4, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x34, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x40040) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/vcs\x00', 0x400, 0x0) write$apparmor_exec(r8, &(0x7f0000000e00)={'stack ', 'nobarrier'}, 0xf) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$PPPIOCSMRRU(r9, 0x4004743b, &(0x7f0000000e80)=0x3) fcntl$dupfd(r9, 0x406, r4) 20:44:25 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x34, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x40040) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/vcs\x00', 0x400, 0x0) write$apparmor_exec(r8, &(0x7f0000000e00)={'stack ', 'nobarrier'}, 0xf) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$PPPIOCSMRRU(r9, 0x4004743b, &(0x7f0000000e80)=0x3) r10 = fcntl$dupfd(r9, 0x406, r4) recvfrom$netrom(r10, &(0x7f0000000ec0)=""/96, 0x60, 0x40002000, 0x0, 0x0) r11 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r11}, 0x2c, {'wfdno'}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b", 0x5f, 0x10000}], 0x0, 0x0) [ 129.223266][ T8346] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 129.238579][ T8348] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop0 [ 129.256029][ T8346] team0: Device hsr_slave_1 is up. Set it down before adding it as a team port [ 129.280699][ T8351] XFS (loop5): unknown mount option [nobarrier]. [ 129.299130][ T8357] XFS (loop2): unknown mount option [nobarrier]. 20:44:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r2, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) [ 129.334422][ T8352] 9pnet: Insufficient options for proto=fd 20:44:25 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x34, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x40040) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/vcs\x00', 0x400, 0x0) write$apparmor_exec(r8, &(0x7f0000000e00)={'stack ', 'nobarrier'}, 0xf) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$PPPIOCSMRRU(r9, 0x4004743b, &(0x7f0000000e80)=0x3) 20:44:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b", 0x5f, 0x10000}], 0x0, 0x0) 20:44:25 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r1, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:25 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x34, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x40040) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/vcs\x00', 0x400, 0x0) write$apparmor_exec(r8, &(0x7f0000000e00)={'stack ', 'nobarrier'}, 0xf) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$PPPIOCSMRRU(r9, 0x4004743b, &(0x7f0000000e80)=0x3) r10 = fcntl$dupfd(r9, 0x406, r4) recvfrom$netrom(r10, &(0x7f0000000ec0)=""/96, 0x60, 0x40002000, 0x0, 0x0) r11 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r11}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:25 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x2000, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) [ 129.616109][ T8376] XFS (loop5): unknown mount option [nobarrier]. 20:44:25 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r1, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b", 0x5f, 0x10000}], 0x0, 0x0) [ 129.745724][ T8388] XFS (loop2): unknown mount option [nobarrier]. [ 129.787181][ T8387] 9pnet: Insufficient options for proto=fd 20:44:26 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd00010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) r5 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r5}}) 20:44:26 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x34, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x40040) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/vcs\x00', 0x400, 0x0) write$apparmor_exec(r8, &(0x7f0000000e00)={'stack ', 'nobarrier'}, 0xf) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/hwrng\x00', 0x8000, 