x1fb/0x318 [ 250.676740][T12804] should_fail+0x555/0x770 [ 250.681143][T12804] __should_failslab+0x11a/0x160 [ 250.686066][T12804] ? skb_clone+0x1cc/0x380 [ 250.690475][T12804] should_failslab+0x9/0x20 [ 250.694978][T12804] kmem_cache_alloc+0x56/0x2e0 [ 250.699722][T12804] skb_clone+0x1cc/0x380 [ 250.703995][T12804] netlink_broadcast_filtered+0x619/0x1080 [ 250.709790][T12804] netlink_broadcast+0x3a/0x50 [ 250.714543][T12804] kobject_uevent_env+0xcf1/0x1260 [ 250.719640][T12804] kobject_uevent+0x1f/0x30 [ 250.724137][T12804] loop_set_fd+0xfc3/0x1470 [ 250.729758][T12804] lo_ioctl+0xd5/0x2200 [ 250.734019][T12804] ? __kasan_slab_free+0x12a/0x1e0 [ 250.739126][T12804] ? kasan_slab_free+0xe/0x10 [ 250.743788][T12804] ? kfree+0x115/0x200 [ 250.747833][T12804] ? tomoyo_path_number_perm+0x4e1/0x640 [ 250.753441][T12804] ? tomoyo_file_ioctl+0x23/0x30 [ 250.758498][T12804] ? security_file_ioctl+0x6d/0xd0 [ 250.763677][T12804] ? __x64_sys_ioctl+0xa3/0x120 [ 250.768605][T12804] ? do_syscall_64+0xf7/0x1c0 [ 250.773493][T12804] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.779570][T12804] ? debug_check_no_obj_freed+0x505/0x5b0 [ 250.785282][T12804] ? rcu_lock_release+0x9/0x30 [ 250.790034][T12804] ? rcu_lock_release+0x9/0x30 [ 250.794789][T12804] ? lo_release+0x1f0/0x1f0 [ 250.799292][T12804] blkdev_ioctl+0x807/0x2980 [ 250.803872][T12804] ? tomoyo_path_number_perm+0x53e/0x640 [ 250.809504][T12804] block_ioctl+0xbd/0x100 [ 250.813826][T12804] ? blkdev_iopoll+0x100/0x100 [ 250.818578][T12804] do_vfs_ioctl+0x744/0x1730 [ 250.823164][T12804] ? __fget+0x431/0x510 [ 250.827314][T12804] ? tomoyo_file_ioctl+0x23/0x30 [ 250.832233][T12804] ? security_file_ioctl+0xa1/0xd0 [ 250.837328][T12804] __x64_sys_ioctl+0xe3/0x120 [ 250.841989][T12804] do_syscall_64+0xf7/0x1c0 [ 250.846485][T12804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.852357][T12804] RIP: 0033:0x45a4a7 [ 250.856229][T12804] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 250.875990][T12804] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 250.884380][T12804] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 250.892352][T12804] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 250.900311][T12804] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 250.908280][T12804] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 250.916246][T12804] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff}) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 251.019585][T12814] FAULT_INJECTION: forcing a failure. [ 251.019585][T12814] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 251.032899][T12814] CPU: 0 PID: 12814 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 251.032907][T12814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.032911][T12814] Call Trace: [ 251.032929][T12814] dump_stack+0x1fb/0x318 [ 251.032946][T12814] should_fail+0x555/0x770 [ 251.050886][T12814] should_fail_alloc_page+0x55/0x60 [ 251.050897][T12814] prepare_alloc_pages+0x283/0x460 [ 251.050911][T12814] __alloc_pages_nodemask+0xb2/0x5d0 [ 251.050930][T12814] kmem_getpages+0x4d/0xa00 [ 251.050943][T12814] cache_grow_begin+0x7e/0x2c0 [ 251.050956][T12814] cache_alloc_refill+0x311/0x3f0 [ 251.050970][T12814] ? check_preemption_disabled+0xb7/0x2a0 [ 251.058552][T12814] __kmalloc+0x318/0x340 [ 251.058569][T12814] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 251.058583][T12814] tomoyo_realpath_from_path+0xdc/0x7c0 01:02:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 251.058600][T12814] tomoyo_path_perm+0x192/0x850 [ 251.058633][T12814] tomoyo_path_truncate+0x1c/0x20 [ 251.058643][T12814] security_path_truncate+0xd5/0x150 [ 251.058656][T12814] do_sys_ftruncate+0x493/0x710 [ 251.058671][T12814] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 251.058682][T12814] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 251.058691][T12814] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 251.058699][T12814] ? do_syscall_64+0x1d/0x1c0 [ 251.058711][T12814] __x64_sys_ftruncate+0x60/0x70 [ 251.058724][T12814] do_syscall_64+0xf7/0x1c0 [ 251.068393][T12814] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.068403][T12814] RIP: 0033:0x45a607 [ 251.068414][T12814] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 251.068419][T12814] RSP: 002b:00007fd4a6890a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 251.068429][T12814] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a607 [ 251.068434][T12814] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000005 [ 251.068440][T12814] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 251.068445][T12814] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000005 [ 251.068450][T12814] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x0, 0x0}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:06 executing program 2 (fault-call:3 fault-nth:33): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:06 executing program 4 (fault-call:1 fault-nth:8): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 251.426459][T12828] FAULT_INJECTION: forcing a failure. [ 251.426459][T12828] name failslab, interval 1, probability 0, space 0, times 0 [ 251.468462][T12828] CPU: 0 PID: 12828 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 251.476567][T12828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.486631][T12828] Call Trace: [ 251.490886][T12828] dump_stack+0x1fb/0x318 [ 251.495227][T12828] should_fail+0x555/0x770 [ 251.499649][T12828] __should_failslab+0x11a/0x160 [ 251.504935][T12828] ? kzalloc+0x26/0x40 [ 251.508998][T12828] should_failslab+0x9/0x20 [ 251.513495][T12828] __kmalloc+0x7a/0x340 [ 251.517666][T12828] kzalloc+0x26/0x40 [ 251.521559][T12828] kobject_get_path+0xa7/0x1d0 [ 251.526338][T12828] kobject_uevent_env+0x2f2/0x1260 [ 251.531459][T12828] kobject_uevent+0x1f/0x30 [ 251.535954][T12828] loop_set_fd+0xfc3/0x1470 [ 251.540468][T12828] lo_ioctl+0xd5/0x2200 [ 251.544618][T12828] ? __kasan_slab_free+0x12a/0x1e0 [ 251.549722][T12828] ? kasan_slab_free+0xe/0x10 [ 251.554392][T12828] ? kfree+0x115/0x200 [ 251.559002][T12828] ? tomoyo_path_number_perm+0x4e1/0x640 [ 251.564639][T12828] ? tomoyo_file_ioctl+0x23/0x30 [ 251.569574][T12828] ? security_file_ioctl+0x6d/0xd0 [ 251.574680][T12828] ? __x64_sys_ioctl+0xa3/0x120 [ 251.579532][T12828] ? do_syscall_64+0xf7/0x1c0 [ 251.584203][T12828] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.590310][T12828] ? debug_check_no_obj_freed+0x505/0x5b0 [ 251.596050][T12828] ? rcu_lock_release+0x9/0x30 [ 251.600923][T12828] ? rcu_lock_release+0x9/0x30 [ 251.605703][T12828] ? lo_release+0x1f0/0x1f0 [ 251.610217][T12828] blkdev_ioctl+0x807/0x2980 [ 251.614816][T12828] ? tomoyo_path_number_perm+0x53e/0x640 [ 251.620655][T12828] block_ioctl+0xbd/0x100 [ 251.624989][T12828] ? blkdev_iopoll+0x100/0x100 [ 251.629783][T12828] do_vfs_ioctl+0x744/0x1730 [ 251.634385][T12828] ? __fget+0x431/0x510 [ 251.638552][T12828] ? tomoyo_file_ioctl+0x23/0x30 [ 251.643505][T12828] ? security_file_ioctl+0xa1/0xd0 [ 251.648628][T12828] __x64_sys_ioctl+0xe3/0x120 [ 251.653319][T12828] do_syscall_64+0xf7/0x1c0 [ 251.657831][T12828] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.663724][T12828] RIP: 0033:0x45a4a7 [ 251.667625][T12828] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 251.687235][T12828] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 251.695649][T12828] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 251.703646][T12828] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 251.711615][T12828] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 01:02:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 251.719723][T12828] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 251.727727][T12828] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 251.755365][T12833] FAULT_INJECTION: forcing a failure. [ 251.755365][T12833] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 251.775246][T12833] CPU: 1 PID: 12833 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 251.783170][T12833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.793228][T12833] Call Trace: [ 251.796519][T12833] dump_stack+0x1fb/0x318 [ 251.800843][T12833] should_fail+0x555/0x770 [ 251.805277][T12833] should_fail_alloc_page+0x55/0x60 [ 251.810461][T12833] prepare_alloc_pages+0x283/0x460 [ 251.815581][T12833] __alloc_pages_nodemask+0xb2/0x5d0 [ 251.820860][T12833] alloc_pages_vma+0x4f7/0xd50 [ 251.825617][T12833] shmem_alloc_and_acct_page+0x425/0xbb0 [ 251.831252][T12833] shmem_getpage_gfp+0x2313/0x2a90 [ 251.836362][T12833] shmem_write_begin+0xcb/0x1b0 [ 251.841201][T12833] generic_perform_write+0x25d/0x4e0 [ 251.846482][T12833] __generic_file_write_iter+0x235/0x500 [ 251.852104][T12833] generic_file_write_iter+0x48e/0x630 [ 251.857582][T12833] __vfs_write+0x5a1/0x740 [ 251.862010][T12833] vfs_write+0x275/0x590 [ 251.866238][T12833] __x64_sys_pwrite64+0x162/0x1d0 [ 251.871250][T12833] do_syscall_64+0xf7/0x1c0 [ 251.875749][T12833] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.881654][T12833] RIP: 0033:0x414437 [ 251.885533][T12833] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 251.905385][T12833] RSP: 002b:00007fd4a6890a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 251.913784][T12833] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000414437 [ 251.921744][T12833] RDX: 0000000000000048 RSI: 00000000200002c0 RDI: 0000000000000005 [ 251.929703][T12833] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 251.937690][T12833] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 251.945645][T12833] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:06 executing program 2 (fault-call:3 fault-nth:34): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:06 executing program 5: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x0, 0x0}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:06 executing program 4 (fault-call:1 fault-nth:9): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 252.193972][T12844] FAULT_INJECTION: forcing a failure. [ 252.193972][T12844] name failslab, interval 1, probability 0, space 0, times 0 [ 252.208357][T12844] CPU: 1 PID: 12844 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 252.216525][T12844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.226595][T12844] Call Trace: [ 252.230105][T12844] dump_stack+0x1fb/0x318 [ 252.234464][T12844] should_fail+0x555/0x770 [ 252.238967][T12844] __should_failslab+0x11a/0x160 [ 252.243901][T12844] ? __d_alloc+0x2d/0x6e0 [ 252.248333][T12844] should_failslab+0x9/0x20 [ 252.252825][T12844] kmem_cache_alloc+0x56/0x2e0 [ 252.257579][T12844] __d_alloc+0x2d/0x6e0 [ 252.261720][T12844] d_alloc+0x4e/0x1d0 [ 252.265728][T12844] __lookup_hash+0xe5/0x290 [ 252.270222][T12844] filename_create+0x14f/0x670 [ 252.274976][T12844] ? getname_flags+0x214/0x640 [ 252.279737][T12844] do_mkdirat+0x5a/0x320 [ 252.284113][T12844] __x64_sys_mkdir+0x60/0x70 [ 252.288693][T12844] do_syscall_64+0xf7/0x1c0 [ 252.293219][T12844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.299159][T12844] RIP: 0033:0x459a57 [ 252.303047][T12844] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 252.322830][T12844] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 252.331525][T12844] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 01:02:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrf/\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:07 executing program 5: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 252.339483][T12844] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 252.347645][T12844] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 252.356874][T12844] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 252.364968][T12844] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 252.439894][T12853] FAULT_INJECTION: forcing a failure. [ 252.439894][T12853] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 252.476779][T12853] CPU: 1 PID: 12853 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 252.484960][T12853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.495722][T12853] Call Trace: [ 252.499125][T12853] dump_stack+0x1fb/0x318 [ 252.503470][T12853] should_fail+0x555/0x770 [ 252.507909][T12853] should_fail_alloc_page+0x55/0x60 [ 252.513113][T12853] prepare_alloc_pages+0x283/0x460 [ 252.518244][T12853] __alloc_pages_nodemask+0xb2/0x5d0 [ 252.523555][T12853] alloc_pages_vma+0x4f7/0xd50 [ 252.528330][T12853] shmem_alloc_and_acct_page+0x425/0xbb0 [ 252.534076][T12853] shmem_getpage_gfp+0x2313/0x2a90 [ 252.539230][T12853] shmem_write_begin+0xcb/0x1b0 [ 252.544228][T12853] generic_perform_write+0x25d/0x4e0 [ 252.549623][T12853] __generic_file_write_iter+0x235/0x500 [ 252.555273][T12853] generic_file_write_iter+0x48e/0x630 [ 252.560753][T12853] __vfs_write+0x5a1/0x740 [ 252.565188][T12853] vfs_write+0x275/0x590 [ 252.569443][T12853] __x64_sys_pwrite64+0x162/0x1d0 [ 252.574565][T12853] do_syscall_64+0xf7/0x1c0 [ 252.579080][T12853] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.584985][T12853] RIP: 0033:0x414437 [ 252.588898][T12853] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 252.608813][T12853] RSP: 002b:00007fd4a6890a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 252.617248][T12853] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000414437 [ 252.625631][T12853] RDX: 0000000000000048 RSI: 00000000200002c0 RDI: 0000000000000005 01:02:07 executing program 5: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 252.633810][T12853] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 252.641854][T12853] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 252.649840][T12853] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:07 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:07 executing program 4 (fault-call:1 fault-nth:10): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:07 executing program 2 (fault-call:3 fault-nth:35): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 252.944712][T12876] FAULT_INJECTION: forcing a failure. [ 252.944712][T12876] name failslab, interval 1, probability 0, space 0, times 0 [ 252.958072][T12876] CPU: 0 PID: 12876 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 252.966086][T12876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.976423][T12876] Call Trace: [ 252.979737][T12876] dump_stack+0x1fb/0x318 [ 252.984099][T12876] should_fail+0x555/0x770 [ 252.988694][T12876] __should_failslab+0x11a/0x160 [ 252.993661][T12876] ? xas_create+0x1197/0x1910 [ 252.998355][T12876] should_failslab+0x9/0x20 [ 253.002870][T12876] kmem_cache_alloc+0x56/0x2e0 [ 253.007647][T12876] xas_create+0x1197/0x1910 [ 253.012170][T12876] xas_create_range+0x142/0x700 [ 253.017523][T12876] shmem_add_to_page_cache+0x91e/0x1290 [ 253.023190][T12876] shmem_getpage_gfp+0x121e/0x2a90 [ 253.028354][T12876] shmem_write_begin+0xcb/0x1b0 [ 253.033215][T12876] generic_perform_write+0x25d/0x4e0 [ 253.038610][T12876] __generic_file_write_iter+0x235/0x500 [ 253.044259][T12876] generic_file_write_iter+0x48e/0x630 [ 253.049733][T12876] __vfs_write+0x5a1/0x740 [ 253.054174][T12876] vfs_write+0x275/0x590 [ 253.058434][T12876] __x64_sys_pwrite64+0x162/0x1d0 [ 253.063823][T12876] do_syscall_64+0xf7/0x1c0 [ 253.068627][T12876] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.074670][T12876] RIP: 0033:0x414437 [ 253.078625][T12876] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 253.100970][T12876] RSP: 002b:00007fd4a6890a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 253.109389][T12876] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000414437 [ 253.117458][T12876] RDX: 0000000000000048 RSI: 00000000200002c0 RDI: 0000000000000005 [ 253.125431][T12876] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 253.133507][T12876] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 01:02:07 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfL\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 253.141665][T12876] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 253.174512][T12875] FAULT_INJECTION: forcing a failure. [ 253.174512][T12875] name failslab, interval 1, probability 0, space 0, times 0 [ 253.188081][T12875] CPU: 0 PID: 12875 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 253.195997][T12875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.206058][T12875] Call Trace: [ 253.209373][T12875] dump_stack+0x1fb/0x318 [ 253.213718][T12875] should_fail+0x555/0x770 [ 253.218299][T12875] __should_failslab+0x11a/0x160 [ 253.223433][T12875] ? skb_clone+0x1cc/0x380 [ 253.229680][T12875] should_failslab+0x9/0x20 [ 253.234292][T12875] kmem_cache_alloc+0x56/0x2e0 [ 253.239870][T12875] skb_clone+0x1cc/0x380 [ 253.244398][T12875] netlink_broadcast_filtered+0x619/0x1080 [ 253.250311][T12875] netlink_broadcast+0x3a/0x50 [ 253.255086][T12875] kobject_uevent_env+0xcf1/0x1260 [ 253.260270][T12875] kobject_uevent+0x1f/0x30 [ 253.264980][T12875] loop_set_fd+0xfc3/0x1470 [ 253.269526][T12875] lo_ioctl+0xd5/0x2200 [ 253.273830][T12875] ? __kasan_slab_free+0x12a/0x1e0 [ 253.279410][T12875] ? kasan_slab_free+0xe/0x10 [ 253.284304][T12875] ? kfree+0x115/0x200 [ 253.288840][T12875] ? tomoyo_path_number_perm+0x4e1/0x640 [ 253.294846][T12875] ? tomoyo_file_ioctl+0x23/0x30 [ 253.299975][T12875] ? security_file_ioctl+0x6d/0xd0 [ 253.305098][T12875] ? __x64_sys_ioctl+0xa3/0x120 [ 253.310123][T12875] ? do_syscall_64+0xf7/0x1c0 [ 253.314897][T12875] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.321011][T12875] ? debug_check_no_obj_freed+0x505/0x5b0 [ 253.326850][T12875] ? rcu_lock_release+0x9/0x30 [ 253.331627][T12875] ? rcu_lock_release+0x9/0x30 [ 253.336492][T12875] ? lo_release+0x1f0/0x1f0 [ 253.341168][T12875] blkdev_ioctl+0x807/0x2980 [ 253.346306][T12875] ? tomoyo_path_number_perm+0x53e/0x640 [ 253.351972][T12875] block_ioctl+0xbd/0x100 [ 253.356507][T12875] ? blkdev_iopoll+0x100/0x100 [ 253.361290][T12875] do_vfs_ioctl+0x744/0x1730 [ 253.366032][T12875] ? __fget+0x431/0x510 [ 253.370237][T12875] ? tomoyo_file_ioctl+0x23/0x30 [ 253.375366][T12875] ? security_file_ioctl+0xa1/0xd0 [ 253.380514][T12875] __x64_sys_ioctl+0xe3/0x120 [ 253.385209][T12875] do_syscall_64+0xf7/0x1c0 [ 253.389738][T12875] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.395957][T12875] RIP: 0033:0x45a4a7 [ 253.399943][T12875] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 253.420031][T12875] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 253.429168][T12875] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 253.437236][T12875] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 253.445401][T12875] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 253.453414][T12875] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 253.461591][T12875] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:08 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:08 executing program 4 (fault-call:1 fault-nth:11): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 253.698398][T12889] FAULT_INJECTION: forcing a failure. [ 253.698398][T12889] name failslab, interval 1, probability 0, space 0, times 0 [ 253.711256][T12889] CPU: 0 PID: 12889 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 253.719325][T12889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.729567][T12889] Call Trace: [ 253.729587][T12889] dump_stack+0x1fb/0x318 [ 253.729602][T12889] should_fail+0x555/0x770 [ 253.729622][T12889] __should_failslab+0x11a/0x160 [ 253.746631][T12889] ? xas_create+0x1197/0x1910 [ 253.751309][T12889] should_failslab+0x9/0x20 [ 253.755907][T12889] kmem_cache_alloc+0x56/0x2e0 [ 253.760677][T12889] xas_create+0x1197/0x1910 [ 253.765547][T12889] xas_create_range+0x142/0x700 [ 253.770413][T12889] shmem_add_to_page_cache+0x91e/0x1290 [ 253.775997][T12889] shmem_getpage_gfp+0x121e/0x2a90 [ 253.781211][T12889] shmem_write_begin+0xcb/0x1b0 [ 253.786072][T12889] generic_perform_write+0x25d/0x4e0 [ 253.791555][T12889] __generic_file_write_iter+0x235/0x500 [ 253.797197][T12889] generic_file_write_iter+0x48e/0x630 [ 253.802674][T12889] __vfs_write+0x5a1/0x740 [ 253.807106][T12889] vfs_write+0x275/0x590 [ 253.811362][T12889] __x64_sys_pwrite64+0x162/0x1d0 [ 253.816489][T12889] do_syscall_64+0xf7/0x1c0 [ 253.821086][T12889] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.826987][T12889] RIP: 0033:0x414437 [ 253.830990][T12889] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 253.851292][T12889] RSP: 002b:00007fd4a6890a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 253.859844][T12889] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000414437 [ 253.867821][T12889] RDX: 0000000000000048 RSI: 00000000200002c0 RDI: 0000000000000005 [ 253.875798][T12889] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 253.883796][T12889] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 01:02:08 executing program 2 (fault-call:3 fault-nth:36): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 253.891801][T12889] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:08 executing program 4 (fault-call:1 fault-nth:12): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 254.068609][T12902] FAULT_INJECTION: forcing a failure. [ 254.068609][T12902] name failslab, interval 1, probability 0, space 0, times 0 [ 254.085951][T12902] CPU: 1 PID: 12902 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 254.093956][T12902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.104021][T12902] Call Trace: [ 254.107325][T12902] dump_stack+0x1fb/0x318 [ 254.111668][T12902] should_fail+0x555/0x770 [ 254.116104][T12902] __should_failslab+0x11a/0x160 [ 254.121049][T12902] ? skb_clone+0x1cc/0x380 [ 254.125469][T12902] should_failslab+0x9/0x20 [ 254.130153][T12902] kmem_cache_alloc+0x56/0x2e0 [ 254.134931][T12902] skb_clone+0x1cc/0x380 [ 254.139185][T12902] netlink_broadcast_filtered+0x619/0x1080 [ 254.145161][T12902] netlink_broadcast+0x3a/0x50 [ 254.149934][T12902] kobject_uevent_env+0xcf1/0x1260 [ 254.155155][T12902] kobject_uevent+0x1f/0x30 [ 254.159670][T12902] loop_set_fd+0xfc3/0x1470 [ 254.164196][T12902] lo_ioctl+0xd5/0x2200 [ 254.168358][T12902] ? __kasan_slab_free+0x12a/0x1e0 [ 254.173681][T12902] ? kasan_slab_free+0xe/0x10 [ 254.178367][T12902] ? kfree+0x115/0x200 [ 254.182437][T12902] ? tomoyo_path_number_perm+0x4e1/0x640 [ 254.188163][T12902] ? tomoyo_file_ioctl+0x23/0x30 [ 254.193186][T12902] ? security_file_ioctl+0x6d/0xd0 [ 254.198398][T12902] ? __x64_sys_ioctl+0xa3/0x120 [ 254.203341][T12902] ? do_syscall_64+0xf7/0x1c0 [ 254.208021][T12902] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.214185][T12902] ? debug_check_no_obj_freed+0x505/0x5b0 [ 254.220064][T12902] ? rcu_lock_release+0x9/0x30 [ 254.224841][T12902] ? rcu_lock_release+0x9/0x30 [ 254.229608][T12902] ? lo_release+0x1f0/0x1f0 [ 254.234125][T12902] blkdev_ioctl+0x807/0x2980 [ 254.238818][T12902] ? tomoyo_path_number_perm+0x53e/0x640 [ 254.244503][T12902] block_ioctl+0xbd/0x100 [ 254.248904][T12902] ? blkdev_iopoll+0x100/0x100 [ 254.253860][T12902] do_vfs_ioctl+0x744/0x1730 [ 254.258558][T12902] ? __fget+0x431/0x510 [ 254.262724][T12902] ? tomoyo_file_ioctl+0x23/0x30 [ 254.267666][T12902] ? security_file_ioctl+0xa1/0xd0 [ 254.272874][T12902] __x64_sys_ioctl+0xe3/0x120 [ 254.277569][T12902] do_syscall_64+0xf7/0x1c0 [ 254.282082][T12902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.287981][T12902] RIP: 0033:0x45a4a7 [ 254.291880][T12902] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:02:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrf\\\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 254.312531][T12902] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 254.321096][T12902] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 254.329160][T12902] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 254.337172][T12902] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 254.345338][T12902] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 254.356705][T12902] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 254.406669][T12908] FAULT_INJECTION: forcing a failure. [ 254.406669][T12908] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 254.420236][T12908] CPU: 0 PID: 12908 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 254.428124][T12908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.438186][T12908] Call Trace: [ 254.441475][T12908] dump_stack+0x1fb/0x318 [ 254.445806][T12908] should_fail+0x555/0x770 [ 254.450432][T12908] should_fail_alloc_page+0x55/0x60 [ 254.455636][T12908] prepare_alloc_pages+0x283/0x460 [ 254.460895][T12908] __alloc_pages_nodemask+0xb2/0x5d0 [ 254.466260][T12908] ? __kasan_check_write+0x14/0x20 [ 254.471394][T12908] kmem_getpages+0x4d/0xa00 [ 254.475895][T12908] cache_grow_begin+0x7e/0x2c0 [ 254.480754][T12908] cache_alloc_refill+0x311/0x3f0 [ 254.485867][T12908] ? check_preemption_disabled+0xb7/0x2a0 [ 254.491690][T12908] kmem_cache_alloc+0x2b9/0x2e0 [ 254.496543][T12908] ? getname_flags+0xba/0x640 [ 254.501219][T12908] getname_flags+0xba/0x640 [ 254.505714][T12908] getname+0x19/0x20 [ 254.509607][T12908] do_sys_open+0x261/0x560 [ 254.514101][T12908] __x64_sys_open+0x87/0x90 [ 254.518841][T12908] do_syscall_64+0xf7/0x1c0 [ 254.523385][T12908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.529352][T12908] RIP: 0033:0x4143d1 [ 254.533236][T12908] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 254.554464][T12908] RSP: 002b:00007fd4a6890a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 254.563484][T12908] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 254.571591][T12908] RDX: 00007fd4a6890b0a RSI: 0000000000000002 RDI: 00007fd4a6890b00 [ 254.579550][T12908] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 254.587579][T12908] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 254.595596][T12908] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:09 executing program 2 (fault-call:3 fault-nth:37): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 254.922996][T12923] FAULT_INJECTION: forcing a failure. [ 254.922996][T12923] name failslab, interval 1, probability 0, space 0, times 0 [ 254.946299][T12923] CPU: 1 PID: 12923 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 254.954507][T12923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.964581][T12923] Call Trace: [ 254.967887][T12923] dump_stack+0x1fb/0x318 [ 254.972235][T12923] should_fail+0x555/0x770 [ 254.976991][T12923] __should_failslab+0x11a/0x160 [ 254.981951][T12923] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 254.987681][T12923] should_failslab+0x9/0x20 [ 254.992193][T12923] __kmalloc+0x7a/0x340 [ 