0x0) 20:44:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000000)=0x10001, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x3cd) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000000c0)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) write(r0, 0x0, 0x0) 20:44:26 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r1, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:26 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x34, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x40040) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/vcs\x00', 0x400, 0x0) write$apparmor_exec(r8, &(0x7f0000000e00)={'stack ', 'nobarrier'}, 0xf) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$PPPIOCSMRRU(r9, 0x4004743b, &(0x7f0000000e80)=0x3) r10 = fcntl$dupfd(r9, 0x406, r4) recvfrom$netrom(r10, &(0x7f0000000ec0)=""/96, 0x60, 0x40002000, 0x0, 0x0) r11 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r11}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b52", 0x8f, 0x10000}], 0x0, 0x0) 20:44:26 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r2, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) [ 130.090680][ T8424] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 130.128522][ T8422] XFS (loop5): unknown mount option [nobarrier]. 20:44:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="fffbffff35c8d19a02bc27"], 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xffffffff, 0x2, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}}}) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000200)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc058560f, &(0x7f0000000300)={0x0, 0x2, 0x0, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20000000}}, [0x0, 0x27bc02]}) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, &(0x7f0000000080)={{0x2, 0x2, 0x2, 0x9, 0x4, 0x5}, 0x568a, 0x4, 0x9}) connect(r2, &(0x7f0000000000)=@in6={0xa, 0x4e23, 0x2, @local, 0x4}, 0x80) [ 130.132799][ T8425] XFS (loop2): unknown mount option [nobarrier]. 20:44:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b52", 0x8f, 0x10000}], 0x0, 0x0) 20:44:26 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r2, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) [ 130.203786][ T8415] 9pnet: Insufficient options for proto=fd 20:44:26 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x34, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x40040) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/vcs\x00', 0x400, 0x0) write$apparmor_exec(r8, &(0x7f0000000e00)={'stack ', 'nobarrier'}, 0xf) [ 130.317863][ T8443] use of bytesused == 0 is deprecated and will be removed in the future, 20:44:26 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x34, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x40040) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/vcs\x00', 0x400, 0x0) write$apparmor_exec(r8, &(0x7f0000000e00)={'stack ', 'nobarrier'}, 0xf) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$PPPIOCSMRRU(r9, 0x4004743b, &(0x7f0000000e80)=0x3) r10 = fcntl$dupfd(r9, 0x406, r4) recvfrom$netrom(r10, &(0x7f0000000ec0)=""/96, 0x60, 0x40002000, 0x0, 0x0) r11 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r11}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) [ 130.366497][ T8443] use the actual size instead. [ 130.477033][ T8457] XFS (loop5): unknown mount option [nobarrier]. [ 130.536008][ T8463] XFS (loop2): unknown mount option [nobarrier]. [ 130.592522][ T8458] 9pnet: Insufficient options for proto=fd 20:44:26 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd00010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) r4 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r4}}) 20:44:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b52", 0x8f, 0x10000}], 0x0, 0x0) 20:44:26 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r2, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:26 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x34, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x40040) openat$vcs(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/vcs\x00', 0x400, 0x0) 20:44:26 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x34, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x40040) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/vcs\x00', 0x400, 0x0) write$apparmor_exec(r8, &(0x7f0000000e00)={'stack ', 'nobarrier'}, 0xf) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$PPPIOCSMRRU(r9, 0x4004743b, &(0x7f0000000e80)=0x3) fcntl$dupfd(r9, 0x406, r4) r10 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r11 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r10}, 0x2c, {'wfdno', 0x3d, r11}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:27 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r2, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) [ 130.928434][ T8482] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 130.947465][ T8473] XFS (loop5): unknown mount option [nobarrier]. [ 131.021324][ T8486] XFS (loop2): unknown mount option [nobarrier]. 20:44:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e3889", 0xa7, 0x10000}], 0x0, 0x0) 20:44:27 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x34, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x40040) 20:44:27 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r2, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000002000/0x1000)=nil) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000700)={0xffffffffffffffff}) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) ioctl$VIDIOC_G_SELECTION(r6, 0xc040565e, &(0x7f00000000c0)={0x5, 0xbff58fd572f88883, 0x2, {0x4, 0x4, 0x9, 0x6}}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r4, 0x80045700, &(0x7f0000000080)) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000300)) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x8000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 131.261413][ T8502] XFS (loop5): unknown mount option [nobarrier]. 20:44:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e3889", 0xa7, 0x10000}], 0x0, 0x0) [ 131.302115][ T8510] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 20:44:27 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r2, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) [ 131.616575][ T8526] kvm: emulating exchange as write 20:44:27 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:44:27 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') 20:44:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e3889", 0xa7, 0x10000}], 0x0, 0x0) 20:44:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r2, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:27 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x34, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x40040) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/vcs\x00', 0x400, 0x0) write$apparmor_exec(r8, &(0x7f0000000e00)={'stack ', 'nobarrier'}, 0xf) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$PPPIOCSMRRU(r9, 0x4004743b, &(0x7f0000000e80)=0x3) r10 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r11 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r10}, 0x2c, {'wfdno', 0x3d, r11}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r2, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) [ 131.801203][ T8530] XFS (loop5): unknown mount option [nobarrier]. 20:44:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c36673", 0xb3, 0x10000}], 0x0, 0x0) [ 131.907426][ T8541] XFS (loop2): unknown mount option [nobarrier]. 