254.996375][T12923] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 255.002107][T12923] tomoyo_realpath_from_path+0xdc/0x7c0 [ 255.007672][T12923] tomoyo_path_number_perm+0x166/0x640 [ 255.013249][T12923] ? rcu_read_lock_sched_held+0x10b/0x170 [ 255.019130][T12923] ? trace_kmem_cache_free+0xb2/0x110 [ 255.024514][T12923] tomoyo_path_mkdir+0x9c/0xc0 [ 255.029286][T12923] security_path_mkdir+0xed/0x170 [ 255.034316][T12923] do_mkdirat+0x15c/0x320 [ 255.038658][T12923] __x64_sys_mkdir+0x60/0x70 [ 255.043253][T12923] do_syscall_64+0xf7/0x1c0 [ 255.047794][T12923] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.053775][T12923] RIP: 0033:0x459a57 [ 255.057681][T12923] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 255.078346][T12923] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 255.086793][T12923] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 [ 255.094924][T12923] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 255.103180][T12923] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 255.111264][T12923] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 01:02:09 executing program 4 (fault-call:1 fault-nth:13): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 255.119402][T12923] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 255.130413][T12923] ERROR: Out of memory at tomoyo_realpath_from_path. [ 255.191033][T12934] FAULT_INJECTION: forcing a failure. [ 255.191033][T12934] name failslab, interval 1, probability 0, space 0, times 0 [ 255.204482][T12934] CPU: 1 PID: 12934 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 255.213047][T12934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.213056][T12934] Call Trace: [ 255.226566][T12934] dump_stack+0x1fb/0x318 [ 255.231141][T12934] should_fail+0x555/0x770 [ 255.235634][T12934] __should_failslab+0x11a/0x160 [ 255.240671][T12934] ? __alloc_file+0x2c/0x390 [ 255.245268][T12934] should_failslab+0x9/0x20 [ 255.249780][T12934] kmem_cache_alloc+0x56/0x2e0 [ 255.254593][T12934] __alloc_file+0x2c/0x390 [ 255.259278][T12934] alloc_empty_file+0xac/0x1b0 [ 255.264063][T12934] path_openat+0x9e/0x4420 [ 255.268489][T12934] ? __kasan_kmalloc+0x178/0x1b0 [ 255.273435][T12934] ? __lock_acquire+0xc75/0x1be0 [ 255.278385][T12934] ? rcu_read_lock_sched_held+0x10b/0x170 [ 255.284142][T12934] do_filp_open+0x192/0x3d0 [ 255.288653][T12934] ? _raw_spin_unlock+0x2c/0x50 [ 255.293523][T12934] do_sys_open+0x29f/0x560 [ 255.297957][T12934] __x64_sys_open+0x87/0x90 [ 255.302467][T12934] do_syscall_64+0xf7/0x1c0 [ 255.306977][T12934] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.313071][T12934] RIP: 0033:0x4143d1 [ 255.316974][T12934] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 01:02:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 255.336673][T12934] RSP: 002b:00007fd4a6890a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 255.345094][T12934] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 255.353071][T12934] RDX: 00007fd4a6890b0a RSI: 0000000000000002 RDI: 00007fd4a6890b00 [ 255.361272][T12934] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 255.369389][T12934] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 255.377493][T12934] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:10 executing program 4 (fault-call:1 fault-nth:14): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:10 executing program 2 (fault-call:3 fault-nth:38): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 255.539645][T12944] FAULT_INJECTION: forcing a failure. [ 255.539645][T12944] name failslab, interval 1, probability 0, space 0, times 0 [ 255.574513][T12944] CPU: 1 PID: 12944 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 255.582572][T12944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.582579][T12944] Call Trace: [ 255.582600][T12944] dump_stack+0x1fb/0x318 [ 255.582617][T12944] should_fail+0x555/0x770 [ 255.582634][T12944] __should_failslab+0x11a/0x160 [ 255.582647][T12944] ? tomoyo_encode2+0x273/0x5a0 [ 255.582656][T12944] should_failslab+0x9/0x20 [ 255.582665][T12944] __kmalloc+0x7a/0x340 [ 255.582678][T12944] tomoyo_encode2+0x273/0x5a0 [ 255.582694][T12944] tomoyo_realpath_from_path+0x769/0x7c0 [ 255.582713][T12944] tomoyo_check_open_permission+0x1ce/0x9d0 [ 255.582746][T12944] tomoyo_file_open+0x141/0x190 [ 255.582757][T12944] security_file_open+0x65/0x2f0 [ 255.582771][T12944] do_dentry_open+0x351/0x10c0 [ 255.626511][T12944] vfs_open+0x73/0x80 [ 255.626526][T12944] path_openat+0x1397/0x4420 [ 255.626554][T12944] ? cache_alloc_refill+0x3b1/0x3f0 [ 255.653466][T12944] do_filp_open+0x192/0x3d0 [ 255.677251][T12944] do_sys_open+0x29f/0x560 [ 255.677268][T12944] __x64_sys_open+0x87/0x90 [ 255.677280][T12944] do_syscall_64+0xf7/0x1c0 [ 255.677296][T12944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.696974][T12944] RIP: 0033:0x4143d1 [ 255.700878][T12944] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 255.720858][T12944] RSP: 002b:00007fd4a6890a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 255.729388][T12944] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 01:02:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 255.737599][T12944] RDX: 00007fd4a6890b0a RSI: 0000000000000002 RDI: 00007fd4a6890b00 [ 255.745764][T12944] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 255.754163][T12944] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 255.762583][T12944] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 255.765640][T12944] ERROR: Out of memory at tomoyo_realpath_from_path. 01:02:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfh\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 255.828979][T12949] FAULT_INJECTION: forcing a failure. [ 255.828979][T12949] name failslab, interval 1, probability 0, space 0, times 0 [ 255.869151][T12949] CPU: 0 PID: 12949 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 255.877211][T12949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.887284][T12949] Call Trace: [ 255.890832][T12949] dump_stack+0x1fb/0x318 [ 255.895267][T12949] should_fail+0x555/0x770 [ 255.899830][T12949] __should_failslab+0x11a/0x160 [ 255.904960][T12949] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 255.904987][T12949] should_failslab+0x9/0x20 [ 255.904996][T12949] __kmalloc+0x7a/0x340 [ 255.905007][T12949] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 255.905021][T12949] tomoyo_realpath_from_path+0xdc/0x7c0 [ 255.905062][T12949] tomoyo_path_number_perm+0x166/0x640 [ 255.915291][T12949] ? rcu_read_lock_sched_held+0x10b/0x170 [ 255.915304][T12949] ? trace_kmem_cache_free+0xb2/0x110 [ 255.915321][T12949] tomoyo_path_mkdir+0x9c/0xc0 [ 255.915335][T12949] security_path_mkdir+0xed/0x170 [ 255.915347][T12949] do_mkdirat+0x15c/0x320 [ 255.915361][T12949] __x64_sys_mkdir+0x60/0x70 [ 255.915375][T12949] do_syscall_64+0xf7/0x1c0 [ 255.915389][T12949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.915398][T12949] RIP: 0033:0x459a57 [ 255.915410][T12949] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 255.925368][T12949] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 255.925379][T12949] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 01:02:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 255.925386][T12949] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 255.925391][T12949] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 255.925397][T12949] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 255.925403][T12949] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 256.046276][T12949] ERROR: Out of memory at tomoyo_realpath_from_path. 01:02:10 executing program 4 (fault-call:1 fault-nth:15): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 256.229755][T12966] FAULT_INJECTION: forcing a failure. [ 256.229755][T12966] name failslab, interval 1, probability 0, space 0, times 0 [ 256.254603][T12966] CPU: 0 PID: 12966 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 256.262549][T12966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.272613][T12966] Call Trace: [ 256.276157][T12966] dump_stack+0x1fb/0x318 [ 256.280505][T12966] should_fail+0x555/0x770 [ 256.285729][T12966] __should_failslab+0x11a/0x160 [ 256.290807][T12966] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 256.296620][T12966] should_failslab+0x9/0x20 [ 256.301139][T12966] __kmalloc+0x7a/0x340 [ 256.305299][T12966] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 256.311025][T12966] tomoyo_realpath_from_path+0xdc/0x7c0 [ 256.316689][T12966] tomoyo_check_open_permission+0x1ce/0x9d0 [ 256.322628][T12966] tomoyo_file_open+0x141/0x190 [ 256.327485][T12966] security_file_open+0x65/0x2f0 [ 256.332429][T12966] do_dentry_open+0x351/0x10c0 [ 256.337215][T12966] vfs_open+0x73/0x80 [ 256.341204][T12966] path_openat+0x1397/0x4420 [ 256.345836][T12966] do_filp_open+0x192/0x3d0 [ 256.350369][T12966] do_sys_open+0x29f/0x560 [ 256.354798][T12966] __x64_sys_open+0x87/0x90 [ 256.359401][T12966] do_syscall_64+0xf7/0x1c0 [ 256.364120][T12966] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.370024][T12966] RIP: 0033:0x4143d1 [ 256.373926][T12966] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 256.393626][T12966] RSP: 002b:00007fd4a6890a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 256.402155][T12966] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 256.410130][T12966] RDX: 00007fd4a6890b0a RSI: 0000000000000002 RDI: 00007fd4a6890b00 [ 256.418250][T12966] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 01:02:11 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:11 executing program 2 (fault-call:3 fault-nth:39): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 256.426320][T12966] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 256.434306][T12966] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 256.453357][T12966] ERROR: Out of memory at tomoyo_realpath_from_path. 01:02:11 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:11 executing program 4 (fault-call:1 fault-nth:16): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 256.612199][T12977] FAULT_INJECTION: forcing a failure. [ 256.612199][T12977] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 256.625451][T12977] CPU: 1 PID: 12977 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 256.633862][T12977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.644797][T12977] Call Trace: [ 256.648134][T12977] dump_stack+0x1fb/0x318 [ 256.652478][T12977] should_fail+0x555/0x770 [ 256.656916][T12977] should_fail_alloc_page+0x55/0x60 [ 256.662128][T12977] prepare_alloc_pages+0x283/0x460 [ 256.667253][T12977] __alloc_pages_nodemask+0xb2/0x5d0 [ 256.672547][T12977] ? lo_release+0x1f0/0x1f0 [ 256.677057][T12977] ? blkdev_ioctl+0x807/0x2980 [ 256.682297][T12977] kmem_getpages+0x4d/0xa00 [ 256.686811][T12977] cache_grow_begin+0x7e/0x2c0 [ 256.691586][T12977] cache_alloc_refill+0x311/0x3f0 [ 256.696619][T12977] ? check_preemption_disabled+0xb7/0x2a0 [ 256.702433][T12977] kmem_cache_alloc+0x2b9/0x2e0 [ 256.707290][T12977] ? getname_flags+0xba/0x640 [ 256.712102][T12977] getname_flags+0xba/0x640 [ 256.716613][T12977] do_mkdirat+0x3c/0x320 [ 256.720858][T12977] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 256.726584][T12977] ? do_syscall_64+0x1d/0x1c0 [ 256.731490][T12977] __x64_sys_mkdir+0x60/0x70 [ 256.736099][T12977] do_syscall_64+0xf7/0x1c0 [ 256.740869][T12977] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.746764][T12977] RIP: 0033:0x459a57 [ 256.750957][T12977] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 256.770577][T12977] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 256.778997][T12977] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 [ 256.786971][T12977] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 256.795146][T12977] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 256.803245][T12977] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 01:02:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 256.811311][T12977] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 256.872664][T12985] FAULT_INJECTION: forcing a failure. [ 256.872664][T12985] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 256.886128][T12985] CPU: 1 PID: 12985 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 256.894030][T12985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.904379][T12985] Call Trace: [ 256.907693][T12985] dump_stack+0x1fb/0x318 [ 256.912129][T12985] should_fail+0x555/0x770 [ 256.916728][T12985] should_fail_alloc_page+0x55/0x60 [ 256.922025][T12985] prepare_alloc_pages+0x283/0x460 [ 256.927182][T12985] __alloc_pages_nodemask+0xb2/0x5d0 [ 256.932677][T12985] kmem_getpages+0x4d/0xa00 [ 256.937289][T12985] cache_grow_begin+0x7e/0x2c0 [ 256.942059][T12985] cache_alloc_refill+0x311/0x3f0 [ 256.947085][T12985] ? check_preemption_disabled+0xb7/0x2a0 [ 256.952894][T12985] __kmalloc+0x318/0x340 [ 256.957139][T12985] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 256.962868][T12985] tomoyo_realpath_from_path+0xdc/0x7c0 [ 256.968430][T12985] tomoyo_check_open_permission+0x1ce/0x9d0 [ 256.974544][T12985] tomoyo_file_open+0x141/0x190 [ 256.979410][T12985] security_file_open+0x65/0x2f0 [ 256.984355][T12985] do_dentry_open+0x351/0x10c0 [ 256.989138][T12985] vfs_open+0x73/0x80 [ 256.993122][T12985] path_openat+0x1397/0x4420 [ 256.997763][T12985] do_filp_open+0x192/0x3d0 [ 257.002291][T12985] do_sys_open+0x29f/0x560 [ 257.006718][T12985] __x64_sys_open+0x87/0x90 [ 257.011376][T12985] do_syscall_64+0xf7/0x1c0 [ 257.015980][T12985] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.021876][T12985] RIP: 0033:0x4143d1 [ 257.025769][T12985] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 257.046036][T12985] RSP: 002b:00007fd4a6890a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 257.054803][T12985] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 257.063129][T12985] RDX: 00007fd4a6890b0a RSI: 0000000000000002 RDI: 00007fd4a6890b00 [ 257.071279][T12985] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 257.079257][T12985] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 257.087322][T12985] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:12 executing program 2 (fault-call:3 fault-nth:40): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc), 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc), 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 257.334912][T12998] FAULT_INJECTION: forcing a failure. [ 257.334912][T12998] name failslab, interval 1, probability 0, space 0, times 0 [ 257.375681][T12998] CPU: 0 PID: 12998 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 257.384057][T12998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.384130][T12998] Call Trace: [ 257.384148][T12998] dump_stack+0x1fb/0x318 [ 257.384164][T12998] should_fail+0x555/0x770 [ 257.384181][T12998] __should_failslab+0x11a/0x160 [ 257.412110][T12998] ? ext4_mb_new_blocks+0x2ac/0x2cc0 [ 257.412122][T12998] should_failslab+0x9/0x20 [ 257.412130][T12998] kmem_cache_alloc+0x56/0x2e0 [ 257.412144][T12998] ext4_mb_new_blocks+0x2ac/0x2cc0 [ 257.412153][T12998] ? trace_kmalloc+0xcd/0x130 [ 257.412163][T12998] ? kcalloc+0x2f/0x50 [ 257.412170][T12998] ? __kmalloc+0x26c/0x340 [ 257.412177][T12998] ? kcalloc+0x2f/0x50 [ 257.412190][T12998] ? ext4_ext_search_right+0x4cb/0x940 [ 257.412199][T12998] ? ext4_find_extent+0x8e0/0xaa0 [ 257.412212][T12998] ? ext4_inode_to_goal_block+0x27b/0x3b0 [ 257.412224][T12998] ext4_ext_map_blocks+0x4b8c/0x7170 [ 257.422036][T12998] ext4_map_blocks+0x8f4/0x1e30 [ 257.422066][T12998] ? __kasan_check_write+0x14/0x20 [ 257.422081][T12998] ext4_getblk+0xae/0x460 [ 257.422097][T12998] ext4_bread+0x4a/0x340 [ 257.441437][T12998] ext4_append+0x175/0x310 [ 257.441453][T12998] ext4_mkdir+0x7ad/0x1450 [ 257.441481][T12998] vfs_mkdir+0x43f/0x610 [ 257.441502][T12998] do_mkdirat+0x1d7/0x320 [ 257.460806][T12998] __x64_sys_mkdir+0x60/0x70 [ 257.460821][T12998] do_syscall_64+0xf7/0x1c0 [ 257.460835][T12998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.460846][T12998] RIP: 0033:0x459a57 [ 257.472084][T12998] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 257.472091][T12998] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 257.472100][T12998] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 [ 257.472105][T12998] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 257.472110][T12998] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 257.472115][T12998] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 257.472120][T12998] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:12 executing program 4 (fault-call:1 fault-nth:17): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:12 executing program 2 (fault-call:3 fault-nth:41): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 257.693358][T13007] FAULT_INJECTION: forcing a failure. [ 257.693358][T13007] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 257.707119][T13007] CPU: 1 PID: 13007 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 257.707127][T13007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.707131][T13007] Call Trace: [ 257.707152][T13007] dump_stack+0x1fb/0x318 [ 257.707169][T13007] should_fail+0x555/0x770 [ 257.707187][T13007] should_fail_alloc_page+0x55/0x60 [ 257.707200][T13007] prepare_alloc_pages+0x283/0x460 [ 257.725756][T13007] __alloc_pages_nodemask+0xb2/0x5d0 [ 257.725770][T13007] ? stack_trace_save+0x150/0x150 [ 257.725789][T13007] kmem_getpages+0x4d/0xa00 [ 257.725803][T13007] cache_grow_begin+0x7e/0x2c0 [ 257.725820][T13007] cache_alloc_refill+0x311/0x3f0 [ 257.733782][T13007] ? check_preemption_disabled+0xb7/0x2a0 [ 257.733798][T13007] __kmalloc+0x318/0x340 [ 257.733808][T13007] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 257.733820][T13007] tomoyo_realpath_from_path+0xdc/0x7c0 [ 257.748817][T13007] tomoyo_path_number_perm+0x166/0x640 [ 257.748855][T13007] ? smack_file_ioctl+0x226/0x2e0 [ 257.748870][T13007] ? __fget+0x431/0x510 [ 257.748884][T13007] tomoyo_file_ioctl+0x23/0x30 [ 257.748896][T13007] security_file_ioctl+0x6d/0xd0 [ 257.748909][T13007] __x64_sys_ioctl+0xa3/0x120 [ 257.748923][T13007] do_syscall_64+0xf7/0x1c0 [ 257.748938][T13007] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.748946][T13007] RIP: 0033:0x45a4a7 01:02:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc), 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 257.748957][T13007] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 257.759447][T13007] RSP: 002b:00007fd4a6890a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 257.759458][T13007] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 257.759464][T13007] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 257.759470][T13007] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 257.759476][T13007] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 257.759481][T13007] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 257.952899][T13015] FAULT_INJECTION: forcing a failure. [ 257.952899][T13015] name failslab, interval 1, probability 0, space 0, times 0 [ 257.977294][T13015] CPU: 0 PID: 13015 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 257.985240][T13015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.995572][T13015] Call Trace: [ 257.998877][T13015] dump_stack+0x1fb/0x318 [ 258.003226][T13015] should_fail+0x555/0x770 [ 258.007659][T13015] __should_failslab+0x11a/0x160 [ 258.012610][T13015] ? ext4_alloc_inode+0x1f/0x560 [ 258.017886][T13015] should_failslab+0x9/0x20 [ 258.022396][T13015] kmem_cache_alloc+0x56/0x2e0 [ 258.027258][T13015] ? set_qf_name+0x3c0/0x3c0 [ 258.031998][T13015] ext4_alloc_inode+0x1f/0x560 [ 258.037120][T13015] ? set_qf_name+0x3c0/0x3c0 [ 258.041723][T13015] new_inode_pseudo+0x68/0x240 [ 258.046498][T13015] new_inode+0x28/0x1c0 [ 258.050659][T13015] ? trace_ext4_request_inode+0x28b/0x2d0 [ 258.056389][T13015] __ext4_new_inode+0x43d/0x5650 [ 258.061471][T13015] ? memset+0x31/0x40 [ 258.065472][T13015] ? smk_curacc+0xa3/0xe0 [ 258.069967][T13015] ext4_mkdir+0x3f5/0x1450 [ 258.074405][T13015] ? security_inode_permission+0xdd/0x120 [ 258.080143][T13015] vfs_mkdir+0x43f/0x610 [ 258.084530][T13015] do_mkdirat+0x1d7/0x320 [ 258.090961][T13015] __x64_sys_mkdir+0x60/0x70 [ 258.095683][T13015] do_syscall_64+0xf7/0x1c0 [ 258.100203][T13015] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.106111][T13015] RIP: 0033:0x459a57 [ 258.110155][T13015] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 258.131974][T13015] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 258.140403][T13015] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 [ 258.148546][T13015] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 258.156528][T13015] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 258.164513][T13015] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 258.172628][T13015] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:13 executing program 2 (fault-call:3 fault-nth:42): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:13 executing program 4 (fault-call:1 fault-nth:18): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrft\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 258.505152][T13030] FAULT_INJECTION: forcing a failure. [ 258.505152][T13030] name failslab, interval 1, probability 0, space 0, times 0 [ 258.543311][T13030] CPU: 1 PID: 13030 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 258.551341][T13030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.563640][T13030] Call Trace: [ 258.567022][T13030] dump_stack+0x1fb/0x318 [ 258.571380][T13030] should_fail+0x555/0x770 [ 258.575907][T13030] __should_failslab+0x11a/0x160 [ 258.580945][T13030] ? tomoyo_encode2+0x273/0x5a0 [ 258.585804][T13030] should_failslab+0x9/0x20 [ 258.590326][T13030] __kmalloc+0x7a/0x340 [ 258.594590][T13030] tomoyo_encode2+0x273/0x5a0 [ 258.599567][T13030] tomoyo_realpath_from_path+0x769/0x7c0 [ 258.605353][T13030] tomoyo_check_open_permission+0x1ce/0x9d0 [ 258.611292][T13030] tomoyo_file_open+0x141/0x190 [ 258.616287][T13030] security_file_open+0x65/0x2f0 [ 258.621458][T13030] do_dentry_open+0x351/0x10c0 [ 258.626248][T13030] vfs_open+0x73/0x80 [ 258.630245][T13030] path_openat+0x1397/0x4420 [ 258.634899][T13030] do_filp_open+0x192/0x3d0 [ 258.639436][T13030] do_sys_open+0x29f/0x560 [ 258.643988][T13030] __x64_sys_open+0x87/0x90 [ 258.648834][T13030] do_syscall_64+0xf7/0x1c0 [ 258.653352][T13030] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.659256][T13030] RIP: 0033:0x4143d1 [ 258.663166][T13030] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 258.682789][T13030] RSP: 002b:00007fd4a6890a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 258.691299][T13030] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004143d1 [ 258.699466][T13030] RDX: 00007fd4a6890b0a RSI: 0000000000000002 RDI: 00007fd4a6890b00 [ 258.707564][T13030] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 258.716593][T13030] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 258.724970][T13030] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 258.753279][T13030] ERROR: Out of memory at tomoyo_realpath_from_path. [ 258.774634][T13034] FAULT_INJECTION: forcing a failure. [ 258.774634][T13034] name failslab, interval 1, probability 0, space 0, times 0 [ 258.801311][T13034] CPU: 0 PID: 13034 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 258.809241][T13034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.809247][T13034] Call Trace: [ 258.809268][T13034] dump_stack+0x1fb/0x318 [ 258.809285][T13034] should_fail+0x555/0x770 [ 258.809302][T13034] __should_failslab+0x11a/0x160 [ 258.809313][T13034] ? kcalloc+0x2f/0x50 [ 258.809322][T13034] should_failslab+0x9/0x20 [ 258.809330][T13034] __kmalloc+0x7a/0x340 [ 258.809343][T13034] kcalloc+0x2f/0x50 [ 258.809353][T13034] ext4_find_extent+0x216/0xaa0 [ 258.809366][T13034] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 258.865059][T13034] ext4_ext_map_blocks+0x170/0x7170 [ 258.870313][T13034] ? trace_lock_acquire+0x159/0x1d0 [ 258.875689][T13034] ? __kasan_check_write+0x14/0x20 [ 258.880824][T13034] ext4_map_blocks+0x8f4/0x1e30 [ 258.885704][T13034] ? __kasan_check_write+0x14/0x20 [ 258.890826][T13034] ext4_getblk+0xae/0x460 [ 258.895376][T13034] ext4_bread+0x4a/0x340 [ 258.899640][T13034] ext4_append+0x175/0x310 [ 258.904071][T13034] ext4_mkdir+0x7ad/0x1450 [ 258.908752][T13034] vfs_mkdir+0x43f/0x610 [ 258.913011][T13034] do_mkdirat+0x1d7/0x320 [ 258.917355][T13034] __x64_sys_mkdir+0x60/0x70 [ 258.921951][T13034] do_syscall_64+0xf7/0x1c0 [ 258.926587][T13034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.932487][T13034] RIP: 0033:0x459a57 [ 258.936391][T13034] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:02:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 258.956492][T13034] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 258.964913][T13034] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 [ 258.973406][T13034] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 258.981386][T13034] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 258.989370][T13034] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 258.997451][T13034] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:14 executing program 2 (fault-call:3 fault-nth:43): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:14 executing program 4 (fault-call:1 fault-nth:19): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 259.343618][T13051] FAULT_INJECTION: forcing a failure. [ 259.343618][T13051] name failslab, interval 1, probability 0, space 0, times 0 [ 259.376652][T13056] FAULT_INJECTION: forcing a failure. [ 259.376652][T13056] name failslab, interval 1, probability 0, space 0, times 0 [ 259.398528][T13051] CPU: 1 PID: 13051 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 259.406471][T13051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.416541][T13051] Call Trace: [ 259.419855][T13051] dump_stack+0x1fb/0x318 [ 259.424338][T13051] should_fail+0x555/0x770 [ 259.429104][T13051] __should_failslab+0x11a/0x160 [ 259.434052][T13051] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 259.439782][T13051] should_failslab+0x9/0x20 [ 259.444284][T13051] __kmalloc+0x7a/0x340 [ 259.448435][T13051] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 259.454243][T13051] tomoyo_realpath_from_path+0xdc/0x7c0 [ 259.459797][T13051] tomoyo_path_number_perm+0x166/0x640 [ 259.465413][T13051] ? smack_file_ioctl+0x226/0x2e0 [ 259.470609][T13051] ? __fget+0x431/0x510 [ 259.474785][T13051] tomoyo_file_ioctl+0x23/0x30 [ 