20:44:28 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) 20:44:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r2, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) [ 132.086291][ T8562] XFS (loop5): unknown mount option [nobarrier]. 20:44:28 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8920, &(0x7f0000000000)={'veth1_to_bond:\x00', 0x0}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x1a1200) getsockname$netrom(r1, &(0x7f0000000080)={{}, [@bcast, @netrom, @remote, @rose, @remote, @default, @default, @default]}, &(0x7f0000000100)=0x48) 20:44:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c36673", 0xb3, 0x10000}], 0x0, 0x0) 20:44:28 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r2 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:44:28 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) 20:44:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c36673", 0xb3, 0x10000}], 0x0, 0x0) 20:44:28 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x80, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) socket$inet6(0xa, 0x3, 0xd) socket$rds(0x15, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000037c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f00000038c0)=0xe8) sendmmsg(r1, &(0x7f0000003f40)=[{{0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000180)="8cadaad7cec06f57957c12d994ddcbf137614f219ed2a47858fa982f5d853b8981a1c4207415067fd12755c01de2f7722fc87b763d6b41b2428d3ea967250496b12a58785f759c9748366195d74ea61c540da7579c19388713ce1b91488c35e20109b8737364ad08206485ae8d0d76f03de775d38c29a59fb87a1e0b7d9c0958fd73c2dd06d80c2cb75a68255ec34af0d55e6f5bf0ed16e4166e5636d984a40ad64e139797f4bca43a1ed61fb31372f7de9beca9825cde4bbd3635a96277d5b72897ee583dd94996a27e02dfd7f614cecb82f66dbfbd619d4bf5b318b5", 0xdd}, {&(0x7f0000000100)="69b2c2ffda9a501ce58c6efd25d39e88172c69b7116a95349deb71cb035247d6e7136c36e31fadf0cdc0bd", 0x2b}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="f1dfa3223e7c7741a32abe5a92a0ae30aab197991bde7a47fb94d1b09a420ddd3f4a9fb63ee1e6429804cd6ab17ed736cd6557184e2b1feb7a10ec1966eaed1f55062efe235fa1b9820408126f0bd6c36d16633d1e2475", 0x57}], 0x4, &(0x7f0000001380)=[{0xb8, 0x117, 0x100, "f1950ff5fda0b8d6ab2447db9781be33e9f78e981cb2fc9a6e60ac58ea27bdef93fe9f52d927dc260fce1484d4d48818ff489853e95475d8ac19397b4cd329658af2b932018391f0475f2c7293d1cfe1dbd61eca9619049b7250c9313a965974e35d9ba6bd86ff5f40782b69ce6f97b081ad70845117f2ac746d664b373126e99bd87f6acc9ee5112e228c31499409cc68f6a9232bcab3a5b388965cc9e1143cdc"}, {0x70, 0x104, 0x8, "7b25739b29ccede1b49db4cff48741386c92a4bc93ad1bd2974de4626e5a163de5d5e13a24894f32c29f41206276231b045c8628de8388a1b50516d6fda1d48cc2e1cc05ae29a2dd463fb5a6c64333b01fa47bcad36af162b2d3acebc9"}, {0x100, 0x113, 0x3, "7da42689496a411bc5be3f1474544c0907aa1ab14abd1fbe80b6cd049f8819bc5a31077928775ae0d07794c21e02fc84312ea1e7361f98f61d6e76b5d0371483f2b684784fec0b68d602de0ccd50634ad67cae2e1349e1e54e3d53189b041a819041c5157f0880e512724631113652d48b8902fe591f1b6f27e86a571c4299343db720ec7331836f4ae7829c2643dafd8b81fc7a7b3495a301145037e6f555456159c019f927f25189511b5eabd04df31fe5cb5cfb6a339f0a9e66ba1a2381c0758997e10cfba659c3e411f1c0e9edb871951d5430d1b919a8779758af7dc1b59cc0d3371a615592b330e41f48"}, {0x48, 0x107, 0x83a6, "636eeef9a647a10436244c4e1d6cf14a0ed80721a10e801cd78e3f943fc619f3c3819c38dc74c5afb5f06340429bc063447684"}, {0x90, 0x65da7e33da22dc2c, 0x7, "d39e566a9e1f0e9d4b50be57c2cd2479ef573d4efa1052446d849d40b647f2e3f32faac881aa8e3d386411072e03b9d36969a13c8fd69569e647ce49117feb2874dd78d7063855eb73bb93bda63453673f3bb1ddba90afe1deb8517d011af9c7219a0015ed855fd43caba9acc953f0eb1fdfbf793aa01dba57"}, {0xb0, 0xb2c2d7e0fa41e18, 0x93, "ea42cf8ca3b6fb012b41277df23b1e328a0d791abd29df96db9c5fd1fae35a4f757158ab948bc0121182c9f24cdeefb20ed9a38049146ad0826a5070c7de962f5a77ec75520860edfdd318c5dc4810e42c77e57148d59e4f2f918c2f3a7d44bd13dca3006dc31ce07c1e0a9a7e3e0c6937a67bba9e8de31fe20019eb3cc832ebe79baf7f86518656e34d808a1f72f6848d83b6b89a2caf4ac9a0"}], 0x3b0}}, {{&(0x7f0000001740)=@x25={0x9, @remote={[], 0x2}}, 0x80, &(0x7f0000001b00)=[{&(0x7f00000017c0)="8cbf4e9cfea57968e7402a450a3d049a21ea5eebdae391199770a60dfea965d14696b11ac95c13976ffc56c461298ccad22a270aecb78a9de82367b1c0ea85a1e14cf0757550ae49f7d2d39c275546aec64be332b0355fc8fa1fb28f0088d3e962010946796f56dd23dfff82549aebce3deb39b94b2e9baf75aa69190ca99f5e98266b17d816da068f865b64c6a93fa1ead1226bd29bc21a3e2f78042a384f50960889b64dc64cdbfa7da1cdc1310799d4c9d57695b424c083a2d4c93d68a65a358d0fe44ce6bc00f496ed34ab35527d2e79b8a14f5525fcd4d1bf991bc5c4378e5ab0bb83d2704033b61733a05b09c3a1", 0xf1}, {&(0x7f00000018c0)="47bb6e84c6b99889c4a80207b799a194d87880c1499d96f3e912c28d3053d8425f8041b1445c05dafafba145dcbcaac12f516890545e68dac2b190fac5771084b820c7b2b77d9aa11420814e97f6a41761290685ae3b67d5355d2a3be9d330e4a520192ff3850f0c01395d74b27f1e4d9c5271ef9e8f8999d6cfd2e4684d297e24f2465c1579ca733de8", 0x8a}, {&(0x7f0000001980)}, {&(0x7f00000019c0)="f4fc0b5640248c47d25e27a17891ed8cb1d82bc88bee5b980f6f5509f4dbbc414a9215fdba5bead0c6dc477cce547ffbb20bcebbb39568e39c4dd5bd94d5f4169e12a75fdfb52de1425826cf3acb69ac441ee09f5b430c5e8d56c9de3e408a3b6a42a103eb87e0993c9b0fd9a15edc1b0bf49a4fd762118f", 0x78}, {&(0x7f0000001a40)="12238eb4dfa20c97b794abe60f6f35f0d7a507c8332107b3fd0606b17296e97f85a911d0f64dfafe80beae93ab56b59a2e28fb9fabda1a8e30c2404604894138e1801c5b5d04434039a83b0b1d57cdbbadfee2c0449001d0959a844deb582f4fb7fb38702f891f8801701eca1a4905d37e5f106bf9302d6b095f449d87423ca1187a1967f3db378ab6586b3d2c9dc9b22abd2b9a3f2f7f9af479a8d64c32570009ee690763dd5f22229a5f8b83ed", 0xae}], 0x5, &(0x7f0000001b80)=[{0x100, 0x108, 0x1ff, "5999c5aa7ed89bf96a09e8f29bb317bd7e881c12a9ce8e404439c21c0948cf3a8be2b7bef5a5e241c31e257026b6a8d208ccf8b4b061ab5cd72d5ce033648c0ad18ceca5e12b142ae258d095cd7830d2c127af83dbf9054994c6cd1a596974247815902565b5ec1519dd08a794f33b5ca8e967adfe62b3204c72f6d3517d47af711bec2888d8b7237d4b5ac2e7da73e65f9305da988ca6a21873c706f341c4cfc659d473479f7698bc10c31a33317736fd1abc800bd37bcfafcbd1cd5d75f9c516ea4bb03b0ad19a4a98bdc068c81f5f39d23766908b9d2013a2ea4133f20d524d1e184a216142fb683604"}, {0x60, 0x110, 0x80000000, "ac83f68f16a8aa6b8cbc4acad09b7225aabfe999f89fa605c2bb2b7e2ef8a756bfebb165fe6b652755a5d61a20a3fc46833d508f0241958fa198b2842f50e332941aefe6b05f814fb7425dd5ec8f"}, {0x48, 0x107, 0x9, "52e71908bbfa6126c735b014832a355ccc2097e54358d00fa45c3b25acd0874bb77c9fe4caf1cf613034fa7d63eba152c8b371c7a5"}, {0x48, 0x0, 0x4, "17844b80f48d8764f4c218189a3225f96994fc0ea629684c6c48aeb02a5cb1d9513304b6317a7a0fd2989f6f0ec921e4a3"}, {0xe0, 0x108, 0x1, "ae4b8f7bf121507ab01973acdab5acb5d9c98000aecca9a171b4b782ebe8a26453dc937c3f10641f08cc162ce1a5d2fd39cc9ece7dcdd53bf9148e214d4ed7cb0cf8ff3573c4b59290c829e0066c56d82bf2f93d3c2e48ff5c44f947609b32f77568be6aa991c41f5800d84b3d3b7602d84509ab17e2c2f999bb7299574610f43c128110ea043c0d60792ac59dda1aa048fb498327098eecadc38693955a91d11ea3af3742f3da553da98e12e71054dd1e582ef49fc1d699335dda70d410254f596ba31a93735a94ab26"}, {0x58, 0x10d, 0x2, "e73be8113726d6b89c8fd61be8ad67aa55cc2bbbac9181226e96010f7ccb84c625fec94894db962f6725ec75a817a3bd5c404bf7872a9fc944fb173bc0829c0cc3a1936b66d8"}], 0x328}}, {{&(0x7f0000001ec0)=@nl=@proc={0x10, 0x0, 0x25dfdbfc, 0x20}, 0x80, &(0x7f0000002340)=[{&(0x7f0000001f40)="00152b5acfd4410ed6bef37b13b6a37962e3c153ffcf46b4caf0f7791f629d1cfea39cd955752e38da9fdd410334b2a1b6ef95eb5ac15c9c671b36c3d584e581afd4e1b79cb177fbdee338a221398e39a3ac062175ea28248c1f8c829891e704ca068452ba2b7b77c187d831159dea479a033a419aef89eac4b96adbbc2eea544642361d0f145f9799b06f5e4d8a", 0x8e}, {&(0x7f0000002000)="a56d219ac384415a881d63adbda3692a14360aca256a4bb6b86a98b6e5aa90d36276d60ac87c39230219f32137df63c5872f6cd89d0622ecc2a1f0ea513212f23d34289b0b11dc7a682d5fcd66", 