259.479561][T13051] security_file_ioctl+0x6d/0xd0 [ 259.484499][T13051] __x64_sys_ioctl+0xa3/0x120 [ 259.489167][T13051] do_syscall_64+0xf7/0x1c0 [ 259.493808][T13051] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.499711][T13051] RIP: 0033:0x45a4a7 [ 259.503712][T13051] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 259.523736][T13051] RSP: 002b:00007fd4a6890a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 259.532157][T13051] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 259.540147][T13051] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 259.548144][T13051] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 259.556121][T13051] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 259.564198][T13051] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 259.573037][T13056] CPU: 1 PID: 13056 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 259.580939][T13056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.580944][T13056] Call Trace: [ 259.580960][T13056] dump_stack+0x1fb/0x318 [ 259.580975][T13056] should_fail+0x555/0x770 [ 259.580990][T13056] __should_failslab+0x11a/0x160 [ 259.581002][T13056] ? tomoyo_encode2+0x273/0x5a0 [ 259.581010][T13056] should_failslab+0x9/0x20 [ 259.581017][T13056] __kmalloc+0x7a/0x340 [ 259.581031][T13056] tomoyo_encode2+0x273/0x5a0 [ 259.581047][T13056] tomoyo_realpath_from_path+0x769/0x7c0 [ 259.581064][T13056] tomoyo_path_number_perm+0x166/0x640 [ 259.581094][T13056] ? rcu_read_lock_sched_held+0x10b/0x170 [ 259.581103][T13056] ? trace_kmem_cache_free+0xb2/0x110 [ 259.581127][T13056] tomoyo_path_mkdir+0x9c/0xc0 [ 259.581143][T13056] security_path_mkdir+0xed/0x170 [ 259.613194][T13056] do_mkdirat+0x15c/0x320 [ 259.626652][T13056] __x64_sys_mkdir+0x60/0x70 [ 259.626668][T13056] do_syscall_64+0xf7/0x1c0 [ 259.626682][T13056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.626694][T13056] RIP: 0033:0x459a57 [ 259.654252][T13056] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 259.654258][T13056] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 259.654269][T13056] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 [ 259.654275][T13056] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 259.654281][T13056] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 259.654286][T13056] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 259.654294][T13056] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 259.747599][T13051] ERROR: Out of memory at tomoyo_realpath_from_path. [ 259.762574][T13056] ERROR: Out of memory at tomoyo_realpath_from_path. 01:02:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:14 executing program 2 (fault-call:3 fault-nth:44): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:14 executing program 4 (fault-call:1 fault-nth:20): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfz\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 260.050285][T13074] FAULT_INJECTION: forcing a failure. [ 260.050285][T13074] name failslab, interval 1, probability 0, space 0, times 0 [ 260.063291][T13078] FAULT_INJECTION: forcing a failure. [ 260.063291][T13078] name failslab, interval 1, probability 0, space 0, times 0 [ 260.065621][T13074] CPU: 1 PID: 13074 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 260.084195][T13074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.094412][T13074] Call Trace: [ 260.097715][T13074] dump_stack+0x1fb/0x318 [ 260.102056][T13074] should_fail+0x555/0x770 [ 260.106769][T13074] __should_failslab+0x11a/0x160 [ 260.111879][T13074] ? kcalloc+0x2f/0x50 [ 260.115971][T13074] should_failslab+0x9/0x20 [ 260.120522][T13074] __kmalloc+0x7a/0x340 [ 260.124727][T13074] kcalloc+0x2f/0x50 [ 260.128626][T13074] ext4_find_extent+0x216/0xaa0 [ 260.133489][T13074] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 260.139829][T13074] ext4_ext_map_blocks+0x170/0x7170 [ 260.145052][T13074] ? trace_lock_acquire+0x159/0x1d0 [ 260.150350][T13074] ? __kasan_check_write+0x14/0x20 [ 260.155471][T13074] ext4_map_blocks+0x8f4/0x1e30 [ 260.160532][T13074] ? __kasan_check_write+0x14/0x20 [ 260.165738][T13074] ext4_getblk+0xae/0x460 [ 260.170445][T13074] ext4_bread+0x4a/0x340 [ 260.174825][T13074] ext4_append+0x175/0x310 [ 260.179257][T13074] ext4_mkdir+0x7ad/0x1450 [ 260.183684][T13074] vfs_mkdir+0x43f/0x610 [ 260.187929][T13074] do_mkdirat+0x1d7/0x320 [ 260.192257][T13074] __x64_sys_mkdir+0x60/0x70 [ 260.197227][T13074] do_syscall_64+0xf7/0x1c0 [ 260.201737][T13074] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.207748][T13074] RIP: 0033:0x459a57 [ 260.211645][T13074] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 260.231499][T13074] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 260.240006][T13074] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 [ 260.247979][T13074] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 260.256162][T13074] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 260.264530][T13074] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 260.272506][T13074] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 260.287226][T13078] CPU: 0 PID: 13078 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 260.295793][T13078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.305866][T13078] Call Trace: [ 260.309178][T13078] dump_stack+0x1fb/0x318 [ 260.313538][T13078] should_fail+0x555/0x770 [ 260.318230][T13078] __should_failslab+0x11a/0x160 [ 260.323381][T13078] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 260.329206][T13078] should_failslab+0x9/0x20 [ 260.333708][T13078] __kmalloc+0x7a/0x340 [ 260.338136][T13078] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 260.344003][T13078] tomoyo_realpath_from_path+0xdc/0x7c0 [ 260.344024][T13078] tomoyo_path_number_perm+0x166/0x640 [ 260.344055][T13078] ? smack_file_ioctl+0x226/0x2e0 [ 260.355212][T13078] ? __fget+0x431/0x510 [ 260.355231][T13078] tomoyo_file_ioctl+0x23/0x30 [ 260.355243][T13078] security_file_ioctl+0x6d/0xd0 [ 260.355256][T13078] __x64_sys_ioctl+0xa3/0x120 [ 260.355272][T13078] do_syscall_64+0xf7/0x1c0 [ 260.384036][T13078] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.390193][T13078] RIP: 0033:0x45a4a7 [ 260.394210][T13078] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 260.414089][T13078] RSP: 002b:00007fd4a6890a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 260.422519][T13078] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a4a7 [ 260.430501][T13078] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 260.439955][T13078] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 01:02:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 260.448160][T13078] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 260.456322][T13078] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 260.467922][T13078] ERROR: Out of memory at tomoyo_realpath_from_path. 01:02:15 executing program 2 (fault-call:3 fault-nth:45): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 260.619853][T13089] FAULT_INJECTION: forcing a failure. [ 260.619853][T13089] name failslab, interval 1, probability 0, space 0, times 0 [ 260.634582][T13089] CPU: 0 PID: 13089 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 260.642710][T13089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.652917][T13089] Call Trace: [ 260.652935][T13089] dump_stack+0x1fb/0x318 [ 260.652951][T13089] should_fail+0x555/0x770 [ 260.652967][T13089] __should_failslab+0x11a/0x160 [ 260.652984][T13089] ? __es_insert_extent+0x7ba/0x17c0 [ 260.675376][T13089] should_failslab+0x9/0x20 [ 260.679885][T13089] kmem_cache_alloc+0x56/0x2e0 [ 260.684656][T13089] __es_insert_extent+0x7ba/0x17c0 [ 260.689997][T13089] ? __kasan_check_write+0x14/0x20 [ 260.695141][T13089] ? do_raw_write_lock+0xf3/0x460 [ 260.700178][T13089] ext4_es_insert_extent+0x250/0x2ea0 [ 260.705697][T13089] ext4_ext_map_blocks+0x1806/0x7170 [ 260.711014][T13089] ? __down_read+0x14b/0x360 [ 260.715647][T13089] ext4_map_blocks+0x424/0x1e30 [ 260.720512][T13089] ? __kasan_check_write+0x14/0x20 [ 260.725633][T13089] ext4_getblk+0xae/0x460 [ 260.730063][T13089] ext4_bread+0x4a/0x340 [ 260.734315][T13089] ext4_append+0x175/0x310 [ 260.738869][T13089] ext4_mkdir+0x7ad/0x1450 [ 260.743306][T13089] vfs_mkdir+0x43f/0x610 [ 260.747562][T13089] do_mkdirat+0x1d7/0x320 [ 260.751916][T13089] __x64_sys_mkdir+0x60/0x70 [ 260.756535][T13089] do_syscall_64+0xf7/0x1c0 [ 260.761185][T13089] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.767082][T13089] RIP: 0033:0x459a57 [ 260.770981][T13089] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 260.790858][T13089] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 260.799730][T13089] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 [ 260.808398][T13089] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 01:02:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrf\xff\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 260.816696][T13089] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 260.824765][T13089] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 260.832890][T13089] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) bind$packet(r0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:15 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:15 executing program 2 (fault-call:3 fault-nth:46): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrf\x01\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) bind$packet(r0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:16 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='%trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 261.275658][T13112] FAULT_INJECTION: forcing a failure. [ 261.275658][T13112] name failslab, interval 1, probability 0, space 0, times 0 [ 261.288858][T13112] CPU: 1 PID: 13112 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 261.296901][T13112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.296911][T13112] Call Trace: [ 261.310265][T13112] dump_stack+0x1fb/0x318 [ 261.310282][T13112] should_fail+0x555/0x770 [ 261.310299][T13112] __should_failslab+0x11a/0x160 [ 261.324196][T13112] ? __es_insert_extent+0x7ba/0x17c0 [ 261.329668][T13112] should_failslab+0x9/0x20 [ 261.334285][T13112] kmem_cache_alloc+0x56/0x2e0 [ 261.339062][T13112] __es_insert_extent+0x7ba/0x17c0 [ 261.344199][T13112] ext4_es_insert_extent+0x250/0x2ea0 [ 261.349686][T13112] ext4_map_blocks+0xe1c/0x1e30 [ 261.354560][T13112] ? __kasan_check_write+0x14/0x20 [ 261.360409][T13112] ext4_getblk+0xae/0x460 [ 261.364756][T13112] ext4_bread+0x4a/0x340 [ 261.369126][T13112] ext4_append+0x175/0x310 [ 261.373557][T13112] ext4_mkdir+0x7ad/0x1450 [ 261.378085][T13112] vfs_mkdir+0x43f/0x610 [ 261.382425][T13112] do_mkdirat+0x1d7/0x320 [ 261.387041][T13112] __x64_sys_mkdir+0x60/0x70 [ 261.391754][T13112] do_syscall_64+0xf7/0x1c0 [ 261.396269][T13112] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.402164][T13112] RIP: 0033:0x459a57 [ 261.406065][T13112] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:02:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) bind$packet(r0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrf\x01\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 261.425681][T13112] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 261.434255][T13112] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 [ 261.442540][T13112] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 261.442546][T13112] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 261.442551][T13112] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 261.442556][T13112] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:16 executing program 2 (fault-call:3 fault-nth:47): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:16 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='\\trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 261.683598][T13134] FAULT_INJECTION: forcing a failure. [ 261.683598][T13134] name failslab, interval 1, probability 0, space 0, times 0 [ 261.696397][T13134] CPU: 0 PID: 13134 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 261.704307][T13134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.714530][T13134] Call Trace: [ 261.714548][T13134] dump_stack+0x1fb/0x318 [ 261.714566][T13134] should_fail+0x555/0x770 [ 261.714586][T13134] __should_failslab+0x11a/0x160 01:02:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x02', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 261.714601][T13134] ? __es_insert_extent+0x7ba/0x17c0 [ 261.722674][T13134] should_failslab+0x9/0x20 [ 261.722686][T13134] kmem_cache_alloc+0x56/0x2e0 [ 261.722702][T13134] __es_insert_extent+0x7ba/0x17c0 [ 261.722730][T13134] ext4_es_insert_extent+0x250/0x2ea0 [ 261.722753][T13134] ext4_map_blocks+0xe1c/0x1e30 [ 261.722771][T13134] ? __kasan_check_write+0x14/0x20 [ 261.722785][T13134] ext4_getblk+0xae/0x460 [ 261.722801][T13134] ext4_bread+0x4a/0x340 [ 261.722819][T13134] ext4_append+0x175/0x310 [ 261.747172][T13134] ext4_mkdir+0x7ad/0x1450 [ 261.747203][T13134] vfs_mkdir+0x43f/0x610 [ 261.747221][T13134] do_mkdirat+0x1d7/0x320 [ 261.747237][T13134] __x64_sys_mkdir+0x60/0x70 [ 261.747252][T13134] do_syscall_64+0xf7/0x1c0 [ 261.757801][T13134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.757811][T13134] RIP: 0033:0x459a57 [ 261.757821][T13134] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.757827][T13134] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 261.757837][T13134] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 [ 261.757843][T13134] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 261.757849][T13134] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 261.757855][T13134] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 261.757861][T13134] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:16 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='b%rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:16 executing program 2 (fault-call:3 fault-nth:48): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x03', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:16 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='b\\rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 262.170319][T13159] FAULT_INJECTION: forcing a failure. [ 262.170319][T13159] name failslab, interval 1, probability 0, space 0, times 0 [ 262.207547][T13159] CPU: 1 PID: 13159 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 262.215712][T13159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.225788][T13159] Call Trace: [ 262.229089][T13159] dump_stack+0x1fb/0x318 [ 262.233606][T13159] should_fail+0x555/0x770 [ 262.238039][T13159] __should_failslab+0x11a/0x160 [ 262.242983][T13159] ? kcalloc+0x2f/0x50 [ 262.247067][T13159] should_failslab+0x9/0x20 [ 262.251578][T13159] __kmalloc+0x7a/0x340 [ 262.255743][T13159] kcalloc+0x2f/0x50 [ 262.259643][T13159] ext4_find_extent+0x216/0xaa0 [ 262.264500][T13159] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 262.270959][T13159] ext4_ext_map_blocks+0x170/0x7170 [ 262.276286][T13159] ? trace_lock_acquire+0x159/0x1d0 [ 262.281501][T13159] ? __kasan_check_write+0x14/0x20 [ 262.286626][T13159] ext4_map_blocks+0x8f4/0x1e30 [ 262.291493][T13159] ? __kasan_check_write+0x14/0x20 [ 262.296615][T13159] ext4_getblk+0xae/0x460 [ 262.300959][T13159] ext4_bread+0x4a/0x340 [ 262.305211][T13159] ext4_append+0x175/0x310 [ 262.309637][T13159] ext4_mkdir+0x7ad/0x1450 [ 262.314083][T13159] vfs_mkdir+0x43f/0x610 [ 262.318381][T13159] do_mkdirat+0x1d7/0x320 [ 262.322718][T13159] __x64_sys_mkdir+0x60/0x70 [ 262.327314][T13159] do_syscall_64+0xf7/0x1c0 [ 262.331833][T13159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.337755][T13159] RIP: 0033:0x459a57 [ 262.341647][T13159] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.361341][T13159] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 262.369836][T13159] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 [ 262.377802][T13159] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 262.385789][T13159] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 262.393771][T13159] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 262.401746][T13159] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:17 executing program 2 (fault-call:3 fault-nth:49): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 262.570289][T13174] FAULT_INJECTION: forcing a failure. [ 262.570289][T13174] name failslab, interval 1, probability 0, space 0, times 0 [ 262.583182][T13174] CPU: 1 PID: 13174 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 262.591088][T13174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.601153][T13174] Call Trace: [ 262.604453][T13174] dump_stack+0x1fb/0x318 [ 262.608943][T13174] should_fail+0x555/0x770 [ 262.613375][T13174] __should_failslab+0x11a/0x160 01:02:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 262.618313][T13174] ? __es_insert_extent+0x7ba/0x17c0 [ 262.623684][T13174] should_failslab+0x9/0x20 [ 262.628179][T13174] kmem_cache_alloc+0x56/0x2e0 [ 262.633059][T13174] __es_insert_extent+0x7ba/0x17c0 [ 262.638190][T13174] ext4_es_insert_extent+0x250/0x2ea0 [ 262.643577][T13174] ext4_map_blocks+0xe1c/0x1e30 [ 262.648439][T13174] ? __kasan_check_write+0x14/0x20 [ 262.653566][T13174] ext4_getblk+0xae/0x460 [ 262.657911][T13174] ext4_bread+0x4a/0x340 [ 262.662153][T13174] ext4_append+0x175/0x310 [ 262.666570][T13174] ext4_mkdir+0x7ad/0x1450 [ 262.671034][T13174] vfs_mkdir+0x43f/0x610 [ 262.675280][T13174] do_mkdirat+0x1d7/0x320 [ 262.679613][T13174] __x64_sys_mkdir+0x60/0x70 [ 262.684207][T13174] do_syscall_64+0xf7/0x1c0 [ 262.688715][T13174] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.694602][T13174] RIP: 0033:0x459a57 [ 262.698494][T13174] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.718097][T13174] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 262.726505][T13174] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 [ 262.734480][T13174] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 262.742447][T13174] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 262.750418][T13174] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 262.758387][T13174] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:17 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='bt\\fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:17 executing program 2 (fault-call:3 fault-nth:50): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x05', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:17 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btr%s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 263.140070][T13197] FAULT_INJECTION: forcing a failure. [ 263.140070][T13197] name failslab, interval 1, probability 0, space 0, times 0 [ 263.152959][T13197] CPU: 0 PID: 13197 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 263.160859][T13197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.171355][T13197] Call Trace: [ 263.171373][T13197] dump_stack+0x1fb/0x318 [ 263.171389][T13197] should_fail+0x555/0x770 [ 263.171407][T13197] __should_failslab+0x11a/0x160 [ 263.179009][T13197] ? __es_insert_extent+0x7ba/0x17c0 [ 263.179021][T13197] should_failslab+0x9/0x20 [ 263.179031][T13197] kmem_cache_alloc+0x56/0x2e0 [ 263.179045][T13197] __es_insert_extent+0x7ba/0x17c0 [ 263.179067][T13197] ext4_es_insert_extent+0x250/0x2ea0 [ 263.179097][T13197] ext4_map_blocks+0xe1c/0x1e30 [ 263.179124][T13197] ? __kasan_check_write+0x14/0x20 [ 263.179140][T13197] ext4_getblk+0xae/0x460 [ 263.179160][T13197] ext4_bread+0x4a/0x340 [ 263.188604][T13197] ext4_append+0x175/0x310 [ 263.188621][T13197] ext4_mkdir+0x7ad/0x1450 [ 263.188646][T13197] vfs_mkdir+0x43f/0x610 [ 263.198447][T13197] do_mkdirat+0x1d7/0x320 [ 263.198468][T13197] __x64_sys_mkdir+0x60/0x70 [ 263.208420][T13197] do_syscall_64+0xf7/0x1c0 [ 263.208435][T13197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.208444][T13197] RIP: 0033:0x459a57 [ 263.208453][T13197] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.208458][T13197] RSP: 002b:00007f9557c74a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 263.208466][T13197] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 [ 263.208471][T13197] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 263.208475][T13197] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 263.208480][T13197] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 263.208484][T13197] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000003 01:02:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:02:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x06', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:18 executing program 2 (fault-call:3 fault-nth:51): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:18 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:02:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 263.650120][T13226] FAULT_INJECTION: forcing a failure. [ 263.650120][T13226] name failslab, interval 1, probability 0, space 0, times 0 [ 263.662900][T13226] CPU: 0 PID: 13226 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 263.670786][T13226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.680841][T13226] Call Trace: [ 263.684133][T13226] dump_stack+0x1fb/0x318 [ 263.688463][T13226] should_fail+0x555/0x770 [ 263.692888][T13226] __should_failslab+0x11a/0x160 [ 263.697822][T13226] ? __es_insert_extent+0x7ba/0x17c0 [ 263.703100][T13226] should_failslab+0x9/0x20 [ 263.707684][T13226] kmem_cache_alloc+0x56/0x2e0 [ 263.712454][T13226] __es_insert_extent+0x7ba/0x17c0 [ 263.717577][T13226] ? __kasan_check_write+0x14/0x20 [ 263.722685][T13226] ? do_raw_write_lock+0xf3/0x460 [ 263.727716][T13226] ext4_es_insert_extent+0x250/0x2ea0 [ 263.733096][T13226] ext4_ext_map_blocks+0x1806/0x7170 [ 263.738403][T13226] ? __down_read+0x14b/0x360 [ 263.743013][T13226] ext4_map_blocks+0x424/0x1e30 [ 263.748304][T13226] ? __kasan_check_write+0x14/0x20 [ 263.753416][T13226] ext4_getblk+0xae/0x460 [ 263.757747][T13226] ext4_bread+0x4a/0x340 [ 263.761993][T13226] ext4_append+0x175/0x310 [ 263.766414][T13226] ext4_mkdir+0x7ad/0x1450 [ 263.770864][T13226] vfs_mkdir+0x43f/0x610 [ 263.775117][T13226] do_mkdirat+0x1d7/0x320 [ 263.779447][T13226] __x64_sys_mkdir+0x60/0x70 [ 263.784039][T13226] do_syscall_64+0xf7/0x1c0 [ 263.788538][T13226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.794417][T13226] RIP: 0033:0x459a57 [ 263.798308][T13226] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.817901][T13226] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 263.826321][T13226] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 [ 263.834635][T13226] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 263.842599][T13226] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 263.850562][T13226] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 263.858557][T13226] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:18 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\a', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) 01:02:18 executing program 2 (fault-call:3 fault-nth:52): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:18 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btr\\s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\b', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 264.179513][T13248] FAULT_INJECTION: forcing a failure. [ 264.179513][T13248] name failslab, interval 1, probability 0, space 0, times 0 [ 264.192242][T13248] CPU: 1 PID: 13248 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 264.200152][T13248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.200158][T13248] Call Trace: [ 264.200176][T13248] dump_stack+0x1fb/0x318 [ 264.200193][T13248] should_fail+0x555/0x770 [ 264.222437][T13248] __should_failslab+0x11a/0x160 01:02:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 264.222450][T13248] ? __es_insert_extent+0x7ba/0x17c0 [ 264.222459][T13248] should_failslab+0x9/0x20 [ 264.222471][T13248] kmem_cache_alloc+0x56/0x2e0 [ 264.232661][T13248] __es_insert_extent+0x7ba/0x17c0 [ 264.232688][T13248] ext4_es_insert_extent+0x250/0x2ea0 [ 264.232711][T13248] ext4_map_blocks+0xe1c/0x1e30 [ 264.257965][T13248] ? __kasan_check_write+0x14/0x20 [ 264.263079][T13248] ext4_getblk+0xae/0x460 [ 264.267521][T13248] ext4_bread+0x4a/0x340 [ 264.271768][T13248] ext4_append+0x175/0x310 [ 264.276204][T13248] ext4_mkdir+0x7ad/0x1450 [ 264.280651][T13248] vfs_mkdir+0x43f/0x610 [ 264.284897][T13248] do_mkdirat+0x1d7/0x320 [ 264.289224][T13248] __x64_sys_mkdir+0x60/0x70 [ 264.293894][T13248] do_syscall_64+0xf7/0x1c0 [ 264.299090][T13248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.304978][T13248] RIP: 0033:0x459a57 [ 264.308867][T13248] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:02:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) [ 264.328468][T13248] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 264.336876][T13248] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 [ 264.344844][T13248] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 264.352813][T13248] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 264.360782][T13248] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 264.369614][T13248] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) 01:02:19 executing program 2 (fault-call:3 fault-nth:53): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:19 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btres\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 264.575784][T13266] FAULT_INJECTION: forcing a failure. [ 264.575784][T13266] name failslab, interval 1, probability 0, space 0, times 0 [ 264.607787][T13266] CPU: 0 PID: 13266 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 264.615732][T13266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.615753][T13266] Call Trace: [ 264.615773][T13266] dump_stack+0x1fb/0x318 [ 264.615789][T13266] should_fail+0x555/0x770 [ 264.615805][T13266] __should_failslab+0x11a/0x160 [ 264.615817][T13266] should_failslab+0x9/0x20 [ 264.615826][T13266] kmem_cache_alloc_node+0x65/0x280 [ 264.615836][T13266] ? create_task_io_context+0x32/0x3e0 [ 264.615850][T13266] create_task_io_context+0x32/0x3e0 [ 264.615861][T13266] ? generic_make_request_checks+0x14f1/0x1a60 [ 264.615882][T13266] generic_make_request_checks+0x1501/0x1a60 [ 264.615902][T13266] ? rcu_lock_release+0xd/0x30 [ 264.629275][T13266] generic_make_request+0x33/0x980 [ 264.629293][T13266] ? rcu_lock_release+0xd/0x30 [ 264.629314][T13266] submit_bio+0x26b/0x540 [ 264.647444][T13266] ? guard_bio_eod+0x2a0/0x640 [ 264.647461][T13266] submit_bh_wbc+0x619/0x700 [ 264.647478][T13266] __sync_dirty_buffer+0x1a2/0x2d0 [ 264.647490][T13266] sync_dirty_buffer+0x1a/0x20 [ 264.647501][T13266] __ext4_handle_dirty_metadata+0x154/0x870 [ 264.647512][T13266] ? __ext4_journal_get_create_access+0x42/0x290 [ 264.647529][T13266] ext4_getblk+0x38d/0x460 [ 264.659138][T13266] ext4_bread+0x4a/0x340 [ 264.659152][T13266] ext4_append+0x175/0x310 [ 264.670559][T13266] ext4_mkdir+0x7ad/0x1450 [ 264.670585][T13266] vfs_mkdir+0x43f/0x610 [ 264.670600][T13266] do_mkdirat+0x1d7/0x320 [ 264.670616][T13266] __x64_sys_mkdir+0x60/0x70 [ 264.686515][T13266] do_syscall_64+0xf7/0x1c0 [ 264.686531][T13266] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.686541][T13266] RIP: 0033:0x459a57 [ 264.686552][T13266] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.792654][T13266] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 264.801082][T13266] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 [ 264.809051][T13266] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 264.817019][T13266] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 01:02:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 264.824985][T13266] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 264.832948][T13266] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a", 0x28, 0x0, 0x0, 0x0) 01:02:19 executing program 2 (fault-call:3 fault-nth:54): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) [ 265.092469][T13286] FAULT_INJECTION: forcing a failure. [ 265.092469][T13286] name failslab, interval 1, probability 0, space 0, times 0 [ 265.105455][T13286] CPU: 0 PID: 13286 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 265.113480][T13286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.123542][T13286] Call Trace: [ 265.126849][T13286] dump_stack+0x1fb/0x318 [ 265.131189][T13286] should_fail+0x555/0x770 [ 265.135617][T13286] __should_failslab+0x11a/0x160 01:02:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\n', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:19 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrgs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 265.140651][T13286] ? __sigqueue_alloc+0x2ce/0x440 [ 265.145720][T13286] should_failslab+0x9/0x20 [ 265.150243][T13286] kmem_cache_alloc+0x56/0x2e0 [ 265.150259][T13286] __sigqueue_alloc+0x2ce/0x440 [ 265.150272][T13286] __send_signal+0x508/0xcd0 [ 265.150289][T13286] send_signal+0x6e0/0x830 [ 265.150305][T13286] force_sig_info_to_task+0x247/0x2e0 [ 265.150321][T13286] force_sig_fault+0xbf/0x130 [ 265.150338][T13286] __bad_area_nosemaphore+0x307/0x470 [ 265.150350][T13286] bad_area+0x6b/0x80 [ 265.150359][T13286] do_user_addr_fault+0xacc/0xaf0 [ 265.150378][T13286] __do_page_fault+0xd3/0x1f0 [ 265.150389][T13286] do_page_fault+0x99/0xb0 [ 265.150400][T13286] page_fault+0x39/0x40 [ 265.150409][T13286] RIP: 0033:0x45423f [ 265.150424][T13286] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 265.160008][T13286] RSP: 002b:00007f9557cb6a88 EFLAGS: 00010283 01:02:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a", 0x28, 0x0, 0x0, 0x0) [ 265.160018][T13286] RAX: 00007f9557cb6b40 RBX: 0000000020000068 RCX: 0000000000000000 [ 265.160024][T13286] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f9557cb6b40 [ 265.160030][T13286] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 265.160037][T13286] R10: 0000000000000075 R11: 00000000004e76c0 R12: 0000000000000005 [ 265.160043][T13286] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:20 executing program 2 (fault-call:3 fault-nth:55): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:20 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a", 0x28, 0x0, 0x0, 0x0) [ 265.436324][T13304] FAULT_INJECTION: forcing a failure. [ 265.436324][T13304] name failslab, interval 1, probability 0, space 0, times 0 [ 265.467622][T13304] CPU: 0 PID: 13304 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 265.475550][T13304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.485607][T13304] Call Trace: [ 265.488978][T13304] dump_stack+0x1fb/0x318 [ 265.493327][T13304] should_fail+0x555/0x770 [ 265.497747][T13304] __should_failslab+0x11a/0x160 [ 265.497760][T13304] ? kzalloc+0x1f/0x40 [ 265.497770][T13304] should_failslab+0x9/0x20 [ 265.497779][T13304] __kmalloc+0x7a/0x340 [ 265.497793][T13304] kzalloc+0x1f/0x40 [ 265.497802][T13304] smk_parse_smack+0x197/0x230 [ 265.497813][T13304] smk_import_entry+0x27/0x590 [ 265.497826][T13304] smack_d_instantiate+0x78f/0xd70 [ 265.497841][T13304] ? lockdep_init_map+0x2a/0x680 [ 265.497855][T13304] security_d_instantiate+0xa5/0x100 [ 265.544234][T13304] d_instantiate_new+0x65/0x120 [ 265.549112][T13304] ext4_mkdir+0xfa9/0x1450 [ 265.553545][T13304] vfs_mkdir+0x43f/0x610 [ 265.557790][T13304] do_mkdirat+0x1d7/0x320 [ 265.562118][T13304] __x64_sys_mkdir+0x60/0x70 [ 265.566706][T13304] do_syscall_64+0xf7/0x1c0 [ 265.571294][T13304] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.577357][T13304] RIP: 0033:0x459a57 [ 265.581249][T13304] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.600851][T13304] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 265.609271][T13304] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 [ 265.617348][T13304] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 265.625319][T13304] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 265.633285][T13304] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 265.641433][T13304] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\v', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) 01:02:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24", 0x3c, 0x0, 0x0, 0x0) 01:02:20 executing program 2 (fault-call:3 fault-nth:56): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:20 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24", 0x3c, 0x0, 0x0, 0x0) [ 265.935185][T13322] FAULT_INJECTION: forcing a failure. [ 265.935185][T13322] name failslab, interval 1, probability 0, space 0, times 0 [ 265.971967][T13322] CPU: 0 PID: 13322 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 265.980590][T13322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.980596][T13322] Call Trace: [ 265.980614][T13322] dump_stack+0x1fb/0x318 [ 265.980633][T13322] should_fail+0x555/0x770 [ 265.980650][T13322] __should_failslab+0x11a/0x160 [ 265.980662][T13322] should_failslab+0x9/0x20 [ 265.980670][T13322] kmem_cache_alloc_trace+0x5d/0x2f0 [ 265.980680][T13322] ? copy_mount_options+0x5f/0x3c0 [ 265.980693][T13322] copy_mount_options+0x5f/0x3c0 [ 265.980706][T13322] ksys_mount+0xa0/0x100 [ 265.980717][T13322] __x64_sys_mount+0xbf/0xd0 [ 265.980730][T13322] do_syscall_64+0xf7/0x1c0 [ 265.980743][T13322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.980752][T13322] RIP: 0033:0x45d08a [ 265.980762][T13322] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 265.980767][T13322] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 01:02:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24", 0x3c, 0x0, 0x0, 0x0) [ 265.980777][T13322] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 265.980783][T13322] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 265.980790][T13322] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 265.980795][T13322] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 265.980801][T13322] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\f', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:21 executing program 2 (fault-call:3 fault-nth:57): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:21 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:21 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3", 0x46, 0x0, 0x0, 0x0) [ 266.348692][T13343] FAULT_INJECTION: forcing a failure. [ 266.348692][T13343] name failslab, interval 1, probability 0, space 0, times 0 [ 266.367950][T13343] CPU: 1 PID: 13343 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 266.375884][T13343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.385947][T13343] Call Trace: [ 266.385967][T13343] dump_stack+0x1fb/0x318 [ 266.385984][T13343] should_fail+0x555/0x770 [ 266.386001][T13343] __should_failslab+0x11a/0x160 [ 266.402927][T13343] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 266.402939][T13343] should_failslab+0x9/0x20 [ 266.402948][T13343] __kmalloc+0x7a/0x340 [ 266.402959][T13343] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 266.422996][T13343] tomoyo_realpath_from_path+0xdc/0x7c0 [ 266.423016][T13343] tomoyo_mount_permission+0x294/0xa30 [ 266.423030][T13343] ? filename_lookup+0x4b0/0x690 [ 266.438933][T13343] ? kmem_cache_free+0xd8/0xf0 [ 266.443722][T13343] tomoyo_sb_mount+0x35/0x40 [ 266.443735][T13343] security_sb_mount+0x84/0xe0 [ 266.443749][T13343] do_mount+0x10a/0x2510 [ 266.457311][T13343] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 266.462851][T13343] ? copy_mount_options+0x5f/0x3c0 [ 266.467969][T13343] ? copy_mount_options+0x308/0x3c0 [ 266.467983][T13343] ksys_mount+0xcc/0x100 [ 266.467995][T13343] __x64_sys_mount+0xbf/0xd0 [ 266.468009][T13343] do_syscall_64+0xf7/0x1c0 [ 266.468023][T13343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.468033][T13343] RIP: 0033:0x45d08a 01:02:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) [ 266.468043][T13343] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 266.468048][T13343] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 266.468058][T13343] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 266.468064][T13343] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 266.468070][T13343] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 266.468074][T13343] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 266.468079][T13343] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 266.474482][T13343] ERROR: Out of memory at tomoyo_realpath_from_path. 01:02:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\r', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:21 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3", 0x46, 0x0, 0x0, 0x0) 01:02:21 executing program 2 (fault-call:3 fault-nth:58): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:21 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:21 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3", 0x46, 0x0, 0x0, 0x0) [ 266.827196][T13364] FAULT_INJECTION: forcing a failure. [ 266.827196][T13364] name failslab, interval 1, probability 0, space 0, times 0 [ 266.847588][T13364] CPU: 1 PID: 13364 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 266.855517][T13364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.865574][T13364] Call Trace: [ 266.868869][T13364] dump_stack+0x1fb/0x318 [ 266.873201][T13364] should_fail+0x555/0x770 [ 266.877623][T13364] __should_failslab+0x11a/0x160 [ 266.882558][T13364] should_failslab+0x9/0x20 [ 266.887055][T13364] kmem_cache_alloc_trace+0x5d/0x2f0 [ 266.892369][T13364] ? smack_d_instantiate+0xabf/0xd70 [ 266.897654][T13364] smack_d_instantiate+0xabf/0xd70 [ 266.902768][T13364] ? lockdep_init_map+0x2a/0x680 [ 266.907789][T13364] security_d_instantiate+0xa5/0x100 [ 266.913070][T13364] d_instantiate_new+0x65/0x120 [ 266.917926][T13364] ext4_mkdir+0xfa9/0x1450 [ 266.922352][T13364] vfs_mkdir+0x43f/0x610 [ 266.926605][T13364] do_mkdirat+0x1d7/0x320 [ 266.930933][T13364] __x64_sys_mkdir+0x60/0x70 [ 266.935520][T13364] do_syscall_64+0xf7/0x1c0 [ 266.940047][T13364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.945927][T13364] RIP: 0033:0x459a57 [ 266.949826][T13364] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.969510][T13364] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 266.977914][T13364] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459a57 [ 266.985886][T13364] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 266.993849][T13364] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 267.001815][T13364] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 267.009781][T13364] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x0e', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x0, 0x0}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) 01:02:21 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb65469", 0x4b, 0x0, 0x0, 0x0) 01:02:22 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:22 executing program 2 (fault-call:3 fault-nth:59): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x10', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:22 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb65469", 0x4b, 0x0, 0x0, 0x0) 01:02:22 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) [ 267.374412][T13389] FAULT_INJECTION: forcing a failure. [ 267.374412][T13389] name failslab, interval 1, probability 0, space 0, times 0 [ 267.442007][T13389] CPU: 0 PID: 13389 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 267.449940][T13389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.449946][T13389] Call Trace: [ 267.449965][T13389] dump_stack+0x1fb/0x318 [ 267.449984][T13389] should_fail+0x555/0x770 [ 267.450003][T13389] __should_failslab+0x11a/0x160 [ 267.450014][T13389] ? getname_flags+0xba/0x640 [ 267.450023][T13389] should_failslab+0x9/0x20 01:02:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x0, 0x0}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 267.450032][T13389] kmem_cache_alloc+0x56/0x2e0 [ 267.450045][T13389] getname_flags+0xba/0x640 [ 267.450059][T13389] user_path_at_empty+0x2d/0x50 [ 267.450075][T13389] do_mount+0xd7/0x2510 [ 267.450086][T13389] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 267.450095][T13389] ? copy_mount_options+0x5f/0x3c0 [ 267.450106][T13389] ? __kasan_check_read+0x11/0x20 [ 267.450114][T13389] ? copy_mount_options+0x308/0x3c0 [ 267.450127][T13389] ksys_mount+0xcc/0x100 [ 267.450139][T13389] __x64_sys_mount+0xbf/0xd0 [ 267.450154][T13389] do_syscall_64+0xf7/0x1c0 [ 267.450167][T13389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.450176][T13389] RIP: 0033:0x45d08a [ 267.450190][T13389] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 267.471822][T13389] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 267.471833][T13389] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 267.471839][T13389] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 267.471844][T13389] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 267.471850][T13389] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 267.471856][T13389] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x11', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:22 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb65469", 0x4b, 0x0, 0x0, 0x0) 01:02:22 executing program 2 (fault-call:3 fault-nth:60): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:22 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrf/\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) [ 267.860529][T13414] FAULT_INJECTION: forcing a failure. [ 267.860529][T13414] name failslab, interval 1, probability 0, space 0, times 0 [ 267.882326][T13414] CPU: 0 PID: 13414 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 267.890265][T13414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.890271][T13414] Call Trace: [ 267.890290][T13414] dump_stack+0x1fb/0x318 [ 267.890309][T13414] should_fail+0x555/0x770 [ 267.890333][T13414] __should_failslab+0x11a/0x160 [ 267.890348][T13414] ? getname_flags+0xba/0x640 [ 267.890358][T13414] should_failslab+0x9/0x20 [ 267.890366][T13414] kmem_cache_alloc+0x56/0x2e0 [ 267.890378][T13414] getname_flags+0xba/0x640 [ 267.890392][T13414] user_path_at_empty+0x2d/0x50 [ 267.890403][T13414] do_mount+0xd7/0x2510 [ 267.890413][T13414] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 267.890420][T13414] ? copy_mount_options+0x5f/0x3c0 [ 267.890435][T13414] ? __kasan_check_read+0x11/0x20 [ 267.961094][T13414] ? copy_mount_options+0x308/0x3c0 [ 267.966293][T13414] ksys_mount+0xcc/0x100 [ 267.970536][T13414] __x64_sys_mount+0xbf/0xd0 [ 267.975128][T13414] do_syscall_64+0xf7/0x1c0 [ 267.979641][T13414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.985525][T13414] RIP: 0033:0x45d08a [ 267.989412][T13414] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 01:02:22 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f", 0x4e, 0x0, 0x0, 0x0) [ 268.009013][T13414] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 268.017422][T13414] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 268.025391][T13414] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 268.033356][T13414] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 268.041322][T13414] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 268.049310][T13414] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x12', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:23 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f", 0x4e, 0x0, 0x0, 0x0) 01:02:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x0, 0x0}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:23 executing program 2 (fault-call:3 fault-nth:61): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:23 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:23 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f", 0x4e, 0x0, 0x0, 0x0) [ 268.354993][T13437] FAULT_INJECTION: forcing a failure. [ 268.354993][T13437] name failslab, interval 1, probability 0, space 0, times 0 [ 268.397066][T13437] CPU: 0 PID: 13437 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 268.405018][T13437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.415082][T13437] Call Trace: [ 268.418395][T13437] dump_stack+0x1fb/0x318 [ 268.422737][T13437] should_fail+0x555/0x770 [ 268.427172][T13437] __should_failslab+0x11a/0x160 [ 268.432114][T13437] ? getname_kernel+0x59/0x2f0 [ 268.436878][T13437] should_failslab+0x9/0x20 [ 268.441380][T13437] kmem_cache_alloc+0x56/0x2e0 [ 268.446144][T13437] getname_kernel+0x59/0x2f0 [ 268.450882][T13437] kern_path+0x1f/0x40 [ 268.454961][T13437] tomoyo_mount_permission+0x7f1/0xa30 [ 268.460437][T13437] ? kmem_cache_free+0xd8/0xf0 [ 268.465236][T13437] tomoyo_sb_mount+0x35/0x40 [ 268.469829][T13437] security_sb_mount+0x84/0xe0 [ 268.474616][T13437] do_mount+0x10a/0x2510 [ 268.478858][T13437] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 268.484395][T13437] ? copy_mount_options+0x5f/0x3c0 [ 268.489509][T13437] ? copy_mount_options+0x308/0x3c0 [ 268.494710][T13437] ksys_mount+0xcc/0x100 [ 268.498950][T13437] __x64_sys_mount+0xbf/0xd0 [ 268.503538][T13437] do_syscall_64+0xf7/0x1c0 [ 268.508046][T13437] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.514028][T13437] RIP: 0033:0x45d08a [ 268.517926][T13437] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 268.537524][T13437] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 01:02:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs%', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 268.545928][T13437] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 268.553894][T13437] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 268.561864][T13437] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 268.569828][T13437] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 268.577813][T13437] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:23 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfL\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:23 executing program 2 (fault-call:3 fault-nth:62): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:23 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c", 0x4f, 0x0, 0x0, 0x0) 01:02:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfsH', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:23 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 268.891505][T13460] FAULT_INJECTION: forcing a failure. [ 268.891505][T13460] name failslab, interval 1, probability 0, space 0, times 0 [ 268.957864][T13460] CPU: 0 PID: 13460 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 268.965798][T13460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.975864][T13460] Call Trace: [ 268.979174][T13460] dump_stack+0x1fb/0x318 [ 268.983508][T13460] should_fail+0x555/0x770 [ 268.987933][T13460] __should_failslab+0x11a/0x160 [ 268.992869][T13460] ? tomoyo_encode2+0x273/0x5a0 [ 268.997714][T13460] should_failslab+0x9/0x20 [ 269.002224][T13460] __kmalloc+0x7a/0x340 [ 269.006380][T13460] tomoyo_encode2+0x273/0x5a0 [ 269.011060][T13460] tomoyo_realpath_from_path+0x769/0x7c0 [ 269.016697][T13460] tomoyo_mount_permission+0x294/0xa30 [ 269.022160][T13460] ? filename_lookup+0x4b0/0x690 [ 269.027099][T13460] ? kmem_cache_free+0xd8/0xf0 [ 269.031877][T13460] tomoyo_sb_mount+0x35/0x40 [ 269.036464][T13460] security_sb_mount+0x84/0xe0 [ 269.041230][T13460] do_mount+0x10a/0x2510 [ 269.045465][T13460] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 269.051002][T13460] ? copy_mount_options+0x5f/0x3c0 [ 269.056113][T13460] ? copy_mount_options+0x308/0x3c0 [ 269.061315][T13460] ksys_mount+0xcc/0x100 [ 269.065553][T13460] __x64_sys_mount+0xbf/0xd0 [ 269.070144][T13460] do_syscall_64+0xf7/0x1c0 [ 269.074675][T13460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.080562][T13460] RIP: 0033:0x45d08a [ 269.084449][T13460] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 269.104061][T13460] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 269.112465][T13460] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 269.120435][T13460] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 269.128406][T13460] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 269.136369][T13460] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 269.144337][T13460] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 269.157784][T13460] ERROR: Out of memory at tomoyo_realpath_from_path. 01:02:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfsL', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:24 executing program 2 (fault-call:3 fault-nth:63): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c", 0x4f, 0x0, 0x0, 0x0) 01:02:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:24 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrf\\\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 269.355286][T13482] FAULT_INJECTION: forcing a failure. [ 269.355286][T13482] name failslab, interval 1, probability 0, space 0, times 0 01:02:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c", 0x4f, 0x0, 0x0, 0x0) [ 269.406659][T13482] CPU: 0 PID: 13482 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 269.414574][T13482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.414580][T13482] Call Trace: [ 269.414598][T13482] dump_stack+0x1fb/0x318 [ 269.414616][T13482] should_fail+0x555/0x770 [ 269.414632][T13482] __should_failslab+0x11a/0x160 [ 269.414644][T13482] ? ksys_mount+0x38/0x100 [ 269.414653][T13482] should_failslab+0x9/0x20 [ 269.414662][T13482] __kmalloc_track_caller+0x79/0x340 [ 269.414675][T13482] strndup_user+0x76/0x130 [ 269.414685][T13482] ksys_mount+0x38/0x100 [ 269.414696][T13482] __x64_sys_mount+0xbf/0xd0 [ 269.414711][T13482] do_syscall_64+0xf7/0x1c0 [ 269.414726][T13482] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.414735][T13482] RIP: 0033:0x45d08a [ 269.414746][T13482] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 269.414752][T13482] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 269.414762][T13482] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 269.414768][T13482] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 269.414775][T13482] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 269.414780][T13482] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 269.414786][T13482] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:24 executing program 2 (fault-call:3 fault-nth:64): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:24 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\\', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:24 executing program 5 (fault-call:5 fault-nth:0): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 269.739652][T13498] FAULT_INJECTION: forcing a failure. [ 269.739652][T13498] name failslab, interval 1, probability 0, space 0, times 0 [ 269.785487][T13498] CPU: 0 PID: 13498 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 269.793536][T13498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.803600][T13498] Call Trace: [ 269.806904][T13498] dump_stack+0x1fb/0x318 [ 269.811249][T13498] should_fail+0x555/0x770 [ 269.815683][T13498] __should_failslab+0x11a/0x160 [ 269.820629][T13498] ? getname_kernel+0x59/0x2f0 [ 269.825406][T13498] should_failslab+0x9/0x20 [ 269.829915][T13498] kmem_cache_alloc+0x56/0x2e0 [ 269.834805][T13498] getname_kernel+0x59/0x2f0 [ 269.839427][T13498] kern_path+0x1f/0x40 [ 269.843507][T13498] tomoyo_mount_permission+0x7f1/0xa30 [ 269.848982][T13498] ? kmem_cache_free+0xd8/0xf0 [ 269.853773][T13498] tomoyo_sb_mount+0x35/0x40 [ 269.858388][T13498] security_sb_mount+0x84/0xe0 [ 269.863152][T13498] do_mount+0x10a/0x2510 [ 269.867387][T13498] ? copy_mount_options+0x278/0x3c0 [ 269.867395][T13498] ? copy_mount_options+0x25e/0x3c0 [ 269.867408][T13498] ? __sanitizer_cov_trace_pc+0x45/0x50 [ 269.867419][T13498] ? copy_mount_options+0x308/0x3c0 [ 269.867432][T13498] ksys_mount+0xcc/0x100 [ 269.867445][T13498] __x64_sys_mount+0xbf/0xd0 [ 269.867459][T13498] do_syscall_64+0xf7/0x1c0 [ 269.867474][T13498] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.907971][T13498] RIP: 0033:0x45d08a [ 269.911861][T13498] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 01:02:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 269.931461][T13498] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 269.939868][T13498] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 269.948787][T13498] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 269.956758][T13498] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 269.964729][T13498] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 269.972694][T13498] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:24 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfsh', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:24 executing program 2 (fault-call:3 fault-nth:65): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:25 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05024a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:25 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfh\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 270.293556][T13524] FAULT_INJECTION: forcing a failure. [ 270.293556][T13524] name