0x4d}, {&(0x7f0000002080)="e7f30c02440f24f3bdbf2d172867625e05b2a2dcce2448ec1460f45f064026164b9142c1aac308923ae3d0b49ab1723db140880ca92574138def6df523893b19d2f28b74e47354d447915e0bfb2c65e6adee2b5547977fb38b", 0x59}, {&(0x7f0000002100)="dee95f5690b916eb088d063dd8cfee46c06c88e502b17433dbc2db1ae6b04ecf02df6037dc78a5f0f3b7fe5f86331ba4e5e0bfcfd6fe83872ef0300a515002121c094120c6f5337ed71ed1e921fe63231cca1c4bbcabf587b8a623b7f2b048a98ac6ce6d26eb76ccb2a6463af34490fd0503b35d6726b71ab52aa6581732955d53c0c4301c5ebf5a32d10a25d0c6a086b6927034e32adfa41a90e1772a6b2f02d26187f01095631c3bcde776aec607d0a176b6e7b252972695b86ab99fe43734b10eddae1dd45ce9c30a0c59243b36adfb951741fff8f9ec1676efc33ecc64f32330b281b97cc54e31a7efbda8", 0xed}, {&(0x7f0000002200)="5d4875b1c1e99548d025bf4c5c71302750f743a1a72f8b3819e82aea1a635a9e51dd1c56672b6a705f9db943e5241d326f4f6d9e105d804974e999990e62c304727c4144f830787536a782ef5700537d4202df626cb054f9b666cbd0e7925436c4bec030b5b14ff4db7385ec20e4d3e7099e79f12d7447a7feb38507ef94d28137c46a7b73476061f5d63265c676dd22e409cebae1b9e0e3952deb2e31", 0x9d}, {&(0x7f00000022c0)="489b5bc76b5df9afe41c96c490ac82cf710bd9b36b0139f303b22a91e788b9ba5a3daf2d5e323027a17c2770931274c5740a", 0x32}, {&(0x7f0000002300)="bd1cbc91e06e2224379a1cde41e14025f4df2465fd2d0f73175c6d8c5f", 0x1d}], 0x7, &(0x7f00000023c0)=[{0xc8, 0x104, 0x2, "b5263523efb6e118d1600e2258eb0836ec2ef4a25ca4ceebda57f5197d0b8a89598fb2554953490b595d61d53e4a0fc360de77f467e8a9ec14346730f426b5d8b8e4e28c1ede99692a6ee9fc26897c58e78ead95143783a45de98b7cca80b60b4ea9a7e98c5098059c90351a56893980331f231550e9cc9d5781e1b15ebc0e2a945491837ba2a2a72269dace6cb73e63d56198fb47f318375419f436b899e21bc302a4d9a4b965410ed4c6373d7e335a643b89bb21bc"}, {0x10, 0x117, 0xf4a8}, {0x48, 0x118, 0x8001, "448129aad618d5fee2cde8b71ab5240f7ac9286808f0d5d7d2e637398554b995eedda372fd9fe54f11f66f23fdd5139e1200"}, {0x1010, 0x109, 0x0, "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"}, {0x60, 0x10a, 0x2, "8eb7353237d837e106d601f766421e4d797c65a86617330e8f73b93218da30e573f0d33884d1dda03754a310855a40f007b5eca47b0837a5b4db9889e4c4e4716373cbda49bd0fbb33bacd"}, {0xb0, 0xff, 0x2, "e383e06b45654d79bf96dffcda7f04ff783dcfd413d64e837e7612c0f4b2147dd109570fe071cdb229d4a731d7c4fdb7363bd2bf7747c00991eece2f9730aeb5955b132c81dcf6ba149f92285be3a9b7d8884ad3bd8b809dfc98f057418408bea9312b08264fc486323e0d4ba87c3237fe3293755277c04cbc08453a7ed59bacfb8672fb2b25dc21b5b8e9b1c088fe5009b821e7fe62eec7f1ec860176efd3"}, {0xb8, 0x102, 0x0, "079ba6736f6849ed7a977673258c9231492c82b21be2066c554631b96942ea70796b865ca9f03598f4821208f5f8bc2159216a11dcdaee912d701c908221c98f972f7d0ffa4b0781b532ef3594d6b989155bcedcfe0d4700e3d7566803f16c871776e91c0aa13e2b177e882c71e06e08552714ea0ac912dd511d5bc06f1ecfbb95765b8f3ccff5329852daacdadce67c392da0df04aab9bfe680628f6b5c5a7882"}, {0xf8, 0x10f, 0x9, "162ae400cad2966c9af7661673134cb20671a773a7a0011681799ac97feff95f258ebeedcebc2ea499edddcf31a6a85f664fe16e7015b73d6ffe3736081a6dcc1614ffffdfa33141a661d77f392eb4040fb8c31e86ab521c9d2b86aa81215adfac9095bbf49ff0bf3f995e01383991dcf168fdc743569d7b056cbaac9b5073b7ac2a1654af78256b28587b78b162e50b394a42ed80099c9a94e24ed4159f445e143930576934ebf666c12d4cfc2b273aae8aada1f7d4a412040e36e67fe2eaae58606a348bd590f34ec571b8723aa6f1425e89ba9fedc818e8228e9af07d8872ffd1f479"}], 0x13f0}}, {{&(0x7f0000003900)=@xdp={0x2c, 0xc150b1d777e00838, r2, 0xe}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003980)="97a9cf70eb9ff6de5443e7608854f426eab960f6c895f76bd3d6ffdad0f340e8c175ed066997a4130a036520a72659725c3e454f6e1eb3cd921c47eea80ccf149e71cc8c255019b008830172909056bfb7760294a0a6ea2fdcad2a802f7117c8f902eb983c71d05c34cbaee453b1b5b9cf89901c50a018b6330d4c9fdc884bcc0d9829e6f326a88431d349e36d281233da060b1389679d4e0330d52ae697ced25e05db", 