failslab, interval 1, probability 0, space 0, times 0 [ 270.319056][T13524] CPU: 1 PID: 13524 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 270.326983][T13524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.337039][T13524] Call Trace: [ 270.340334][T13524] dump_stack+0x1fb/0x318 [ 270.344662][T13524] should_fail+0x555/0x770 [ 270.349077][T13524] __should_failslab+0x11a/0x160 [ 270.354018][T13524] ? tomoyo_encode2+0x273/0x5a0 [ 270.358869][T13524] should_failslab+0x9/0x20 [ 270.363371][T13524] __kmalloc+0x7a/0x340 [ 270.367523][T13524] tomoyo_encode2+0x273/0x5a0 [ 270.372198][T13524] tomoyo_realpath_from_path+0x769/0x7c0 [ 270.377850][T13524] tomoyo_mount_permission+0x923/0xa30 [ 270.383316][T13524] ? kmem_cache_free+0xd8/0xf0 [ 270.388094][T13524] tomoyo_sb_mount+0x35/0x40 [ 270.392693][T13524] security_sb_mount+0x84/0xe0 [ 270.397458][T13524] do_mount+0x10a/0x2510 [ 270.401694][T13524] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 270.407234][T13524] ? copy_mount_options+0x5f/0x3c0 [ 270.412342][T13524] ? copy_mount_options+0x308/0x3c0 [ 270.417532][T13524] ksys_mount+0xcc/0x100 [ 270.421768][T13524] __x64_sys_mount+0xbf/0xd0 [ 270.426441][T13524] do_syscall_64+0xf7/0x1c0 [ 270.430946][T13524] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.436828][T13524] RIP: 0033:0x45d08a [ 270.440807][T13524] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 270.460554][T13524] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 270.468976][T13524] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 270.476947][T13524] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 270.485179][T13524] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 01:02:25 executing program 0 (fault-call:6 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 270.493148][T13524] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 270.501116][T13524] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 270.512812][T13524] ERROR: Out of memory at tomoyo_realpath_from_path. 01:02:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfsl', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:25 executing program 2 (fault-call:3 fault-nth:66): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:25 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05044a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 270.662218][T13536] FAULT_INJECTION: forcing a failure. [ 270.662218][T13536] name failslab, interval 1, probability 0, space 0, times 0 [ 270.702103][T13536] CPU: 1 PID: 13536 Comm: syz-executor.0 Not tainted 5.4.0-rc7+ #0 [ 270.710026][T13536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.710032][T13536] Call Trace: [ 270.710048][T13536] dump_stack+0x1fb/0x318 [ 270.710064][T13536] should_fail+0x555/0x770 [ 270.710081][T13536] __should_failslab+0x11a/0x160 [ 270.710096][T13536] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 270.710105][T13536] should_failslab+0x9/0x20 [ 270.710113][T13536] __kmalloc+0x7a/0x340 [ 270.710123][T13536] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 270.710135][T13536] tomoyo_realpath_from_path+0xdc/0x7c0 [ 270.710154][T13536] tomoyo_path_number_perm+0x166/0x640 [ 270.710188][T13536] ? smack_file_ioctl+0x226/0x2e0 [ 270.710197][T13536] ? __fget+0x431/0x510 [ 270.710212][T13536] tomoyo_file_ioctl+0x23/0x30 [ 270.710224][T13536] security_file_ioctl+0x6d/0xd0 [ 270.710238][T13536] __x64_sys_ioctl+0xa3/0x120 [ 270.710250][T13536] do_syscall_64+0xf7/0x1c0 [ 270.710265][T13536] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.723605][T13536] RIP: 0033:0x45a639 [ 270.723616][T13536] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.723621][T13536] RSP: 002b:00007f7017c67c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 270.737342][T13536] RAX: ffffffffffffffda RBX: 00007f7017c67c90 RCX: 000000000045a639 [ 270.737349][T13536] RDX: 00000000200004c0 RSI: 00000000400454ca RDI: 0000000000000006 [ 270.737355][T13536] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 270.737360][T13536] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7017c686d4 [ 270.737366][T13536] R13: 00000000004c54e6 R14: 00000000004da458 R15: 0000000000000007 [ 270.781224][T13536] ERROR: Out of memory at tomoyo_realpath_from_path. 01:02:25 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 270.970179][T13548] FAULT_INJECTION: forcing a failure. [ 270.970179][T13548] name failslab, interval 1, probability 0, space 0, times 0 [ 270.986914][T13548] CPU: 0 PID: 13548 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 270.994815][T13548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.004898][T13548] Call Trace: [ 271.008191][T13548] dump_stack+0x1fb/0x318 [ 271.012528][T13548] should_fail+0x555/0x770 [ 271.016951][T13548] __should_failslab+0x11a/0x160 [ 271.021894][T13548] ? tomoyo_encode2+0x273/0x5a0 [ 271.026737][T13548] should_failslab+0x9/0x20 [ 271.031243][T13548] __kmalloc+0x7a/0x340 [ 271.035400][T13548] tomoyo_encode2+0x273/0x5a0 [ 271.040075][T13548] tomoyo_realpath_from_path+0x769/0x7c0 [ 271.045720][T13548] tomoyo_mount_permission+0x923/0xa30 [ 271.051188][T13548] ? kmem_cache_free+0xd8/0xf0 [ 271.055969][T13548] tomoyo_sb_mount+0x35/0x40 [ 271.060580][T13548] security_sb_mount+0x84/0xe0 [ 271.065341][T13548] do_mount+0x10a/0x2510 [ 271.069578][T13548] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 271.075115][T13548] ? copy_mount_options+0x5f/0x3c0 [ 271.080224][T13548] ? copy_mount_options+0x308/0x3c0 [ 271.085413][T13548] ksys_mount+0xcc/0x100 [ 271.089647][T13548] __x64_sys_mount+0xbf/0xd0 [ 271.094232][T13548] do_syscall_64+0xf7/0x1c0 [ 271.098747][T13548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.104632][T13548] RIP: 0033:0x45d08a [ 271.108519][T13548] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 271.130756][T13548] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 271.139166][T13548] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 271.147135][T13548] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 271.155104][T13548] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 271.163074][T13548] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 01:02:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfst', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 271.171037][T13548] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 271.187790][T13548] ERROR: Out of memory at tomoyo_realpath_from_path. 01:02:26 executing program 2 (fault-call:3 fault-nth:67): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:26 executing program 0 (fault-call:6 fault-nth:1): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05104a0006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:26 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 271.414217][T13564] FAULT_INJECTION: forcing a failure. [ 271.414217][T13564] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 271.427470][T13564] CPU: 0 PID: 13564 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 271.427478][T13564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.427482][T13564] Call Trace: [ 271.427500][T13564] dump_stack+0x1fb/0x318 [ 271.427518][T13564] should_fail+0x555/0x770 [ 271.427536][T13564] should_fail_alloc_page+0x55/0x60 [ 271.445598][T13564] prepare_alloc_pages+0x283/0x460 [ 271.445615][T13564] __alloc_pages_nodemask+0xb2/0x5d0 [ 271.445628][T13564] ? finish_task_switch+0x24f/0x550 [ 271.445643][T13564] kmem_getpages+0x4d/0xa00 [ 271.445655][T13564] cache_grow_begin+0x7e/0x2c0 [ 271.445667][T13564] cache_alloc_refill+0x311/0x3f0 [ 271.445677][T13564] ? check_preemption_disabled+0xb7/0x2a0 [ 271.445689][T13564] __kmalloc+0x318/0x340 [ 271.445700][T13564] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 271.445713][T13564] tomoyo_realpath_from_path+0xdc/0x7c0 [ 271.445736][T13564] tomoyo_mount_permission+0x294/0xa30 [ 271.453891][T13564] ? filename_lookup+0x4b0/0x690 [ 271.453914][T13564] ? kmem_cache_free+0xd8/0xf0 [ 271.453945][T13564] tomoyo_sb_mount+0x35/0x40 [ 271.453957][T13564] security_sb_mount+0x84/0xe0 [ 271.453971][T13564] do_mount+0x10a/0x2510 [ 271.464002][T13564] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 271.464014][T13564] ? copy_mount_options+0x5f/0x3c0 [ 271.464025][T13564] ? copy_mount_options+0x308/0x3c0 [ 271.464039][T13564] ksys_mount+0xcc/0x100 [ 271.474401][T13564] __x64_sys_mount+0xbf/0xd0 [ 271.474417][T13564] do_syscall_64+0xf7/0x1c0 [ 271.474432][T13564] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.474440][T13564] RIP: 0033:0x45d08a [ 271.474452][T13564] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 271.484357][T13564] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 271.484367][T13564] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 271.484373][T13564] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 271.484378][T13564] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 271.484384][T13564] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 271.484389][T13564] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 271.668006][T13575] FAULT_INJECTION: forcing a failure. [ 271.668006][T13575] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 271.681693][T13575] CPU: 1 PID: 13575 Comm: syz-executor.0 Not tainted 5.4.0-rc7+ #0 [ 271.689579][T13575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.699634][T13575] Call Trace: [ 271.702945][T13575] dump_stack+0x1fb/0x318 [ 271.707296][T13575] should_fail+0x555/0x770 [ 271.711719][T13575] should_fail_alloc_page+0x55/0x60 [ 271.716915][T13575] prepare_alloc_pages+0x283/0x460 [ 271.716937][T13575] __alloc_pages_nodemask+0xb2/0x5d0 [ 271.727319][T13575] kmem_getpages+0x4d/0xa00 [ 271.731820][T13575] cache_grow_begin+0x7e/0x2c0 [ 271.736577][T13575] cache_alloc_refill+0x311/0x3f0 [ 271.741606][T13575] ? check_preemption_disabled+0xb7/0x2a0 [ 271.741620][T13575] __kmalloc+0x318/0x340 [ 271.741630][T13575] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 271.741642][T13575] tomoyo_realpath_from_path+0xdc/0x7c0 [ 271.741660][T13575] tomoyo_path_number_perm+0x166/0x640 [ 271.741692][T13575] ? smack_file_ioctl+0x226/0x2e0 [ 271.741701][T13575] ? __fget+0x431/0x510 [ 271.741715][T13575] tomoyo_file_ioctl+0x23/0x30 [ 271.777569][T13575] security_file_ioctl+0x6d/0xd0 [ 271.777585][T13575] __x64_sys_ioctl+0xa3/0x120 [ 271.777600][T13575] do_syscall_64+0xf7/0x1c0 [ 271.777614][T13575] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.777623][T13575] RIP: 0033:0x45a639 [ 271.777633][T13575] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.777643][T13575] RSP: 002b:00007f7017c25c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 271.777651][T13575] RAX: ffffffffffffffda RBX: 00007f7017c25c90 RCX: 000000000045a639 [ 271.777656][T13575] RDX: 00000000200004c0 RSI: 00000000400454ca RDI: 0000000000000006 [ 271.777661][T13575] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 271.777666][T13575] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7017c266d4 01:02:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="0503a40006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 271.777671][T13575] R13: 00000000004c54e6 R14: 00000000004da458 R15: 0000000000000007 01:02:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfsz', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:26 executing program 2 (fault-call:3 fault-nth:68): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:26 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 272.116461][T13589] FAULT_INJECTION: forcing a failure. [ 272.116461][T13589] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 272.129950][T13589] CPU: 1 PID: 13589 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 272.137837][T13589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.147984][T13589] Call Trace: [ 272.151363][T13589] dump_stack+0x1fb/0x318 [ 272.156060][T13589] should_fail+0x555/0x770 [ 272.160490][T13589] should_fail_alloc_page+0x55/0x60 [ 272.165687][T13589] prepare_alloc_pages+0x283/0x460 [ 272.170809][T13589] __alloc_pages_nodemask+0xb2/0x5d0 [ 272.176110][T13589] kmem_getpages+0x4d/0xa00 [ 272.180615][T13589] cache_grow_begin+0x7e/0x2c0 [ 272.185381][T13589] cache_alloc_refill+0x311/0x3f0 [ 272.190404][T13589] ? check_preemption_disabled+0xb7/0x2a0 [ 272.196126][T13589] kmem_cache_alloc+0x2b9/0x2e0 [ 272.200970][T13589] ? getname_kernel+0x59/0x2f0 [ 272.205731][T13589] getname_kernel+0x59/0x2f0 [ 272.210318][T13589] kern_path+0x1f/0x40 [ 272.214388][T13589] tomoyo_mount_permission+0x7f1/0xa30 [ 272.219869][T13589] ? kmem_cache_free+0xd8/0xf0 [ 272.224646][T13589] tomoyo_sb_mount+0x35/0x40 [ 272.229237][T13589] security_sb_mount+0x84/0xe0 [ 272.233999][T13589] do_mount+0x10a/0x2510 [ 272.238235][T13589] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 272.243784][T13589] ? copy_mount_options+0x5f/0x3c0 [ 272.248895][T13589] ? copy_mount_options+0x308/0x3c0 [ 272.254087][T13589] ksys_mount+0xcc/0x100 [ 272.258362][T13589] __x64_sys_mount+0xbf/0xd0 [ 272.262951][T13589] do_syscall_64+0xf7/0x1c0 [ 272.267453][T13589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.273336][T13589] RIP: 0033:0x45d08a [ 272.277227][T13589] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 272.298564][T13589] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 272.307150][T13589] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 272.315119][T13589] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 272.323089][T13589] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 272.331141][T13589] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 272.339116][T13589] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:27 executing program 0 (fault-call:6 fault-nth:2): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:27 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="0503500606063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:27 executing program 2 (fault-call:3 fault-nth:69): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 272.504564][T13603] FAULT_INJECTION: forcing a failure. [ 272.504564][T13603] name failslab, interval 1, probability 0, space 0, times 0 [ 272.519884][T13603] CPU: 1 PID: 13603 Comm: syz-executor.0 Not tainted 5.4.0-rc7+ #0 [ 272.527816][T13603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.537960][T13603] Call Trace: [ 272.541690][T13603] dump_stack+0x1fb/0x318 [ 272.546037][T13603] should_fail+0x555/0x770 [ 272.550461][T13603] __should_failslab+0x11a/0x160 [ 272.555406][T13603] should_failslab+0x9/0x20 [ 272.559911][T13603] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 272.565623][T13603] ? __get_vm_area_node+0x142/0x320 [ 272.570826][T13603] __get_vm_area_node+0x142/0x320 [ 272.576115][T13603] __vmalloc_node_range+0xea/0x860 [ 272.581224][T13603] ? bpf_prog_alloc_no_stats+0x72/0x2b0 [ 272.586781][T13603] __vmalloc+0x45/0x50 [ 272.590892][T13603] ? bpf_prog_alloc_no_stats+0x72/0x2b0 [ 272.596434][T13603] bpf_prog_alloc_no_stats+0x72/0x2b0 [ 272.601819][T13603] bpf_prog_alloc+0x21/0x160 [ 272.606548][T13603] __get_filter+0xfc/0x410 [ 272.610975][T13603] ? __local_bh_enable_ip+0x13a/0x240 [ 272.616372][T13603] sk_attach_filter+0x23/0x140 [ 272.621151][T13603] tun_attach+0x3ec/0x14d0 [ 272.625580][T13603] ? rcu_lock_release+0x9/0x30 [ 272.630345][T13603] ? full_name_hash+0x9c/0xe0 [ 272.635680][T13603] __tun_chr_ioctl+0x287e/0x44c0 [ 272.640652][T13603] tun_chr_ioctl+0x2a/0x40 [ 272.645069][T13603] ? tun_chr_poll+0x600/0x600 [ 272.649768][T13603] do_vfs_ioctl+0x744/0x1730 [ 272.654351][T13603] ? __fget+0x431/0x510 [ 272.658597][T13603] ? tomoyo_file_ioctl+0x23/0x30 [ 272.663541][T13603] ? security_file_ioctl+0xa1/0xd0 [ 272.668650][T13603] __x64_sys_ioctl+0xe3/0x120 [ 272.673324][T13603] do_syscall_64+0xf7/0x1c0 [ 272.677827][T13603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.683710][T13603] RIP: 0033:0x45a639 [ 272.687598][T13603] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.707200][T13603] RSP: 002b:00007f7017c67c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 272.715606][T13603] RAX: ffffffffffffffda RBX: 00007f7017c67c90 RCX: 000000000045a639 [ 272.724526][T13603] RDX: 00000000200004c0 RSI: 00000000400454ca RDI: 0000000000000006 [ 272.732502][T13603] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 272.740470][T13603] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7017c686d4 [ 272.748447][T13603] R13: 00000000004c54e6 R14: 00000000004da458 R15: 0000000000000007 [ 272.759766][T13603] syz-executor.0: vmalloc: allocation failure: 4096 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0-1 [ 272.791992][T13603] CPU: 1 PID: 13603 Comm: syz-executor.0 Not tainted 5.4.0-rc7+ #0 01:02:27 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 272.799906][T13603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.799928][T13603] Call Trace: [ 272.799946][T13603] dump_stack+0x1fb/0x318 [ 272.799960][T13603] warn_alloc+0x17d/0x2c0 [ 272.799974][T13603] ? __get_vm_area_node+0x155/0x320 [ 272.799992][T13603] __vmalloc_node_range+0x29b/0x860 [ 272.800013][T13603] __vmalloc+0x45/0x50 [ 272.800025][T13603] ? bpf_prog_alloc_no_stats+0x72/0x2b0 [ 272.800036][T13603] bpf_prog_alloc_no_stats+0x72/0x2b0 [ 272.800048][T13603] bpf_prog_alloc+0x21/0x160 [ 272.800061][T13603] __get_filter+0xfc/0x410 [ 272.800072][T13603] ? __local_bh_enable_ip+0x13a/0x240 [ 272.800088][T13603] sk_attach_filter+0x23/0x140 [ 272.822033][T13603] tun_attach+0x3ec/0x14d0 [ 272.822052][T13603] ? rcu_lock_release+0x9/0x30 [ 272.822067][T13603] ? full_name_hash+0x9c/0xe0 [ 272.822082][T13603] __tun_chr_ioctl+0x287e/0x44c0 [ 272.836519][T13603] tun_chr_ioctl+0x2a/0x40 [ 272.836529][T13603] ? tun_chr_poll+0x600/0x600 [ 272.836542][T13603] do_vfs_ioctl+0x744/0x1730 [ 272.836555][T13603] ? __fget+0x431/0x510 [ 272.847523][T13603] ? tomoyo_file_ioctl+0x23/0x30 [ 272.847536][T13603] ? security_file_ioctl+0xa1/0xd0 [ 272.847550][T13603] __x64_sys_ioctl+0xe3/0x120 [ 272.847565][T13603] do_syscall_64+0xf7/0x1c0 [ 272.847579][T13603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.847588][T13603] RIP: 0033:0x45a639 [ 272.847597][T13603] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.847603][T13603] RSP: 002b:00007f7017c67c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 272.847611][T13603] RAX: ffffffffffffffda RBX: 00007f7017c67c90 RCX: 000000000045a639 [ 272.847617][T13603] RDX: 00000000200004c0 RSI: 00000000400454ca RDI: 0000000000000006 [ 272.847622][T13603] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 272.847627][T13603] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7017c686d4 [ 272.847633][T13603] R13: 00000000004c54e6 R14: 00000000004da458 R15: 0000000000000007 [ 272.849790][T13603] Mem-Info: [ 272.863054][T13603] active_anon:141042 inactive_anon:219 isolated_anon:0 [ 272.863054][T13603] active_file:7709 inactive_file:40241 isolated_file:0 [ 272.863054][T13603] unevictable:0 dirty:102 writeback:1 unstable:0 [ 272.863054][T13603] slab_reclaimable:12865 slab_unreclaimable:96118 [ 272.863054][T13603] mapped:58957 shmem:271 pagetables:1056 bounce:0 [ 272.863054][T13603] free:1237134 free_pcp:451 free_cma:0 [ 272.878405][T13603] Node 0 active_anon:564168kB inactive_anon:876kB active_file:30704kB inactive_file:160964kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235828kB dirty:408kB writeback:4kB shmem:1084kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 206848kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 273.094616][T13610] FAULT_INJECTION: forcing a failure. [ 273.094616][T13610] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 273.107847][T13610] CPU: 0 PID: 13610 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 273.115738][T13610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.125790][T13610] Call Trace: [ 273.125809][T13610] dump_stack+0x1fb/0x318 [ 273.125828][T13610] should_fail+0x555/0x770 [ 273.125847][T13610] should_fail_alloc_page+0x55/0x60 [ 273.125859][T13610] prepare_alloc_pages+0x283/0x460 [ 273.133458][T13610] __alloc_pages_nodemask+0xb2/0x5d0 [ 273.133484][T13610] kmem_getpages+0x4d/0xa00 [ 273.133499][T13610] cache_grow_begin+0x7e/0x2c0 [ 273.133512][T13610] cache_alloc_refill+0x311/0x3f0 [ 273.133525][T13610] ? check_preemption_disabled+0xb7/0x2a0 [ 273.173666][T13610] __kmalloc+0x318/0x340 [ 273.177909][T13610] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 273.183630][T13610] tomoyo_realpath_from_path+0xdc/0x7c0 [ 273.189201][T13610] tomoyo_mount_permission+0x294/0xa30 [ 273.194660][T13610] ? filename_lookup+0x4b0/0x690 [ 273.199623][T13610] ? kmem_cache_free+0xd8/0xf0 [ 273.204400][T13610] tomoyo_sb_mount+0x35/0x40 [ 273.208985][T13610] security_sb_mount+0x84/0xe0 [ 273.213748][T13610] do_mount+0x10a/0x2510 [ 273.218016][T13610] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 273.223642][T13610] ? copy_mount_options+0x5f/0x3c0 [ 273.228751][T13610] ? copy_mount_options+0x308/0x3c0 [ 273.233942][T13610] ksys_mount+0xcc/0x100 [ 273.238183][T13610] __x64_sys_mount+0xbf/0xd0 [ 273.242774][T13610] do_syscall_64+0xf7/0x1c0 [ 273.247275][T13610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.253187][T13610] RIP: 0033:0x45d08a [ 273.257190][T13610] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 273.276787][T13610] RSP: 002b:00007f9557c95a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 273.285195][T13610] RAX: ffffffffffffffda RBX: 00007f9557c95b40 RCX: 000000000045d08a [ 273.293158][T13610] RDX: 00007f9557c95ae0 RSI: 0000000020000100 RDI: 00007f9557c95b00 01:02:27 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="0503a41006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="0503a42006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 273.301123][T13610] RBP: 0000000000000001 R08: 00007f9557c95b40 R09: 00007f9557c95ae0 [ 273.309086][T13610] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 273.317484][T13610] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000003 [ 273.369608][T13603] Node 1 active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 273.397344][T13603] Node 0 DMA free:15904kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 273.438218][T13603] lowmem_reserve[]: 0 2567 2568 2568 01:02:28 executing program 2 (fault-call:3 fault-nth:70): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 273.455119][T13603] Node 0 DMA32 free:1154656kB min:36352kB low:45440kB high:54528kB active_anon:564132kB inactive_anon:876kB active_file:29424kB inactive_file:160872kB unevictable:0kB writepending:404kB present:3129332kB managed:2632152kB mlocked:0kB kernel_stack:7744kB pagetables:4224kB bounce:0kB free_pcp:1656kB local_pcp:1096kB free_cma:0kB [ 273.497728][T13603] lowmem_reserve[]: 0 0 1 1 01:02:28 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrft\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 273.502287][T13603] Node 0 Normal free:16kB min:16kB low:20kB high:24kB active_anon:40kB inactive_anon:0kB active_file:1280kB inactive_file:92kB unevictable:0kB writepending:8kB present:786432kB managed:1428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 273.537605][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 273.543870][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 273.544859][T13603] lowmem_reserve[]: 0 0 0 0 01:02:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="0503a43006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 273.590926][T13603] Node 1 Normal free:3777720kB min:53516kB low:66892kB high:80268kB active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870240kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 273.621639][T13603] lowmem_reserve[]: 0 0 0 0 [ 273.626668][T13603] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 273.646127][T13603] Node 0 DMA32: 2827*4kB (UM) 1066*8kB (UME) 1123*16kB (UM) 458*32kB (UM) 205*64kB (UM) 7*128kB (ME) 2*256kB (ME) 1*512kB (M) 3*1024kB (U) 4*2048kB (UM) 262*4096kB (M) = 1151916kB [ 273.664629][T13603] Node 0 Normal: 2*4kB (M) 1*8kB (M) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 16kB [ 273.678149][T13603] Node 1 Normal: 30*4kB (UE) 92*8kB (UE) 176*16kB (U) 81*32kB (UME) 27*64kB (U) 17*128kB (UME) 9*256kB (UME) 4*512kB (UE) 1*1024kB (M) 1*2048kB (M) 918*4096kB (M) = 3777720kB [ 273.696779][T13625] FAULT_INJECTION: forcing a failure. [ 273.696779][T13625] name failslab, interval 1, probability 0, space 0, times 0 [ 273.710294][T13625] CPU: 1 PID: 13625 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 273.718190][T13625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.718195][T13625] Call Trace: [ 273.718214][T13625] dump_stack+0x1fb/0x318 [ 273.718232][T13625] should_fail+0x555/0x770 [ 273.718251][T13625] __should_failslab+0x11a/0x160 [ 273.718265][T13625] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 273.718274][T13625] should_failslab+0x9/0x20 [ 273.718282][T13625] __kmalloc+0x7a/0x340 [ 273.718291][T13625] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 273.718304][T13625] tomoyo_realpath_from_path+0xdc/0x7c0 [ 273.718323][T13625] tomoyo_mount_permission+0x923/0xa30 [ 273.718345][T13625] ? kmem_cache_free+0xd8/0xf0 [ 273.718373][T13625] tomoyo_sb_mount+0x35/0x40 [ 273.718385][T13625] security_sb_mount+0x84/0xe0 [ 273.718399][T13625] do_mount+0x10a/0x2510 [ 273.718409][T13625] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 273.718416][T13625] ? copy_mount_options+0x5f/0x3c0 [ 273.718430][T13625] ? copy_mount_options+0x308/0x3c0 [ 273.736066][T13625] ksys_mount+0xcc/0x100 [ 273.736081][T13625] __x64_sys_mount+0xbf/0xd0 [ 273.736098][T13625] do_syscall_64+0xf7/0x1c0 [ 273.736114][T13625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.736123][T13625] RIP: 0033:0x45d08a [ 273.736134][T13625] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 273.736143][T13625] RSP: 002b:00007f9557c95a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 273.777552][T13603] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 273.781208][T13625] RAX: ffffffffffffffda RBX: 00007f9557c95b40 RCX: 000000000045d08a [ 273.781215][T13625] RDX: 00007f9557c95ae0 RSI: 0000000020000100 RDI: 00007f9557c95b00 [ 273.781222][T13625] RBP: 0000000000000001 R08: 00007f9557c95b40 R09: 00007f9557c95ae0 [ 273.781227][T13625] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 273.781233][T13625] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 273.899973][T13625] ERROR: Out of memory at tomoyo_realpath_from_path. [ 273.910602][T13603] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 01:02:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="0503863c06063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 273.941998][T13603] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 273.951935][T13603] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 273.962252][T13603] 48232 total pagecache pages [ 273.966947][T13603] 0 pages in swap cache [ 273.971193][T13603] Swap cache stats: add 0, delete 0, find 0/0 [ 273.977306][T13603] Free swap = 0kB [ 273.981129][T13603] Total swap = 0kB [ 273.984849][T13603] 1965979 pages RAM [ 273.988725][T13603] 0 pages HighMem/MovableOnly [ 273.993397][T13603] 336048 pages reserved [ 273.997597][T13603] 0 pages cma reserved 01:02:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:29 executing program 2 (fault-call:3 fault-nth:71): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:29 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0206063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x02', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 274.325059][T13649] FAULT_INJECTION: forcing a failure. [ 274.325059][T13649] name failslab, interval 1, probability 0, space 0, times 0 [ 274.347791][T13649] CPU: 0 PID: 13649 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 274.355716][T13649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.365783][T13649] Call Trace: [ 274.369147][T13649] dump_stack+0x1fb/0x318 [ 274.373567][T13649] should_fail+0x555/0x770 [ 274.377997][T13649] __should_failslab+0x11a/0x160 [ 274.382934][T13649] ? tomoyo_encode2+0x273/0x5a0 [ 274.387780][T13649] should_failslab+0x9/0x20 [ 274.392281][T13649] __kmalloc+0x7a/0x340 [ 274.396445][T13649] tomoyo_encode2+0x273/0x5a0 [ 274.401126][T13649] tomoyo_realpath_from_path+0x769/0x7c0 [ 274.406764][T13649] tomoyo_mount_permission+0x294/0xa30 [ 274.412235][T13649] ? filename_lookup+0x4b0/0x690 [ 274.417173][T13649] ? kmem_cache_free+0xd8/0xf0 [ 274.424816][T13649] tomoyo_sb_mount+0x35/0x40 [ 274.429435][T13649] security_sb_mount+0x84/0xe0 [ 274.434202][T13649] do_mount+0x10a/0x2510 [ 274.438438][T13649] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 274.443977][T13649] ? copy_mount_options+0x5f/0x3c0 [ 274.449092][T13649] ? copy_mount_options+0x308/0x3c0 [ 274.454298][T13649] ksys_mount+0xcc/0x100 [ 274.458587][T13649] __x64_sys_mount+0xbf/0xd0 [ 274.463191][T13649] do_syscall_64+0xf7/0x1c0 [ 274.467702][T13649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.473593][T13649] RIP: 0033:0x45d08a [ 274.477494][T13649] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 274.497202][T13649] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 274.505609][T13649] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 274.513582][T13649] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 274.521553][T13649] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 274.529526][T13649] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 274.537493][T13649] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0406063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 274.584571][T13649] ERROR: Out of memory at tomoyo_realpath_from_path. 01:02:29 executing program 2 (fault-call:3 fault-nth:72): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:29 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x06', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 274.799563][T13665] FAULT_INJECTION: forcing a failure. [ 274.799563][T13665] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 274.812892][T13665] CPU: 1 PID: 13665 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 274.821653][T13665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.831713][T13665] Call Trace: [ 274.835012][T13665] dump_stack+0x1fb/0x318 [ 274.839345][T13665] should_fail+0x555/0x770 [ 274.843766][T13665] should_fail_alloc_page+0x55/0x60 [ 274.848982][T13665] prepare_alloc_pages+0x283/0x460 [ 274.854240][T13665] __alloc_pages_nodemask+0xb2/0x5d0 [ 274.859539][T13665] kmem_getpages+0x4d/0xa00 [ 274.864051][T13665] cache_grow_begin+0x7e/0x2c0 [ 274.868904][T13665] cache_alloc_refill+0x311/0x3f0 [ 274.873930][T13665] ? check_preemption_disabled+0xb7/0x2a0 [ 274.879676][T13665] __kmalloc+0x318/0x340 [ 274.883916][T13665] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 274.889635][T13665] tomoyo_realpath_from_path+0xdc/0x7c0 [ 274.895189][T13665] tomoyo_mount_permission+0x923/0xa30 [ 274.900658][T13665] ? kmem_cache_free+0xd8/0xf0 [ 274.905438][T13665] tomoyo_sb_mount+0x35/0x40 [ 274.910031][T13665] security_sb_mount+0x84/0xe0 [ 274.914796][T13665] do_mount+0x10a/0x2510 [ 274.919039][T13665] ? copy_mount_options+0x278/0x3c0 [ 274.924229][T13665] ? copy_mount_options+0x25e/0x3c0 [ 274.929422][T13665] ? __sanitizer_cov_trace_pc+0x45/0x50 [ 274.934962][T13665] ? copy_mount_options+0x308/0x3c0 [ 274.940262][T13665] ksys_mount+0xcc/0x100 [ 274.944501][T13665] __x64_sys_mount+0xbf/0xd0 [ 274.949108][T13665] do_syscall_64+0xf7/0x1c0 [ 274.953615][T13665] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.959499][T13665] RIP: 0033:0x45d08a [ 274.963386][T13665] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 274.982993][T13665] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 274.991408][T13665] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a 01:02:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 274.999380][T13665] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 275.007339][T13665] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 275.007348][T13665] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 275.024152][T13665] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x2, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:29 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfz\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0a06063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:29 executing program 2 (fault-call:3 fault-nth:73): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0f06063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:30 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x02', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 275.364370][T13689] FAULT_INJECTION: forcing a failure. [ 275.364370][T13689] name failslab, interval 1, probability 0, space 0, times 0 [ 275.421252][T13689] CPU: 0 PID: 13689 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 275.429303][T13689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.439356][T13689] Call Trace: [ 275.442633][T13689] dump_stack+0x1fb/0x318 [ 275.446957][T13689] should_fail+0x555/0x770 [ 275.451378][T13689] __should_failslab+0x11a/0x160 [ 275.456439][T13689] ? tomoyo_encode2+0x273/0x5a0 [ 275.461271][T13689] should_failslab+0x9/0x20 [ 275.465767][T13689] __kmalloc+0x7a/0x340 [ 275.469920][T13689] tomoyo_encode2+0x273/0x5a0 [ 275.474598][T13689] tomoyo_realpath_from_path+0x769/0x7c0 [ 275.480316][T13689] tomoyo_mount_permission+0x923/0xa30 [ 275.485760][T13689] ? kmem_cache_free+0xd8/0xf0 [ 275.490540][T13689] tomoyo_sb_mount+0x35/0x40 [ 275.495130][T13689] security_sb_mount+0x84/0xe0 [ 275.499896][T13689] do_mount+0x10a/0x2510 [ 275.504149][T13689] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 275.509690][T13689] ? copy_mount_options+0x5f/0x3c0 [ 275.514803][T13689] ? copy_mount_options+0x308/0x3c0 [ 275.520001][T13689] ksys_mount+0xcc/0x100 [ 275.524241][T13689] __x64_sys_mount+0xbf/0xd0 [ 275.528841][T13689] do_syscall_64+0xf7/0x1c0 [ 275.533524][T13689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.539410][T13689] RIP: 0033:0x45d08a [ 275.543308][T13689] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 275.563355][T13689] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 275.571775][T13689] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 275.579830][T13689] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 275.587798][T13689] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 275.595765][T13689] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 275.603733][T13689] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 275.613167][T13689] ERROR: Out of memory at tomoyo_realpath_from_path. 01:02:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:30 executing program 2 (fault-call:3 fault-nth:74): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a1006063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:30 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x03', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 275.847360][T13711] FAULT_INJECTION: forcing a failure. [ 275.847360][T13711] name failslab, interval 1, probability 0, space 0, times 0 [ 275.867629][T13711] CPU: 1 PID: 13711 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 275.875657][T13711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.885706][T13711] Call Trace: [ 275.889007][T13711] dump_stack+0x1fb/0x318 [ 275.893339][T13711] should_fail+0x555/0x770 [ 275.897848][T13711] __should_failslab+0x11a/0x160 [ 275.902792][T13711] ? vfs_parse_fs_string+0xed/0x1a0 [ 275.907999][T13711] should_failslab+0x9/0x20 [ 275.912522][T13711] __kmalloc_track_caller+0x79/0x340 [ 275.917809][T13711] kmemdup_nul+0x2a/0xa0 [ 275.922048][T13711] vfs_parse_fs_string+0xed/0x1a0 [ 275.927078][T13711] do_mount+0x11b8/0x2510 [ 275.931403][T13711] ? copy_mount_options+0x278/0x3c0 [ 275.936600][T13711] ? __sanitizer_cov_trace_const_cmp4+0x22/0x90 [ 275.942841][T13711] ? copy_mount_options+0x308/0x3c0 [ 275.948048][T13711] ksys_mount+0xcc/0x100 [ 275.952289][T13711] __x64_sys_mount+0xbf/0xd0 [ 275.957059][T13711] do_syscall_64+0xf7/0x1c0 [ 275.961562][T13711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.967454][T13711] RIP: 0033:0x45d08a [ 275.971343][T13711] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 275.990946][T13711] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 275.999881][T13711] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 276.007935][T13711] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 276.015987][T13711] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 276.023958][T13711] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 276.031932][T13711] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x10, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:30 executing program 2 (fault-call:3 fault-nth:75): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0040063e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 276.231108][T13722] FAULT_INJECTION: forcing a failure. [ 276.231108][T13722] name failslab, interval 1, probability 0, space 0, times 0 [ 276.248353][T13722] CPU: 0 PID: 13722 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 276.256269][T13722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.256276][T13722] Call Trace: [ 276.256296][T13722] dump_stack+0x1fb/0x318 [ 276.256314][T13722] should_fail+0x555/0x770 [ 276.256337][T13722] __should_failslab+0x11a/0x160 [ 276.278390][T13722] ? tomoyo_encode2+0x273/0x5a0 [ 276.288126][T13722] should_failslab+0x9/0x20 [ 276.288134][T13722] __kmalloc+0x7a/0x340 [ 276.288147][T13722] tomoyo_encode2+0x273/0x5a0 [ 276.288164][T13722] tomoyo_realpath_from_path+0x769/0x7c0 [ 276.307058][T13722] tomoyo_mount_permission+0x923/0xa30 [ 276.312611][T13722] ? kmem_cache_free+0xd8/0xf0 [ 276.317387][T13722] tomoyo_sb_mount+0x35/0x40 [ 276.321978][T13722] security_sb_mount+0x84/0xe0 [ 276.326765][T13722] do_mount+0x10a/0x2510 [ 276.331029][T13722] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 276.336570][T13722] ? copy_mount_options+0x5f/0x3c0 [ 276.341676][T13722] ? copy_mount_options+0x308/0x3c0 [ 276.346869][T13722] ksys_mount+0xcc/0x100 [ 276.351107][T13722] __x64_sys_mount+0xbf/0xd0 [ 276.355697][T13722] do_syscall_64+0xf7/0x1c0 [ 276.360196][T13722] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.366086][T13722] RIP: 0033:0x45d08a [ 276.369974][T13722] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 276.389575][T13722] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 276.397993][T13722] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 276.405955][T13722] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 276.413921][T13722] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 276.421897][T13722] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 01:02:31 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 276.429860][T13722] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 276.455437][T13722] ERROR: Out of memory at tomoyo_realpath_from_path. 01:02:31 executing program 2 (fault-call:3 fault-nth:76): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:31 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a005a003e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:31 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x05', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 276.659405][T13745] FAULT_INJECTION: forcing a failure. [ 276.659405][T13745] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 276.732409][T13745] CPU: 1 PID: 13745 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 276.740341][T13745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.740356][T13745] Call Trace: [ 276.740375][T13745] dump_stack+0x1fb/0x318 [ 276.740393][T13745] should_fail+0x555/0x770 [ 276.740411][T13745] should_fail_alloc_page+0x55/0x60 [ 276.740421][T13745] prepare_alloc_pages+0x283/0x460 [ 276.740435][T13745] __alloc_pages_nodemask+0xb2/0x5d0 [ 276.740447][T13745] ? rcu_lock_release+0x26/0x30 [ 276.740464][T13745] alloc_pages_current+0x2db/0x500 [ 276.740478][T13745] __page_cache_alloc+0x7d/0x1e0 [ 276.740490][T13745] do_read_cache_page+0x1f8/0xcb0 [ 276.740504][T13745] read_cache_page_gfp+0x29/0x30 [ 276.740517][T13745] btrfs_scan_one_device+0x16a/0x450 [ 276.740527][T13745] ? trace_hardirqs_on+0x74/0x80 [ 276.740547][T13745] btrfs_mount_root+0x4af/0x1040 [ 276.740564][T13745] ? trace_kfree+0xb2/0x110 [ 276.822726][T13745] legacy_get_tree+0xf9/0x1a0 [ 276.827384][T13745] ? btrfs_control_open+0x40/0x40 [ 276.832389][T13745] vfs_get_tree+0x8b/0x2a0 [ 276.837581][T13745] vfs_kern_mount+0xc2/0x160 [ 276.842157][T13745] btrfs_mount+0x34f/0x18e0 [ 276.846656][T13745] ? check_preemption_disabled+0x47/0x2a0 [ 276.852358][T13745] ? vfs_parse_fs_string+0x13b/0x1a0 [ 276.857635][T13745] ? cap_capable+0x250/0x290 [ 276.862205][T13745] ? safesetid_security_capable+0x89/0xf0 [ 276.867905][T13745] legacy_get_tree+0xf9/0x1a0 [ 276.872580][T13745] ? btrfs_resize_thread_pool+0x290/0x290 [ 276.878320][T13745] vfs_get_tree+0x8b/0x2a0 [ 276.882745][T13745] do_mount+0x16c0/0x2510 [ 276.887072][T13745] ? copy_mount_options+0x308/0x3c0 [ 276.892260][T13745] ksys_mount+0xcc/0x100 [ 276.896493][T13745] __x64_sys_mount+0xbf/0xd0 [ 276.901071][T13745] do_syscall_64+0xf7/0x1c0 [ 276.905730][T13745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.911621][T13745] RIP: 0033:0x45d08a [ 276.915495][T13745] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 276.935509][T13745] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 276.943897][T13745] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 276.951854][T13745] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 276.959803][T13745] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 276.967751][T13745] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 276.975722][T13745] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:31 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x06', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x5421, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:31 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a000c0c3e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:31 executing program 2 (fault-call:3 fault-nth:77): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0012123e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:32 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\a', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 277.289656][T13769] FAULT_INJECTION: forcing a failure. [ 277.289656][T13769] name failslab, interval 1, probability 0, space 0, times 0 [ 277.325634][T13769] CPU: 0 PID: 13769 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 277.333562][T13769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.333568][T13769] Call Trace: [ 277.333587][T13769] dump_stack+0x1fb/0x318 [ 277.333603][T13769] should_fail+0x555/0x770 [ 277.347110][T13769] __should_failslab+0x11a/0x160 [ 277.347124][T13769] should_failslab+0x9/0x20 [ 277.347134][T13769] kmem_cache_alloc_trace+0x5d/0x2f0 [ 277.347145][T13769] ? btrfs_mount_root+0x1b2/0x1040 [ 277.347156][T13769] btrfs_mount_root+0x1b2/0x1040 [ 277.347171][T13769] ? vfs_parse_fs_string+0x13b/0x1a0 01:02:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 277.347180][T13769] ? rcu_read_lock_sched_held+0x10b/0x170 [ 277.347189][T13769] ? trace_kfree+0xb2/0x110 [ 277.347202][T13769] legacy_get_tree+0xf9/0x1a0 [ 277.347211][T13769] ? btrfs_control_open+0x40/0x40 [ 277.347224][T13769] vfs_get_tree+0x8b/0x2a0 [ 277.347238][T13769] vfs_kern_mount+0xc2/0x160 [ 277.380970][T13769] btrfs_mount+0x34f/0x18e0 [ 277.380992][T13769] ? check_preemption_disabled+0x47/0x2a0 [ 277.381011][T13769] ? vfs_parse_fs_string+0x13b/0x1a0 [ 277.381022][T13769] ? cap_capable+0x250/0x290 [ 277.381033][T13769] ? safesetid_security_capable+0x89/0xf0 [ 277.381046][T13769] legacy_get_tree+0xf9/0x1a0 [ 277.392288][T13769] ? btrfs_resize_thread_pool+0x290/0x290 [ 277.392302][T13769] vfs_get_tree+0x8b/0x2a0 [ 277.392315][T13769] do_mount+0x16c0/0x2510 [ 277.392332][T13769] ? copy_mount_options+0x308/0x3c0 [ 277.392344][T13769] ksys_mount+0xcc/0x100 [ 277.392356][T13769] __x64_sys_mount+0xbf/0xd0 [ 277.392371][T13769] do_syscall_64+0xf7/0x1c0 [ 277.392386][T13769] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.392396][T13769] RIP: 0033:0x45d08a [ 277.392407][T13769] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 277.401537][T13769] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 277.401548][T13769] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 277.401555][T13769] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 277.401561][T13769] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 277.401567][T13769] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 277.401573][T13769] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0018183e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:32 executing program 2 (fault-call:3 fault-nth:78): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:32 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\b', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 277.761215][T13788] FAULT_INJECTION: forcing a failure. [ 277.761215][T13788] name failslab, interval 1, probability 0, space 0, times 0 [ 277.825759][T13788] CPU: 1 PID: 13788 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 277.833691][T13788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.844210][T13788] Call Trace: [ 277.847504][T13788] dump_stack+0x1fb/0x318 [ 277.851879][T13788] should_fail+0x555/0x770 [ 277.856307][T13788] __should_failslab+0x11a/0x160 [ 277.861249][T13788] ? btrfs_mount+0x83/0x18e0 [ 277.865834][T13788] should_failslab+0x9/0x20 [ 277.870334][T13788] __kmalloc_track_caller+0x79/0x340 [ 277.875614][T13788] ? __fs_reclaim_release+0x4/0x20 [ 277.880721][T13788] kstrdup+0x34/0x70 [ 277.884612][T13788] btrfs_mount+0x83/0x18e0 [ 277.889030][T13788] ? check_preemption_disabled+0x47/0x2a0 [ 277.894756][T13788] ? vfs_parse_fs_string+0x13b/0x1a0 [ 277.900035][T13788] ? cap_capable+0x250/0x290 [ 277.904618][T13788] ? safesetid_security_capable+0x89/0xf0 [ 277.910342][T13788] legacy_get_tree+0xf9/0x1a0 [ 277.915163][T13788] ? btrfs_resize_thread_pool+0x290/0x290 [ 277.920895][T13788] vfs_get_tree+0x8b/0x2a0 [ 277.925317][T13788] do_mount+0x16c0/0x2510 [ 277.929653][T13788] ? copy_mount_options+0x308/0x3c0 [ 277.934851][T13788] ksys_mount+0xcc/0x100 [ 277.939091][T13788] __x64_sys_mount+0xbf/0xd0 [ 277.943838][T13788] do_syscall_64+0xf7/0x1c0 [ 277.948349][T13788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.954248][T13788] RIP: 0033:0x45d08a [ 277.958158][T13788] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 277.977849][T13788] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 277.986268][T13788] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 277.994244][T13788] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 278.002214][T13788] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 278.010182][T13788] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 278.018147][T13788] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x5450, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a001e1e3e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:32 executing program 2 (fault-call:3 fault-nth:79): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:33 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0024243e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:33 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 278.292559][T13809] FAULT_INJECTION: forcing a failure. [ 278.292559][T13809] name failslab, interval 1, probability 0, space 0, times 0 [ 278.318637][T13809] CPU: 0 PID: 13809 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 278.326570][T13809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.336633][T13809] Call Trace: [ 278.339944][T13809] dump_stack+0x1fb/0x318 [ 278.344286][T13809] should_fail+0x555/0x770 [ 278.344308][T13809] __should_failslab+0x11a/0x160 [ 278.344321][T13809] should_failslab+0x9/0x20 [ 278.344330][T13809] kmem_cache_alloc_trace+0x5d/0x2f0 [ 278.344346][T13809] ? btrfs_mount_root+0x12c/0x1040 [ 278.353699][T13809] btrfs_mount_root+0x12c/0x1040 [ 278.353718][T13809] ? vfs_parse_fs_string+0x13b/0x1a0 [ 278.353729][T13809] ? rcu_read_lock_sched_held+0x10b/0x170 [ 278.353738][T13809] ? trace_kfree+0xb2/0x110 [ 278.353753][T13809] legacy_get_tree+0xf9/0x1a0 [ 278.353761][T13809] ? btrfs_control_open+0x40/0x40 [ 278.353775][T13809] vfs_get_tree+0x8b/0x2a0 [ 278.403118][T13809] vfs_kern_mount+0xc2/0x160 [ 278.407705][T13809] btrfs_mount+0x34f/0x18e0 [ 278.412213][T13809] ? check_preemption_disabled+0x47/0x2a0 [ 278.418028][T13809] ? vfs_parse_fs_string+0x13b/0x1a0 [ 278.423319][T13809] ? cap_capable+0x250/0x290 [ 278.427908][T13809] ? safesetid_security_capable+0x89/0xf0 [ 278.433623][T13809] legacy_get_tree+0xf9/0x1a0 [ 278.438305][T13809] ? btrfs_resize_thread_pool+0x290/0x290 [ 278.444019][T13809] vfs_get_tree+0x8b/0x2a0 [ 278.448449][T13809] do_mount+0x16c0/0x2510 [ 278.452792][T13809] ? copy_mount_options+0x308/0x3c0 [ 278.457995][T13809] ksys_mount+0xcc/0x100 [ 278.462242][T13809] __x64_sys_mount+0xbf/0xd0 [ 278.466846][T13809] do_syscall_64+0xf7/0x1c0 [ 278.471354][T13809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.477241][T13809] RIP: 0033:0x45d08a [ 278.481127][T13809] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 278.500827][T13809] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 278.509250][T13809] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 278.517229][T13809] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 278.525197][T13809] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 278.533161][T13809] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 278.541125][T13809] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:33 executing program 2 (fault-call:3 fault-nth:80): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:33 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a002a2a3e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:33 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\n', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 278.736440][T13822] FAULT_INJECTION: forcing a failure. [ 278.736440][T13822] name failslab, interval 1, probability 0, space 0, times 0 [ 278.786082][T13822] CPU: 1 PID: 13822 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 278.794016][T13822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.804251][T13822] Call Trace: [ 278.807538][T13822] dump_stack+0x1fb/0x318 [ 278.807554][T13822] should_fail+0x555/0x770 [ 278.807570][T13822] __should_failslab+0x11a/0x160 [ 278.807583][T13822] ? btrfs_mount_root+0x2f4/0x1040 [ 278.807592][T13822] should_failslab+0x9/0x20 [ 278.807600][T13822] __kmalloc_track_caller+0x79/0x340 [ 278.807613][T13822] kstrdup+0x34/0x70 [ 278.807623][T13822] btrfs_mount_root+0x2f4/0x1040 [ 278.807639][T13822] ? vfs_parse_fs_string+0x13b/0x1a0 [ 278.850393][T13822] ? rcu_read_lock_sched_held+0x10b/0x170 [ 278.856109][T13822] ? trace_kfree+0xb2/0x110 [ 278.860870][T13822] legacy_get_tree+0xf9/0x1a0 [ 278.865540][T13822] ? btrfs_control_open+0x40/0x40 [ 278.870558][T13822] vfs_get_tree+0x8b/0x2a0 [ 278.874969][T13822] vfs_kern_mount+0xc2/0x160 [ 278.879554][T13822] btrfs_mount+0x34f/0x18e0 [ 278.884063][T13822] ? check_preemption_disabled+0x47/0x2a0 [ 278.890124][T13822] ? vfs_parse_fs_string+0x13b/0x1a0 [ 278.895419][T13822] ? cap_capable+0x250/0x290 [ 278.900013][T13822] ? safesetid_security_capable+0x89/0xf0 [ 278.905733][T13822] legacy_get_tree+0xf9/0x1a0 [ 278.910408][T13822] ? btrfs_resize_thread_pool+0x290/0x290 [ 278.916147][T13822] vfs_get_tree+0x8b/0x2a0 [ 278.920566][T13822] do_mount+0x16c0/0x2510 [ 278.924899][T13822] ? copy_mount_options+0x308/0x3c0 [ 278.930093][T13822] ksys_mount+0xcc/0x100 [ 278.934335][T13822] __x64_sys_mount+0xbf/0xd0 [ 278.938928][T13822] do_syscall_64+0xf7/0x1c0 [ 278.943431][T13822] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.949316][T13822] RIP: 0033:0x45d08a [ 278.953208][T13822] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 278.972811][T13822] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 278.972822][T13822] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 278.972827][T13822] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 278.972832][T13822] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 278.972837][T13822] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 278.972841][T13822] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x5451, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:33 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0030303e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:33 executing program 2 (fault-call:3 fault-nth:81): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:33 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\v', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 279.219632][T13841] FAULT_INJECTION: forcing a failure. [ 279.219632][T13841] name failslab, interval 1, probability 0, space 0, times 0 [ 279.241478][T13841] CPU: 1 PID: 13841 