0xa3}, {&(0x7f0000003a40)="0a1bc794a29a5f3a1cdeeb2457572ee615a23bc513a3179b4bdaaef65bed9c3ffa0aadf54cafe63b1bab13c158d9f4c21120c7609a19f4209a84103f29ac26933b398d5ec781c248ee47b525bc7a9f78004e4ba0d1823d21517addb6a09d1f8d1a41cb2d29679d2ad1abf9bfbeb97ab5b1d32f719ea7cfa623b0bb6115ef32988a290326b0acb4add9bd22ef15cc0a145064fa8b66f58c0381d2f5d0855ec53f49739c78015d188d0d9ae734de66848b668cc3553507e43803fd5fb88c840e3b6f691ed50d500fed5fe58427a68485", 0xcf}, {&(0x7f0000003b40)="02dc", 0x2}, {&(0x7f0000003b80)="341f25cf87c6001b88d620d0a0d962b4db872a6f3edacf47caa6e1b2e6d8599c304698df2d22a83e0f111f705d1082ba7c52c371", 0x34}, {&(0x7f0000003bc0)="f8c4d04354587093035d025f35889f5dc3e893b0f3af7dbfce2e", 0x1a}, {&(0x7f0000003c00)="d461834517b7ab6c920086fa28299bb4b05bedbc439726bf0cbfaf52257804b9fc36906d54e03765b499750b70e9e61c5938c189d55f7f30354e29e2a856dc4f6ea9ee6291468d7b721e6cc526e47199c2d7", 0x52}], 0x6}}, {{&(0x7f0000003d00)=@can={0x1d, r2}, 0x80, &(0x7f0000003e00)=[{&(0x7f0000003d80)="b601505422e1724da4aac0908185587c19df14c595d97fcac18875e5713adaf3f814d7a34bc0bc30a544b6a5ca057a6abacfaab5bd5bd95eeeb7c0af551905a6433f1eafde4350d6205a722d101c2a2d4b0668fdd23c8da77c6414d6351ece56683d188f826e83f0269c3bcaff2061", 0x6f}], 0x1, &(0x7f0000003e40)=[{0xd8, 0x107, 0x8, "c34f293eeecd9ade3ff3d1444cc55ce8008bc921050f033cc345b817d1e8c5a5f0fedb9ec6bd3f4f594819fafc937cbb55aaee9ce97fb6756eae0c5c03a1c0c3e4545a919a569536a54721f7d609945b9c5f776fa7cb074ff8b0284ed50a74b166a89e789b4543d966c42d8204d3ab5b462d5c9bf382c82105a7e1d1f732f29bcc6aed291802ecd1d8bf134830738503b3f05e23fc15c8d1176bd0ba03c9673a2ffa86a6c7bab09703b72af9a777291304fe551bbf263d3e41769268296402701f80"}], 0xd8}}], 0x5, 0x0) 20:44:28 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x34, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x40040) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/vcs\x00', 0x400, 0x0) write$apparmor_exec(r8, &(0x7f0000000e00)={'stack ', 'nobarrier'}, 0xf) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/hwrng\x00', 0x8000, 0x0) r9 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r10 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r10}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) [ 132.701735][ T8585] XFS (loop2): unknown mount option [nobarrier]. [ 132.715355][ T8597] XFS (loop5): unknown mount option [nobarrier]. 20:44:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b0", 0xb9, 0x10000}], 0x0, 0x0) 20:44:28 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x80, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) socket$inet6(0xa, 0x3, 0xd) socket$rds(0x15, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000037c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f00000038c0)=0xe8) sendmmsg(r1, &(0x7f0000003f40)=[{{0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000180)="8cadaad7cec06f57957c12d994ddcbf137614f219ed2a47858fa982f5d853b8981a1c4207415067fd12755c01de2f7722fc87b763d6b41b2428d3ea967250496b12a58785f759c9748366195d74ea61c540da7579c19388713ce1b91488c35e20109b8737364ad08206485ae8d0d76f03de775d38c29a59fb87a1e0b7d9c0958fd73c2dd06d80c2cb75a68255ec34af0d55e6f5bf0ed16e4166e5636d984a40ad64e139797f4bca43a1ed61fb31372f7de9beca9825cde4bbd3635a96277d5b72897ee583dd94996a27e02dfd7f614cecb82f66dbfbd619d4bf5b318b5", 0xdd}, {&(0x7f0000000100)="69b2c2ffda9a501ce58c6efd25d39e88172c69b7116a95349deb71cb035247d6e7136c36e31fadf0cdc0bd", 0x2b}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="f1dfa3223e7c7741a32abe5a92a0ae30aab197991bde7a47fb94d1b09a420ddd3f4a9fb63ee1e6429804cd6ab17ed736cd6557184e2b1feb7a10ec1966eaed1f55062efe235fa1b9820408126f0bd6c36d16633d1e2475", 0x57}], 0x4, &(0x7f0000001380)=[{0xb8, 0x117, 0x100, "f1950ff5fda0b8d6ab2447db9781be33e9f78e981cb2fc9a6e60ac58ea27bdef93fe9f52d927dc260fce1484d4d48818ff489853e95475d8ac19397b4cd329658af2b932018391f0475f2c7293d1cfe1dbd61eca9619049b7250c9313a965974e35d9ba6bd86ff5f40782b69ce6f97b081ad70845117f2ac746d664b373126e99bd87f6acc9ee5112e228c31499409cc68f6a9232bcab3a5b388965cc9e1143cdc"}, {0x70, 