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 279.249413][T13841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.259486][T13841] Call Trace: [ 279.262784][T13841] dump_stack+0x1fb/0x318 [ 279.267114][T13841] should_fail+0x555/0x770 [ 279.271541][T13841] __should_failslab+0x11a/0x160 [ 279.276476][T13841] ? vfs_parse_fs_string+0xed/0x1a0 [ 279.281667][T13841] should_failslab+0x9/0x20 [ 279.286168][T13841] __kmalloc_track_caller+0x79/0x340 [ 279.291455][T13841] kmemdup_nul+0x2a/0xa0 [ 279.295694][T13841] vfs_parse_fs_string+0xed/0x1a0 [ 279.300718][T13841] vfs_kern_mount+0x77/0x160 [ 279.305307][T13841] btrfs_mount+0x34f/0x18e0 [ 279.309818][T13841] ? check_preemption_disabled+0x47/0x2a0 [ 279.315537][T13841] ? vfs_parse_fs_string+0x13b/0x1a0 [ 279.320815][T13841] ? cap_capable+0x250/0x290 [ 279.325399][T13841] ? safesetid_security_capable+0x89/0xf0 [ 279.331220][T13841] legacy_get_tree+0xf9/0x1a0 [ 279.336073][T13841] ? btrfs_resize_thread_pool+0x290/0x290 [ 279.342418][T13841] vfs_get_tree+0x8b/0x2a0 [ 279.346848][T13841] do_mount+0x16c0/0x2510 [ 279.351180][T13841] ? copy_mount_options+0x308/0x3c0 [ 279.356377][T13841] ksys_mount+0xcc/0x100 [ 279.360646][T13841] __x64_sys_mount+0xbf/0xd0 [ 279.365240][T13841] do_syscall_64+0xf7/0x1c0 [ 279.369741][T13841] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.375627][T13841] RIP: 0033:0x45d08a [ 279.379602][T13841] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 279.399208][T13841] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 279.407615][T13841] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a 01:02:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:34 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0036363e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 279.415584][T13841] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 279.423553][T13841] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 279.431526][T13841] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 279.439642][T13841] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:34 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\f', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:34 executing program 2 (fault-call:3 fault-nth:82): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:34 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a003c3c3e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfsA', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 279.735034][T13867] FAULT_INJECTION: forcing a failure. [ 279.735034][T13867] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 279.749402][T13867] CPU: 1 PID: 13867 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 279.757458][T13867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.767539][T13867] Call Trace: [ 279.770833][T13867] dump_stack+0x1fb/0x318 [ 279.775161][T13867] should_fail+0x555/0x770 [ 279.779587][T13867] should_fail_alloc_page+0x55/0x60 [ 279.784784][T13867] prepare_alloc_pages+0x283/0x460 [ 279.789893][T13867] __alloc_pages_nodemask+0xb2/0x5d0 [ 279.796139][T13867] kmem_getpages+0x4d/0xa00 [ 279.800638][T13867] cache_grow_begin+0x7e/0x2c0 [ 279.805396][T13867] cache_alloc_refill+0x311/0x3f0 [ 279.810417][T13867] ? check_preemption_disabled+0xb7/0x2a0 [ 279.816141][T13867] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 279.821509][T13867] ? btrfs_mount_root+0x12c/0x1040 [ 279.826622][T13867] btrfs_mount_root+0x12c/0x1040 [ 279.831566][T13867] ? vfs_parse_fs_string+0x13b/0x1a0 [ 279.836855][T13867] ? rcu_read_lock_sched_held+0x10b/0x170 [ 279.842576][T13867] ? trace_kfree+0xb2/0x110 [ 279.847083][T13867] legacy_get_tree+0xf9/0x1a0 [ 279.851754][T13867] ? btrfs_control_open+0x40/0x40 [ 279.856787][T13867] vfs_get_tree+0x8b/0x2a0 [ 279.861198][T13867] vfs_kern_mount+0xc2/0x160 [ 279.865786][T13867] btrfs_mount+0x34f/0x18e0 [ 279.870296][T13867] ? check_preemption_disabled+0x47/0x2a0 [ 279.876015][T13867] ? vfs_parse_fs_string+0x13b/0x1a0 [ 279.881298][T13867] ? cap_capable+0x250/0x290 [ 279.885887][T13867] ? safesetid_security_capable+0x89/0xf0 [ 279.891609][T13867] legacy_get_tree+0xf9/0x1a0 [ 279.896285][T13867] ? btrfs_resize_thread_pool+0x290/0x290 [ 279.902003][T13867] vfs_get_tree+0x8b/0x2a0 [ 279.906414][T13867] do_mount+0x16c0/0x2510 [ 279.910748][T13867] ? copy_mount_options+0x308/0x3c0 [ 279.915946][T13867] ksys_mount+0xcc/0x100 [ 279.920188][T13867] __x64_sys_mount+0xbf/0xd0 [ 279.924779][T13867] do_syscall_64+0xf7/0x1c0 [ 279.929280][T13867] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.935167][T13867] RIP: 0033:0x45d08a [ 279.939145][T13867] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 279.958742][T13867] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 279.967160][T13867] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 279.975127][T13867] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 01:02:34 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\r', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 279.983095][T13867] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 279.991066][T13867] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 279.999030][T13867] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x5452, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) 01:02:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs ', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:35 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a00005a3e0064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:35 executing program 2 (fault-call:3 fault-nth:83): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:35 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x0e', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 280.318377][T13886] FAULT_INJECTION: forcing a failure. [ 280.318377][T13886] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 280.331742][T13886] CPU: 0 PID: 13886 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 280.331751][T13886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.331755][T13886] Call Trace: [ 280.331773][T13886] dump_stack+0x1fb/0x318 [ 280.331789][T13886] should_fail+0x555/0x770 [ 280.331806][T13886] should_fail_alloc_page+0x55/0x60 [ 280.331815][T13886] prepare_alloc_pages+0x283/0x460 [ 280.331829][T13886] __alloc_pages_nodemask+0xb2/0x5d0 [ 280.331849][T13886] kmem_getpages+0x4d/0xa00 [ 280.331861][T13886] cache_grow_begin+0x7e/0x2c0 [ 280.331873][T13886] cache_alloc_refill+0x311/0x3f0 [ 280.331883][T13886] ? check_preemption_disabled+0xb7/0x2a0 [ 280.331897][T13886] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 280.331906][T13886] ? btrfs_mount_root+0x12c/0x1040 [ 280.331918][T13886] btrfs_mount_root+0x12c/0x1040 [ 280.331932][T13886] ? vfs_parse_fs_string+0x13b/0x1a0 [ 280.349872][T13886] ? rcu_read_lock_sched_held+0x10b/0x170 [ 280.349886][T13886] ? trace_kfree+0xb2/0x110 [ 280.349902][T13886] legacy_get_tree+0xf9/0x1a0 [ 280.349913][T13886] ? btrfs_control_open+0x40/0x40 [ 280.349927][T13886] vfs_get_tree+0x8b/0x2a0 [ 280.349939][T13886] vfs_kern_mount+0xc2/0x160 [ 280.349949][T13886] btrfs_mount+0x34f/0x18e0 [ 280.349966][T13886] ? check_preemption_disabled+0x47/0x2a0 [ 280.349982][T13886] ? vfs_parse_fs_string+0x13b/0x1a0 [ 280.349992][T13886] ? cap_capable+0x250/0x290 [ 280.350004][T13886] ? safesetid_security_capable+0x89/0xf0 [ 280.350018][T13886] legacy_get_tree+0xf9/0x1a0 [ 280.350027][T13886] ? btrfs_resize_thread_pool+0x290/0x290 [ 280.350037][T13886] vfs_get_tree+0x8b/0x2a0 [ 280.350049][T13886] do_mount+0x16c0/0x2510 [ 280.492455][T13886] ? copy_mount_options+0x308/0x3c0 [ 280.497660][T13886] ksys_mount+0xcc/0x100 [ 280.501905][T13886] __x64_sys_mount+0xbf/0xd0 [ 280.506494][T13886] do_syscall_64+0xf7/0x1c0 [ 280.510995][T13886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.516882][T13886] RIP: 0033:0x45d08a [ 280.520957][T13886] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 280.540801][T13886] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 280.549212][T13886] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 280.557178][T13886] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 280.565142][T13886] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 280.573105][T13886] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 280.581072][T13886] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:35 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0264000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:35 executing program 2 (fault-call:3 fault-nth:84): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:35 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x10', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 280.805004][T13904] FAULT_INJECTION: forcing a failure. [ 280.805004][T13904] name failslab, interval 1, probability 0, space 0, times 0 [ 280.912796][T13904] CPU: 1 PID: 13904 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 280.920738][T13904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.930801][T13904] Call Trace: [ 280.934101][T13904] dump_stack+0x1fb/0x318 [ 280.938517][T13904] should_fail+0x555/0x770 [ 280.942940][T13904] __should_failslab+0x11a/0x160 [ 280.947880][T13904] ? btrfs_mount_root+0x2f4/0x1040 [ 280.952986][T13904] should_failslab+0x9/0x20 [ 280.957486][T13904] __kmalloc_track_caller+0x79/0x340 [ 280.962770][T13904] kstrdup+0x34/0x70 [ 280.966665][T13904] btrfs_mount_root+0x2f4/0x1040 [ 280.971610][T13904] ? vfs_parse_fs_string+0x13b/0x1a0 [ 280.976892][T13904] ? rcu_read_lock_sched_held+0x10b/0x170 [ 280.982608][T13904] ? trace_kfree+0xb2/0x110 [ 280.987115][T13904] legacy_get_tree+0xf9/0x1a0 [ 280.991790][T13904] ? btrfs_control_open+0x40/0x40 [ 280.996825][T13904] vfs_get_tree+0x8b/0x2a0 [ 281.001252][T13904] vfs_kern_mount+0xc2/0x160 [ 281.005856][T13904] btrfs_mount+0x34f/0x18e0 [ 281.010368][T13904] ? check_preemption_disabled+0x47/0x2a0 [ 281.016089][T13904] ? vfs_parse_fs_string+0x13b/0x1a0 [ 281.021374][T13904] ? cap_capable+0x250/0x290 [ 281.025965][T13904] ? safesetid_security_capable+0x89/0xf0 [ 281.031692][T13904] legacy_get_tree+0xf9/0x1a0 [ 281.036374][T13904] ? btrfs_resize_thread_pool+0x290/0x290 [ 281.042101][T13904] vfs_get_tree+0x8b/0x2a0 [ 281.046516][T13904] do_mount+0x16c0/0x2510 [ 281.050846][T13904] ? copy_mount_options+0x308/0x3c0 [ 281.056041][T13904] ksys_mount+0xcc/0x100 [ 281.060285][T13904] __x64_sys_mount+0xbf/0xd0 [ 281.064888][T13904] do_syscall_64+0xf7/0x1c0 [ 281.069393][T13904] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.075290][T13904] RIP: 0033:0x45d08a [ 281.079200][T13904] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 281.098804][T13904] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 01:02:35 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0464000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) [ 281.107211][T13904] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 281.115177][T13904] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 281.123155][T13904] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 281.131129][T13904] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 281.140005][T13904] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x5460, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:36 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x11', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:36 executing program 2 (fault-call:3 fault-nth:85): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:36 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0a64000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 281.422046][T13927] FAULT_INJECTION: forcing a failure. [ 281.422046][T13927] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 281.435280][T13927] CPU: 1 PID: 13927 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 281.435287][T13927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.435292][T13927] Call Trace: [ 281.435311][T13927] dump_stack+0x1fb/0x318 [ 281.435327][T13927] should_fail+0x555/0x770 [ 281.435343][T13927] should_fail_alloc_page+0x55/0x60 [ 281.435351][T13927] prepare_alloc_pages+0x283/0x460 [ 281.435365][T13927] __alloc_pages_nodemask+0xb2/0x5d0 [ 281.435384][T13927] kmem_getpages+0x4d/0xa00 [ 281.435396][T13927] cache_grow_begin+0x7e/0x2c0 [ 281.435407][T13927] cache_alloc_refill+0x311/0x3f0 [ 281.435416][T13927] ? check_preemption_disabled+0xb7/0x2a0 [ 281.435428][T13927] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 281.435437][T13927] ? btrfs_mount_root+0x1b2/0x1040 [ 281.435454][T13927] btrfs_mount_root+0x1b2/0x1040 [ 281.435472][T13927] ? vfs_parse_fs_string+0x13b/0x1a0 [ 281.435481][T13927] ? rcu_read_lock_sched_held+0x10b/0x170 [ 281.435492][T13927] ? trace_kfree+0xb2/0x110 [ 281.453552][T13927] legacy_get_tree+0xf9/0x1a0 [ 281.453564][T13927] ? btrfs_control_open+0x40/0x40 [ 281.453578][T13927] vfs_get_tree+0x8b/0x2a0 [ 281.546000][T13927] vfs_kern_mount+0xc2/0x160 [ 281.550589][T13927] btrfs_mount+0x34f/0x18e0 [ 281.550606][T13927] ? check_preemption_disabled+0x47/0x2a0 [ 281.550622][T13927] ? vfs_parse_fs_string+0x13b/0x1a0 [ 281.560812][T13927] ? cap_capable+0x250/0x290 [ 281.560826][T13927] ? safesetid_security_capable+0x89/0xf0 [ 281.560841][T13927] legacy_get_tree+0xf9/0x1a0 [ 281.560851][T13927] ? btrfs_resize_thread_pool+0x290/0x290 [ 281.560864][T13927] vfs_get_tree+0x8b/0x2a0 [ 281.560874][T13927] do_mount+0x16c0/0x2510 [ 281.560888][T13927] ? copy_mount_options+0x308/0x3c0 [ 281.560900][T13927] ksys_mount+0xcc/0x100 [ 281.560910][T13927] __x64_sys_mount+0xbf/0xd0 [ 281.560923][T13927] do_syscall_64+0xf7/0x1c0 [ 281.560937][T13927] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.560945][T13927] RIP: 0033:0x45d08a [ 281.560955][T13927] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 281.560960][T13927] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 281.560970][T13927] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 281.560974][T13927] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 01:02:36 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0f64000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 281.560984][T13927] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 281.581181][T13927] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 281.581188][T13927] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:36 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x12', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) 01:02:36 executing program 2 (fault-call:3 fault-nth:86): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:36 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e1064000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x8933, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:36 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs%', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 282.038351][T13948] FAULT_INJECTION: forcing a failure. [ 282.038351][T13948] name failslab, interval 1, probability 0, space 0, times 0 [ 282.062590][T13948] CPU: 1 PID: 13948 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 282.070517][T13948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.080576][T13948] Call Trace: [ 282.083869][T13948] dump_stack+0x1fb/0x318 [ 282.088204][T13948] should_fail+0x555/0x770 [ 282.092632][T13948] __should_failslab+0x11a/0x160 [ 282.097570][T13948] ? kzalloc+0x26/0x40 [ 282.101645][T13948] should_failslab+0x9/0x20 [ 282.106144][T13948] __kmalloc+0x7a/0x340 [ 282.106171][T13948] kzalloc+0x26/0x40 [ 282.106184][T13948] device_list_add+0x81d/0x18e0 [ 282.119050][T13948] btrfs_scan_one_device+0x2f7/0x450 [ 282.119070][T13948] btrfs_mount_root+0x4af/0x1040 [ 282.119087][T13948] ? trace_kfree+0xb2/0x110 [ 282.119101][T13948] legacy_get_tree+0xf9/0x1a0 [ 282.119109][T13948] ? btrfs_control_open+0x40/0x40 [ 282.119126][T13948] vfs_get_tree+0x8b/0x2a0 [ 282.119137][T13948] vfs_kern_mount+0xc2/0x160 [ 282.119147][T13948] btrfs_mount+0x34f/0x18e0 [ 282.119165][T13948] ? check_preemption_disabled+0x47/0x2a0 [ 282.162744][T13948] ? vfs_parse_fs_string+0x13b/0x1a0 [ 282.168112][T13948] ? cap_capable+0x250/0x290 [ 282.172704][T13948] ? safesetid_security_capable+0x89/0xf0 [ 282.178431][T13948] legacy_get_tree+0xf9/0x1a0 [ 282.183133][T13948] ? btrfs_resize_thread_pool+0x290/0x290 [ 282.190332][T13948] vfs_get_tree+0x8b/0x2a0 [ 282.194749][T13948] do_mount+0x16c0/0x2510 [ 282.199081][T13948] ? copy_mount_options+0x308/0x3c0 [ 282.204279][T13948] ksys_mount+0xcc/0x100 [ 282.208518][T13948] __x64_sys_mount+0xbf/0xd0 [ 282.213124][T13948] do_syscall_64+0xf7/0x1c0 [ 282.218073][T13948] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.223961][T13948] RIP: 0033:0x45d08a [ 282.228049][T13948] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 282.247677][T13948] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 282.256092][T13948] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 282.264063][T13948] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 282.272034][T13948] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 282.280006][T13948] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 282.287977][T13948] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064020200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:37 executing program 2 (fault-call:3 fault-nth:87): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:37 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfsH', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) 01:02:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064040200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 282.612228][T13974] FAULT_INJECTION: forcing a failure. [ 282.612228][T13974] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 282.625479][T13974] CPU: 1 PID: 13974 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 282.633514][T13974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.643579][T13974] Call Trace: [ 282.646881][T13974] dump_stack+0x1fb/0x318 [ 282.651226][T13974] should_fail+0x555/0x770 [ 282.655653][T13974] should_fail_alloc_page+0x55/0x60 [ 282.660849][T13974] prepare_alloc_pages+0x283/0x460 [ 282.665969][T13974] __alloc_pages_nodemask+0xb2/0x5d0 [ 282.671301][T13974] kmem_getpages+0x4d/0xa00 [ 282.675809][T13974] cache_grow_begin+0x7e/0x2c0 [ 282.680573][T13974] cache_alloc_refill+0x311/0x3f0 [ 282.685589][T13974] ? check_preemption_disabled+0xb7/0x2a0 [ 282.691305][T13974] kmem_cache_alloc+0x2b9/0x2e0 [ 282.696149][T13974] ? getname_kernel+0x59/0x2f0 [ 282.700911][T13974] getname_kernel+0x59/0x2f0 [ 282.705497][T13974] kern_path+0x1f/0x40 [ 282.709561][T13974] blkdev_get_by_path+0x71/0x270 [ 282.714585][T13974] btrfs_get_bdev_and_sb+0x48/0x280 [ 282.719782][T13974] open_fs_devices+0x14d/0xb40 [ 282.724547][T13974] ? list_sort+0x5fc/0x860 [ 282.728966][T13974] ? btrfs_open_devices+0x1b0/0x1b0 [ 282.734188][T13974] btrfs_open_devices+0x11d/0x1b0 [ 282.739215][T13974] btrfs_mount_root+0x6ef/0x1040 [ 282.744160][T13974] ? trace_kfree+0xb2/0x110 [ 282.748668][T13974] legacy_get_tree+0xf9/0x1a0 [ 282.753354][T13974] ? btrfs_control_open+0x40/0x40 [ 282.758375][T13974] vfs_get_tree+0x8b/0x2a0 [ 282.762786][T13974] vfs_kern_mount+0xc2/0x160 [ 282.767386][T13974] btrfs_mount+0x34f/0x18e0 [ 282.772761][T13974] ? check_preemption_disabled+0x47/0x2a0 [ 282.778481][T13974] ? vfs_parse_fs_string+0x13b/0x1a0 [ 282.783765][T13974] ? cap_capable+0x250/0x290 [ 282.788358][T13974] ? safesetid_security_capable+0x89/0xf0 [ 282.794078][T13974] legacy_get_tree+0xf9/0x1a0 [ 282.798750][T13974] ? btrfs_resize_thread_pool+0x290/0x290 [ 282.804672][T13974] vfs_get_tree+0x8b/0x2a0 [ 282.809093][T13974] do_mount+0x16c0/0x2510 [ 282.813437][T13974] ? copy_mount_options+0x308/0x3c0 [ 282.818639][T13974] ksys_mount+0xcc/0x100 [ 282.822877][T13974] __x64_sys_mount+0xbf/0xd0 [ 282.827471][T13974] do_syscall_64+0xf7/0x1c0 [ 282.831970][T13974] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.837886][T13974] RIP: 0033:0x45d08a [ 282.841774][T13974] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 282.861460][T13974] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 282.869871][T13974] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 282.877839][T13974] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 282.885805][T13974] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 282.893770][T13974] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 282.901739][T13974] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:37 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfsL', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x894c, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:37 executing program 2 (fault-call:3 fault-nth:88): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) 01:02:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e00640a0200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x10', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:38 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\\', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 283.267305][T13991] FAULT_INJECTION: forcing a failure. [ 283.267305][T13991] name failslab, interval 1, probability 0, space 0, times 0 [ 283.297559][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 283.303357][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 283.309226][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 283.315042][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 283.321651][T13991] CPU: 1 PID: 13991 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 283.329551][T13991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.339613][T13991] Call Trace: [ 283.339633][T13991] dump_stack+0x1fb/0x318 [ 283.339649][T13991] should_fail+0x555/0x770 [ 283.339664][T13991] __should_failslab+0x11a/0x160 [ 283.339675][T13991] ? getname_kernel+0x59/0x2f0 [ 283.339684][T13991] should_failslab+0x9/0x20 [ 283.339692][T13991] kmem_cache_alloc+0x56/0x2e0 [ 283.339705][T13991] getname_kernel+0x59/0x2f0 [ 283.339716][T13991] kern_path+0x1f/0x40 [ 283.339730][T13991] blkdev_get_by_path+0x71/0x270 [ 283.339746][T13991] btrfs_scan_one_device+0xbd/0x450 [ 283.339755][T13991] ? btrfs_mount_root+0x477/0x1040 [ 283.339764][T13991] ? trace_hardirqs_on+0x74/0x80 [ 283.339775][T13991] btrfs_mount_root+0x4af/0x1040 [ 283.339791][T13991] ? trace_kfree+0xb2/0x110 [ 283.339804][T13991] legacy_get_tree+0xf9/0x1a0 [ 283.339813][T13991] ? btrfs_control_open+0x40/0x40 [ 283.339827][T13991] vfs_get_tree+0x8b/0x2a0 [ 283.423093][T13991] vfs_kern_mount+0xc2/0x160 [ 283.427765][T13991] btrfs_mount+0x34f/0x18e0 [ 283.432277][T13991] ? check_preemption_disabled+0x47/0x2a0 [ 283.438446][T13991] ? vfs_parse_fs_string+0x13b/0x1a0 [ 283.443733][T13991] ? cap_capable+0x250/0x290 [ 283.448420][T13991] ? safesetid_security_capable+0x89/0xf0 [ 283.454152][T13991] legacy_get_tree+0xf9/0x1a0 [ 283.458830][T13991] ? btrfs_resize_thread_pool+0x290/0x290 [ 283.464554][T13991] vfs_get_tree+0x8b/0x2a0 [ 283.468979][T13991] do_mount+0x16c0/0x2510 [ 283.473320][T13991] ? copy_mount_options+0x308/0x3c0 [ 283.478519][T13991] ksys_mount+0xcc/0x100 [ 283.482758][T13991] __x64_sys_mount+0xbf/0xd0 [ 283.487355][T13991] do_syscall_64+0xf7/0x1c0 [ 283.491862][T13991] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.497751][T13991] RIP: 0033:0x45d08a [ 283.501637][T13991] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 283.521243][T13991] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 283.529657][T13991] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 283.537740][T13991] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 283.545714][T13991] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 283.553685][T13991] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 283.561652][T13991] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:38 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e00640f0200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:38 executing program 2 (fault-call:3 fault-nth:89): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:38 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfsh', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) [ 283.854403][T14014] FAULT_INJECTION: forcing a failure. [ 283.854403][T14014] name failslab, interval 1, probability 0, space 0, times 0 [ 283.883430][T14014] CPU: 1 PID: 14014 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 283.891364][T14014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.901421][T14014] Call Trace: [ 283.904763][T14014] dump_stack+0x1fb/0x318 [ 283.909107][T14014] should_fail+0x555/0x770 [ 283.913534][T14014] __should_failslab+0x11a/0x160 [ 283.918475][T14014] ? getname_kernel+0x59/0x2f0 [ 283.923242][T14014] should_failslab+0x9/0x20 [ 283.927776][T14014] kmem_cache_alloc+0x56/0x2e0 [ 283.932538][T14014] getname_kernel+0x59/0x2f0 [ 283.937128][T14014] kern_path+0x1f/0x40 [ 283.941195][T14014] blkdev_get_by_path+0x71/0x270 [ 283.946135][T14014] btrfs_get_bdev_and_sb+0x48/0x280 [ 283.951338][T14014] open_fs_devices+0x14d/0xb40 [ 283.956107][T14014] ? list_sort+0x5fc/0x860 [ 283.960528][T14014] ? btrfs_open_devices+0x1b0/0x1b0 [ 283.965826][T14014] btrfs_open_devices+0x11d/0x1b0 [ 283.970860][T14014] btrfs_mount_root+0x6ef/0x1040 [ 283.975896][T14014] ? trace_kfree+0xb2/0x110 [ 283.980431][T14014] legacy_get_tree+0xf9/0x1a0 [ 283.985109][T14014] ? btrfs_control_open+0x40/0x40 [ 283.990141][T14014] vfs_get_tree+0x8b/0x2a0 [ 283.994561][T14014] vfs_kern_mount+0xc2/0x160 [ 283.999157][T14014] btrfs_mount+0x34f/0x18e0 [ 284.003669][T14014] ? check_preemption_disabled+0x47/0x2a0 [ 284.009392][T14014] ? vfs_parse_fs_string+0x13b/0x1a0 [ 284.014677][T14014] ? cap_capable+0x250/0x290 [ 284.019270][T14014] ? safesetid_security_capable+0x89/0xf0 [ 284.024999][T14014] legacy_get_tree+0xf9/0x1a0 [ 284.029680][T14014] ? btrfs_resize_thread_pool+0x290/0x290 [ 284.036186][T14014] vfs_get_tree+0x8b/0x2a0 [ 284.040607][T14014] do_mount+0x16c0/0x2510 [ 284.044940][T14014] ? copy_mount_options+0x308/0x3c0 [ 284.050139][T14014] ksys_mount+0xcc/0x100 [ 284.054386][T14014] __x64_sys_mount+0xbf/0xd0 [ 284.058976][T14014] do_syscall_64+0xf7/0x1c0 [ 284.063513][T14014] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.070012][T14014] RIP: 0033:0x45d08a [ 284.073904][T14014] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 284.093630][T14014] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 284.102048][T14014] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 284.110026][T14014] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 284.118022][T14014] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 284.125994][T14014] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 284.133971][T14014] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:38 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064100200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454d9, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:39 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfsl', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:39 executing program 2 (fault-call:3 fault-nth:90): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000300c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:39 executing program 1 (fault-call:7 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 284.477689][T14034] FAULT_INJECTION: forcing a failure. [ 284.477689][T14034] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 284.512400][T14034] CPU: 0 PID: 14034 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 284.520324][T14034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.520331][T14034] Call Trace: [ 284.520350][T14034] dump_stack+0x1fb/0x318 [ 284.520367][T14034] should_fail+0x555/0x770 [ 284.520383][T14034] should_fail_alloc_page+0x55/0x60 [ 284.520392][T14034] prepare_alloc_pages+0x283/0x460 [ 284.520405][T14034] __alloc_pages_nodemask+0xb2/0x5d0 [ 284.520417][T14034] ? rcu_lock_release+0x26/0x30 [ 284.520435][T14034] alloc_pages_current+0x2db/0x500 [ 284.520454][T14034] __page_cache_alloc+0x7d/0x1e0 [ 284.567984][T14034] do_read_cache_page+0x1f8/0xcb0 [ 284.577937][T14034] read_cache_page_gfp+0x29/0x30 [ 284.577952][T14034] btrfs_scan_one_device+0x16a/0x450 [ 284.577962][T14034] ? trace_hardirqs_on+0x74/0x80 [ 284.577976][T14034] btrfs_mount_root+0x4af/0x1040 [ 284.577994][T14034] ? trace_kfree+0xb2/0x110 [ 284.578008][T14034] legacy_get_tree+0xf9/0x1a0 [ 284.588351][T14034] ? btrfs_control_open+0x40/0x40 [ 284.588367][T14034] vfs_get_tree+0x8b/0x2a0 [ 284.588380][T14034] vfs_kern_mount+0xc2/0x160 [ 284.588391][T14034] btrfs_mount+0x34f/0x18e0 [ 284.588408][T14034] ? check_preemption_disabled+0x47/0x2a0 [ 284.588423][T14034] ? vfs_parse_fs_string+0x13b/0x1a0 [ 284.588435][T14034] ? cap_capable+0x250/0x290 [ 284.588450][T14034] ? safesetid_security_capable+0x89/0xf0 [ 284.598404][T14034] legacy_get_tree+0xf9/0x1a0 [ 284.598416][T14034] ? btrfs_resize_thread_pool+0x290/0x290 [ 284.598429][T14034] vfs_get_tree+0x8b/0x2a0 [ 284.598441][T14034] do_mount+0x16c0/0x2510 [ 284.598457][T14034] ? copy_mount_options+0x308/0x3c0 [ 284.598471][T14034] ksys_mount+0xcc/0x100 [ 284.607624][T14034] __x64_sys_mount+0xbf/0xd0 [ 284.607641][T14034] do_syscall_64+0xf7/0x1c0 [ 284.607655][T14034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.607664][T14034] RIP: 0033:0x45d08a [ 284.607677][T14034] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 284.617103][T14034] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 284.617113][T14034] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 284.617118][T14034] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 284.617123][T14034] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 284.617129][T14034] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 284.617134][T14034] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 284.695703][T14046] FAULT_INJECTION: forcing a failure. [ 284.695703][T14046] name failslab, interval 1, probability 0, space 0, times 0 [ 284.754412][T14046] CPU: 1 PID: 14046 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 284.779674][T14046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.779680][T14046] Call Trace: [ 284.779699][T14046] dump_stack+0x1fb/0x318 [ 284.779715][T14046] should_fail+0x555/0x770 [ 284.779731][T14046] __should_failslab+0x11a/0x160 [ 284.779744][T14046] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 284.779752][T14046] should_failslab+0x9/0x20 [ 284.779761][T14046] __kmalloc+0x7a/0x340 [ 284.779768][T14046] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 284.779780][T14046] tomoyo_realpath_from_path+0xdc/0x7c0 [ 284.779799][T14046] tomoyo_path_number_perm+0x166/0x640 [ 284.779831][T14046] ? smack_file_ioctl+0x226/0x2e0 [ 284.779840][T14046] ? __fget+0x431/0x510 [ 284.779853][T14046] tomoyo_file_ioctl+0x23/0x30 [ 284.779868][T14046] security_file_ioctl+0x6d/0xd0 [ 284.797807][T14046] __x64_sys_ioctl+0xa3/0x120 [ 284.797823][T14046] do_syscall_64+0xf7/0x1c0 [ 284.797837][T14046] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.797846][T14046] RIP: 0033:0x45a639 [ 284.797856][T14046] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.797861][T14046] RSP: 002b:00007fd4e4901c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 284.797870][T14046] RAX: ffffffffffffffda RBX: 00007fd4e4901c90 RCX: 000000000045a639 [ 284.797876][T14046] RDX: 00000000200004c0 RSI: 00000000400454ca RDI: 0000000000000007 01:02:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064004000c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 284.797881][T14046] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 284.797886][T14046] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd4e49026d4 [ 284.797892][T14046] R13: 00000000004c54e6 R14: 00000000004da458 R15: 0000000000000008 [ 284.871198][T14046] ERROR: Out of memory at tomoyo_realpath_from_path. 01:02:39 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfst', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:39 executing program 2 (fault-call:3 fault-nth:91): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 285.167654][T14059] FAULT_INJECTION: forcing a failure. [ 285.167654][T14059] name failslab, interval 1, probability 0, space 0, times 0 [ 285.181590][T14059] CPU: 1 PID: 14059 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 285.189506][T14059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.199565][T14059] Call Trace: [ 285.202859][T14059] dump_stack+0x1fb/0x318 [ 285.207194][T14059] should_fail+0x555/0x770 [ 285.211613][T14059] __should_failslab+0x11a/0x160 [ 285.216546][T14059] ? kzalloc+0x26/0x40 [ 285.217564][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 285.220607][T14059] should_failslab+0x9/0x20 [ 285.226350][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 285.230786][T14059] __kmalloc+0x7a/0x340 [ 285.230800][T14059] kzalloc+0x26/0x40 [ 285.230809][T14059] device_list_add+0x81d/0x18e0 [ 285.230825][T14059] btrfs_scan_one_device+0x2f7/0x450 [ 285.230835][T14059] ? kfree+0x1a3/0x200 [ 285.230848][T14059] btrfs_mount_root+0x4af/0x1040 [ 285.230865][T14059] ? trace_kfree+0xb2/0x110 [ 285.236654][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 285.240702][T14059] legacy_get_tree+0xf9/0x1a0 [ 285.240712][T14059] ? btrfs_control_open+0x40/0x40 [ 285.240728][T14059] vfs_get_tree+0x8b/0x2a0 [ 285.244615][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 285.249417][T14059] vfs_kern_mount+0xc2/0x160 [ 285.249428][T14059] btrfs_mount+0x34f/0x18e0 [ 285.249447][T14059] ? check_preemption_disabled+0x47/0x2a0 [ 285.254756][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 285.258746][T14059] ? vfs_parse_fs_string+0x13b/0x1a0 [ 285.258756][T14059] ? cap_capable+0x250/0x290 [ 285.258769][T14059] ? safesetid_security_capable+0x89/0xf0 [ 285.263704][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 285.268167][T14059] legacy_get_tree+0xf9/0x1a0 [ 285.268177][T14059] ? btrfs_resize_thread_pool+0x290/0x290 [ 285.268193][T14059] vfs_get_tree+0x8b/0x2a0 [ 285.350350][T14059] do_mount+0x16c0/0x2510 [ 285.354682][T14059] ? copy_mount_options+0x308/0x3c0 [ 285.359966][T14059] ksys_mount+0xcc/0x100 [ 285.364207][T14059] __x64_sys_mount+0xbf/0xd0 [ 285.368791][T14059] do_syscall_64+0xf7/0x1c0 [ 285.373292][T14059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.379178][T14059] RIP: 0033:0x45d08a [ 285.383070][T14059] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 285.402677][T14059] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 285.411108][T14059] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a 01:02:40 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfsz', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 285.419071][T14059] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 285.427143][T14059] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 285.435126][T14059] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 285.443101][T14059] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x40049409, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000300c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:40 executing program 1 (fault-call:7 fault-nth:1): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:40 executing program 2 (fault-call:3 fault-nth:92): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x0f', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 285.685238][T14076] FAULT_INJECTION: forcing a failure. [ 285.685238][T14076] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 285.698467][T14076] CPU: 1 PID: 14076 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 285.698476][T14076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.698479][T14076] Call Trace: [ 285.698497][T14076] dump_stack+0x1fb/0x318 [ 285.698513][T14076] should_fail+0x555/0x770 [ 285.698531][T14076] should_fail_alloc_page+0x55/0x60 [ 285.698543][T14076] prepare_alloc_pages+0x283/0x460 [ 285.738745][T14076] __alloc_pages_nodemask+0xb2/0x5d0 [ 285.744018][T14076] kmem_getpages+0x4d/0xa00 [ 285.748516][T14076] cache_grow_begin+0x7e/0x2c0 [ 285.753279][T14076] cache_alloc_refill+0x311/0x3f0 [ 285.758287][T14076] ? check_preemption_disabled+0xb7/0x2a0 [ 285.763999][T14076] __kmalloc+0x318/0x340 [ 285.768222][T14076] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 285.774094][T14076] tomoyo_realpath_from_path+0xdc/0x7c0 [ 285.779622][T14076] tomoyo_path_number_perm+0x166/0x640 [ 285.785076][T14076] ? smack_file_ioctl+0x226/0x2e0 [ 285.790077][T14076] ? __fget+0x431/0x510 [ 285.794226][T14076] tomoyo_file_ioctl+0x23/0x30 [ 285.798970][T14076] security_file_ioctl+0x6d/0xd0 [ 285.803888][T14076] __x64_sys_ioctl+0xa3/0x120 [ 285.808544][T14076] do_syscall_64+0xf7/0x1c0 [ 285.813041][T14076] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.818922][T14076] RIP: 0033:0x45a639 [ 285.822795][T14076] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 285.842381][T14076] RSP: 002b:00007fd4e4943c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 285.850768][T14076] RAX: ffffffffffffffda RBX: 00007fd4e4943c90 RCX: 000000000045a639 [ 285.858730][T14076] RDX: 00000000200004c0 RSI: 00000000400454ca RDI: 0000000000000007 [ 285.866766][T14076] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 285.874716][T14076] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd4e49446d4 01:02:40 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 285.882665][T14076] R13: 00000000004c54e6 R14: 00000000004da458 R15: 0000000000000008 01:02:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000400c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 285.935282][T14080] FAULT_INJECTION: forcing a failure. [ 285.935282][T14080] name failslab, interval 1, probability 0, space 0, times 0 [ 285.982684][T14080] CPU: 1 PID: 14080 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 285.990615][T14080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.000672][T14080] Call Trace: [ 286.003965][T14080] dump_stack+0x1fb/0x318 [ 286.008296][T14080] should_fail+0x555/0x770 [ 286.012719][T14080] __should_failslab+0x11a/0x160 [ 286.018738][T14080] ? kzalloc+0x26/0x40 [ 286.022804][T14080] should_failslab+0x9/0x20 [ 286.027301][T14080] __kmalloc+0x7a/0x340 [ 286.031459][T14080] kzalloc+0x26/0x40 [ 286.035349][T14080] device_list_add+0x81d/0x18e0 [ 286.040233][T14080] btrfs_scan_one_device+0x2f7/0x450 [ 286.045521][T14080] btrfs_mount_root+0x4af/0x1040 [ 286.050464][T14080] ? trace_kfree+0xb2/0x110 [ 286.054970][T14080] legacy_get_tree+0xf9/0x1a0 [ 286.059643][T14080] ? btrfs_control_open+0x40/0x40 [ 286.064662][T14080] vfs_get_tree+0x8b/0x2a0 [ 286.069073][T14080] vfs_kern_mount+0xc2/0x160 [ 286.073746][T14080] btrfs_mount+0x34f/0x18e0 [ 286.078337][T14080] ? check_preemption_disabled+0x47/0x2a0 [ 286.084054][T14080] ? vfs_parse_fs_string+0x13b/0x1a0 [ 286.089333][T14080] ? cap_capable+0x250/0x290 [ 286.093920][T14080] ? safesetid_security_capable+0x89/0xf0 [ 286.099639][T14080] legacy_get_tree+0xf9/0x1a0 [ 286.104307][T14080] ? btrfs_resize_thread_pool+0x290/0x290 [ 286.110023][T14080] vfs_get_tree+0x8b/0x2a0 [ 286.114435][T14080] do_mount+0x16c0/0x2510 [ 286.118754][T14080] ? copy_mount_options+0x278/0x3c0 [ 286.123959][T14080] ? copy_mount_options+0x25e/0x3c0 [ 286.129164][T14080] ? __sanitizer_cov_trace_const_cmp2+0x90/0x90 [ 286.135405][T14080] ? copy_mount_options+0x308/0x3c0 [ 286.140603][T14080] ksys_mount+0xcc/0x100 [ 286.144845][T14080] __x64_sys_mount+0xbf/0xd0 [ 286.149434][T14080] do_syscall_64+0xf7/0x1c0 [ 286.153935][T14080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.159819][T14080] RIP: 0033:0x45d08a [ 286.163876][T14080] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 286.183482][T14080] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 286.191895][T14080] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 286.199869][T14080] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 286.207838][T14080] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 286.215810][T14080] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 286.223779][T14080] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 01:02:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064001000c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 01:02:41 executing program 2 (fault-call:3 fault-nth:93): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:41 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:02:41 executing program 1 (fault-call:7 fault-nth:2): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 01:02:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x4020940d, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 286.518779][T14105] FAULT_INJECTION: forcing a failure. [ 286.518779][T14105] name failslab, interval 1, probability 0, space 0, times 0 [ 286.543201][T14105] CPU: 1 PID: 14105 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 286.551122][T14105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.561173][T14105] Call Trace: [ 286.564985][T14105] dump_stack+0x1fb/0x318 [ 286.569325][T14105] should_fail+0x555/0x770 [ 286.573755][T14105] __should_failslab+0x11a/0x160 [ 286.578686][T14105] ? tomoyo_encode2+0x273/0x5a0 [ 286.583616][T14105] should_failslab+0x9/0x20 [ 286.588115][T14105] __kmalloc+0x7a/0x340 [ 286.592268][T14105] tomoyo_encode2+0x273/0x5a0 [ 286.596944][T14105] tomoyo_realpath_from_path+0x769/0x7c0 [ 286.603012][T14105] tomoyo_path_number_perm+0x166/0x640 [ 286.608585][T14105] ? smack_file_ioctl+0x226/0x2e0 [ 286.613605][T14105] ? __fget+0x431/0x510 [ 286.617763][T14105] tomoyo_file_ioctl+0x23/0x30 [ 286.622679][T14105] security_file_ioctl+0x6d/0xd0 [ 286.627685][T14105] __x64_sys_ioctl+0xa3/0x120 [ 286.632382][T14105] do_syscall_64+0xf7/0x1c0 [ 286.636892][T14105] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.642789][T14105] RIP: 0033:0x45a639 [ 286.646682][T14105] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:02:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000202c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 286.666389][T14105] RSP: 002b:00007fd4e4943c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 286.674818][T14105] RAX: ffffffffffffffda RBX: 00007fd4e4943c90 RCX: 000000000045a639 [ 286.682787][T14105] RDX: 00000000200004c0 RSI: 00000000400454ca RDI: 0000000000000007 [ 286.690754][T14105] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 286.698727][T14105] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd4e49446d4 [ 286.706699][T14105] R13: 00000000004c54e6 R14: 00000000004da458 R15: 0000000000000008 [ 286.728591][T14099] FAULT_INJECTION: forcing a failure. [ 286.728591][T14099] name failslab, interval 1, probability 0, space 0, times 0 [ 286.747377][T14099] CPU: 0 PID: 14099 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 286.755414][T14099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.765475][T14099] Call Trace: [ 286.768779][T14099] dump_stack+0x1fb/0x318 [ 286.773138][T14099] should_fail+0x555/0x770 [ 286.777609][T14099] __should_failslab+0x11a/0x160 [ 286.782556][T14099] ? kzalloc+0x26/0x40 [ 286.786629][T14099] should_failslab+0x9/0x20 [ 286.791134][T14099] __kmalloc+0x7a/0x340 [ 286.795297][T14099] kzalloc+0x26/0x40 [ 286.799186][T14099] close_fs_devices+0x504/0x8d0 [ 286.804050][T14099] btrfs_close_devices+0x33/0x130 [ 286.809074][T14099] btrfs_mount_root+0xa9d/0x1040 [ 286.814976][T14099] ? trace_kfree+0xb2/0x110 [ 286.819487][T14099] legacy_get_tree+0xf9/0x1a0 [ 286.824154][T14099] ? btrfs_control_open+0x40/0x40 [ 286.829167][T14099] vfs_get_tree+0x8b/0x2a0 [ 286.833837][T14099] vfs_kern_mount+0xc2/0x160 [ 286.838513][T14099] btrfs_mount+0x34f/0x18e0 [ 286.843010][T14099] ? check_preemption_disabled+0x47/0x2a0 [ 286.848725][T14099] ? vfs_parse_fs_string+0x13b/0x1a0 [ 286.855120][T14099] ? cap_capable+0x250/0x290 [ 286.859698][T14099] ? safesetid_security_capable+0x89/0xf0 [ 286.865415][T14099] legacy_get_tree+0xf9/0x1a0 [ 286.870087][T14099] ? btrfs_resize_thread_pool+0x290/0x290 [ 286.875794][T14099] vfs_get_tree+0x8b/0x2a0 [ 286.880205][T14099] do_mount+0x16c0/0x2510 [ 286.884544][T14099] ? copy_mount_options+0x278/0x3c0 [ 286.889725][T14099] ? copy_mount_options+0x25e/0x3c0 [ 286.894917][T14099] ? __sanitizer_cov_trace_pc+0x14/0x50 [ 286.900538][T14099] ? copy_mount_options+0x308/0x3c0 [ 286.905727][T14099] ksys_mount+0xcc/0x100 [ 286.909962][T14099] __x64_sys_mount+0xbf/0xd0 [ 286.914540][T14099] do_syscall_64+0xf7/0x1c0 [ 286.919055][T14099] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.924931][T14099] RIP: 0033:0x45d08a [ 286.928811][T14099] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 286.948420][T14099] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 286.956832][T14099] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 286.964805][T14099] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 01:02:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 286.972761][T14099] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 286.980723][T14099] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 286.988683][T14099] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 286.997169][T14105] ERROR: Out of memory at tomoyo_realpath_from_path. [ 287.009883][T14099] ------------[ cut here ]------------ [ 287.015361][T14099] kernel BUG at fs/btrfs/volumes.c:1271! [ 287.025901][T14099] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 287.031993][T14099] CPU: 0 PID: 14099 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 287.039970][T14099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.050041][T14099] RIP: 0010:close_fs_devices+0x8c8/0x8d0 [ 287.055667][T14099] Code: e9 73 ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 7c 87 48 89 df e8 59 70 f9 fe e9 7a ff ff ff e8 1f 2d c0 fe 0f 0b e8 18 2d c0 fe <0f> 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 [ 287.075267][T14099] RSP: 0018:ffff88809824f9a0 EFLAGS: 00010246 [ 287.081323][T14099] RAX: ffffffff82b349b8 RBX: ffff8880a7493c90 RCX: 0000000000040000 [ 287.089285][T14099] RDX: ffffc9000a38f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 287.097247][T14099] RBP: ffff88809824fa30 R08: ffffffff82b4c475 R09: ffffed1015d46b05 [ 287.105237][T14099] R10: ffffed1015d46b05 R11: 0000000000000000 R12: dffffc0000000000 [ 287.113197][T14099] R13: ffff8880a9b00000 R14: 000000000000000a R15: ffff8880a0d65800 [ 287.121183][T14099] FS: 00007f9557cb7700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 287.130107][T14099] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 287.136683][T14099] CR2: 0000001b30324000 CR3: 00000000a366a000 CR4: 00000000001406f0 [ 287.144660][T14099] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 287.152637][T14099] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 287.160596][T14099] Call Trace: [ 287.163889][T14099] btrfs_close_devices+0x33/0x130 [ 287.168910][T14099] btrfs_mount_root+0xa9d/0x1040 [ 287.173844][T14099] ? trace_kfree+0xb2/0x110 [ 287.178339][T14099] legacy_get_tree+0xf9/0x1a0 [ 287.183007][T14099] ? btrfs_control_open+0x40/0x40 [ 287.188053][T14099] vfs_get_tree+0x8b/0x2a0 [ 287.192461][T14099] vfs_kern_mount+0xc2/0x160 [ 287.197082][T14099] btrfs_mount+0x34f/0x18e0 [ 287.201582][T14099] ? check_preemption_disabled+0x47/0x2a0 [ 287.207294][T14099] ? vfs_parse_fs_string+0x13b/0x1a0 [ 287.212569][T14099] ? cap_capable+0x250/0x290 [ 287.217145][T14099] ? safesetid_security_capable+0x89/0xf0 [ 287.222851][T14099] legacy_get_tree+0xf9/0x1a0 [ 287.227517][T14099] ? btrfs_resize_thread_pool+0x290/0x290 [ 287.233228][T14099] vfs_get_tree+0x8b/0x2a0 [ 287.237638][T14099] do_mount+0x16c0/0x2510 [ 287.241953][T14099] ? copy_mount_options+0x278/0x3c0 [ 287.244054][ T3906] kobject: 'loop2' (00000000bf3ec96e): kobject_uevent_env [ 287.247140][T14099] ? copy_mount_options+0x25e/0x3c0 [ 287.247151][T14099] ? __sanitizer_cov_trace_pc+0x14/0x50 [ 287.247162][T14099] ? copy_mount_options+0x308/0x3c0 [ 287.254367][ T3906] kobject: 'loop2' (00000000bf3ec96e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 287.259438][T14099] ksys_mount+0xcc/0x100 [ 287.259449][T14099] __x64_sys_mount+0xbf/0xd0 [ 287.259462][T14099] do_syscall_64+0xf7/0x1c0 [ 287.259473][T14099] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.259484][T14099] RIP: 0033:0x45d08a [ 287.305289][T14099] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 287.324981][T14099] RSP: 002b:00007f9557cb6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 287.333395][T14099] RAX: ffffffffffffffda RBX: 00007f9557cb6b40 RCX: 000000000045d08a [ 287.341364][T14099] RDX: 00007f9557cb6ae0 RSI: 0000000020000100 RDI: 00007f9557cb6b00 [ 287.349338][T14099] RBP: 0000000000000001 R08: 00007f9557cb6b40 R09: 00007f9557cb6ae0 [ 287.357301][T14099] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 287.365303][T14099] R13: 00000000004c9e4d R14: 00000000004e1b50 R15: 0000000000000004 [ 287.373272][T14099] Modules linked in: [ 287.378258][T14102] kobject: 'tx-1' (000000001298061a): kobject_cleanup, parent 0000000030126acf [ 287.387238][T14102] kobject: 'tx-1' (000000001298061a): auto cleanup 'remove' event [ 287.388998][ T3906] kobject: 'loop4' (000000008beef5cd): kobject_uevent_env [ 287.395463][T14102] kobject: 'tx-1' (000000001298061a): kobject_uevent_env [ 287.406022][ T3906] kobject: 'loop4' (000000008beef5cd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 287.409523][T14102] kobject: 'tx-1' (000000001298061a): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-1' [ 287.431059][T14102] kobject: 'tx-1' (000000001298061a): auto cleanup kobject_del [ 287.440542][T14102] kobject: 'tx-1' (000000001298061a): calling ktype release [ 287.448188][T14102] kobject: 'tx-1': free name [ 287.453786][T14099] ---[ end trace 18709c5d8ace5659 ]--- [ 287.454082][T14102] kobject: 'rx-1' (0000000012bd45da): kobject_cleanup, parent 0000000030126acf [ 287.460965][T14102] kobject: 'rx-1' (0000000012bd45da): auto cleanup 'remove' event [ 287.476424][T14099] RIP: 0010:close_fs_devices+0x8c8/0x8d0 [ 287.484940][T14102] kobject: 'rx-1' (0000000012bd45da): kobject_uevent_env [ 287.494834][ T3906] kobject: 'loop3' (0000000095c88579): kobject_uevent_env [ 287.502119][T14102] kobject: 'rx-1' (0000000012bd45da): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-1' [ 287.503226][T14099] Code: e9 73 ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 7c 87 48 89 df e8 59 70 f9 fe e9 7a ff ff ff e8 1f 2d c0 fe 0f 0b e8 18 2d c0 fe <0f> 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 01:02:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x10199) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05034a0006063e0064000204c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 287.515446][ T3906] kobject: 'loop3' (0000000095c88579): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 287.534639][T14099] RSP: 0018:ffff88809824f9a0 EFLAGS: 00010246 [ 287.548201][T14102] kobject: 'rx-1' (0000000012bd45da): auto cleanup kobject_del [ 287.552690][T14099] RAX: ffffffff82b349b8 RBX: ffff8880a7493c90 RCX: 0000000000040000 [ 287.556800][T14102] kobject: 'rx-1' (0000000012bd45da): calling ktype release [ 287.556805][T14102] kobject: 'rx-1': free name [ 287.558488][T14109] kobject: 'vet' (0000000014b2efc8): kobject_cleanup, parent 0000000048f181a9 [ 287.565884][T14099] RDX: ffffc9000a38f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 287.574587][T14117] kobject: 'loop3' (0000000095c88579): kobject_uevent_env [ 287.579142][T14099] RBP: ffff88809824fa30 R08: ffffffff82b4c475 R09: ffffed1015d46b05 [ 287.586761][T14117] kobject: 'loop3' (0000000095c88579): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 287.590287][T14109] kobject: 'vet' (0000000014b2efc8): calling ktype release [ 287.596279][T14099] R10: ffffed1015d46b05 R11: 0000000000000000 R12: dffffc0000000000 [ 287.620358][T14109] kobject: 'vet': free name [ 287.621530][T14099] R13: ffff8880a9b00000 R14: 000000000000000a R15: ffff8880a0d65800 [ 287.648816][T14099] FS: 00007f9557cb7700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 287.660566][T14102] kobject: 'batman_adv' (0000000098d8dfb0): kobject_uevent_env [ 287.665166][T14099] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 287.669007][ T3906] kobject: 'loop5' (000000002cee1beb): kobject_uevent_env [ 287.675665][T14099] CR2: 00000000014f9978 CR3: 00000000a366a000 CR4: 00000000001406e0 [ 287.684272][T14102] kobject: 'batman_adv' (0000000098d8dfb0): kobject_uevent_env: filter function caused the event to drop! [ 287.691492][T14099] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 287.703724][ T3906] kobject: 'loop5' (000000002cee1beb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 287.711336][T14099] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 287.722158][T14102] kobject: 'batman_adv' (0000000098d8dfb0): kobject_cleanup, parent 0000000048f181a9 [ 287.730602][T14099] Kernel panic - not syncing: Fatal exception [ 287.737449][T14102] kobject: 'batman_adv' (0000000098d8dfb0): calling ktype release [ 287.744847][T14099] Kernel Offset: disabled [ 287.756946][T14099] Rebooting in 86400 seconds..