0x104, 0x8, "7b25739b29ccede1b49db4cff48741386c92a4bc93ad1bd2974de4626e5a163de5d5e13a24894f32c29f41206276231b045c8628de8388a1b50516d6fda1d48cc2e1cc05ae29a2dd463fb5a6c64333b01fa47bcad36af162b2d3acebc9"}, {0x100, 0x113, 0x3, "7da42689496a411bc5be3f1474544c0907aa1ab14abd1fbe80b6cd049f8819bc5a31077928775ae0d07794c21e02fc84312ea1e7361f98f61d6e76b5d0371483f2b684784fec0b68d602de0ccd50634ad67cae2e1349e1e54e3d53189b041a819041c5157f0880e512724631113652d48b8902fe591f1b6f27e86a571c4299343db720ec7331836f4ae7829c2643dafd8b81fc7a7b3495a301145037e6f555456159c019f927f25189511b5eabd04df31fe5cb5cfb6a339f0a9e66ba1a2381c0758997e10cfba659c3e411f1c0e9edb871951d5430d1b919a8779758af7dc1b59cc0d3371a615592b330e41f48"}, {0x48, 0x107, 0x83a6, "636eeef9a647a10436244c4e1d6cf14a0ed80721a10e801cd78e3f943fc619f3c3819c38dc74c5afb5f06340429bc063447684"}, {0x90, 0x65da7e33da22dc2c, 0x7, "d39e566a9e1f0e9d4b50be57c2cd2479ef573d4efa1052446d849d40b647f2e3f32faac881aa8e3d386411072e03b9d36969a13c8fd69569e647ce49117feb2874dd78d7063855eb73bb93bda63453673f3bb1ddba90afe1deb8517d011af9c7219a0015ed855fd43caba9acc953f0eb1fdfbf793aa01dba57"}, {0xb0, 0xb2c2d7e0fa41e18, 0x93, "ea42cf8ca3b6fb012b41277df23b1e328a0d791abd29df96db9c5fd1fae35a4f757158ab948bc0121182c9f24cdeefb20ed9a38049146ad0826a5070c7de962f5a77ec75520860edfdd318c5dc4810e42c77e57148d59e4f2f918c2f3a7d44bd13dca3006dc31ce07c1e0a9a7e3e0c6937a67bba9e8de31fe20019eb3cc832ebe79baf7f86518656e34d808a1f72f6848d83b6b89a2caf4ac9a0"}], 0x3b0}}, {{&(0x7f0000001740)=@x25={0x9, @remote={[], 0x2}}, 0x80, &(0x7f0000001b00)=[{&(0x7f00000017c0)="8cbf4e9cfea57968e7402a450a3d049a21ea5eebdae391199770a60dfea965d14696b11ac95c13976ffc56c461298ccad22a270aecb78a9de82367b1c0ea85a1e14cf0757550ae49f7d2d39c275546aec64be332b0355fc8fa1fb28f0088d3e962010946796f56dd23dfff82549aebce3deb39b94b2e9baf75aa69190ca99f5e98266b17d816da068f865b64c6a93fa1ead1226bd29bc21a3e2f78042a384f50960889b64dc64cdbfa7da1cdc1310799d4c9d57695b424c083a2d4c93d68a65a358d0fe44ce6bc00f496ed34ab35527d2e79b8a14f5525fcd4d1bf991bc5c4378e5ab0bb83d2704033b61733a05b09c3a1", 0xf1}, {&(0x7f00000018c0)="47bb6e84c6b99889c4a80207b799a194d87880c1499d96f3e912c28d3053d8425f8041b1445c05dafafba145dcbcaac12f516890545e68dac2b190fac5771084b820c7b2b77d9aa11420814e97f6a41761290685ae3b67d5355d2a3be9d330e4a520192ff3850f0c01395d74b27f1e4d9c5271ef9e8f8999d6cfd2e4684d297e24f2465c1579ca733de8", 0x8a}, {&(0x7f0000001980)}, {&(0x7f00000019c0)="f4fc0b5640248c47d25e27a17891ed8cb1d82bc88bee5b980f6f5509f4dbbc414a9215fdba5bead0c6dc477cce547ffbb20bcebbb39568e39c4dd5bd94d5f4169e12a75fdfb52de1425826cf3acb69ac441ee09f5b430c5e8d56c9de3e408a3b6a42a103eb87e0993c9b0fd9a15edc1b0bf49a4fd762118f", 0x78}, {&(0x7f0000001a40)="12238eb4dfa20c97b794abe60f6f35f0d7a507c8332107b3fd0606b17296e97f85a911d0f64dfafe80beae93ab56b59a2e28fb9fabda1a8e30c2404604894138e1801c5b5d04434039a83b0b1d57cdbbadfee2c0449001d0959a844deb582f4fb7fb38702f891f8801701eca1a4905d37e5f106bf9302d6b095f449d87423ca1187a1967f3db378ab6586b3d2c9dc9b22abd2b9a3f2f7f9af479a8d64c32570009ee690763dd5f22229a5f8b83ed", 0xae}], 0x5, &(0x7f0000001b80)=[{0x100, 0x108, 0x1ff, "5999c5aa7ed89bf96a09e8f29bb317bd7e881c12a9ce8e404439c21c0948cf3a8be2b7bef5a5e241c31e257026b6a8d208ccf8b4b061ab5cd72d5ce033648c0ad18ceca5e12b142ae258d095cd7830d2c127af83dbf9054994c6cd1a596974247815902565b5ec1519dd08a794f33b5ca8e967adfe62b3204c72f6d3517d47af711bec2888d8b7237d4b5ac2e7da73e65f9305da988ca6a21873c706f341c4cfc659d473479f7698bc10c31a33317736fd1abc800bd37bcfafcbd1cd5d75f9c516ea4bb03b0ad19a4a98bdc068c81f5f39d23766908b9d2013a2ea4133f20d524d1e184a216142fb683604"}, {0x60, 0x110, 0x80000000, "ac83f68f16a8aa6b8cbc4acad09b7225aabfe999f89fa605c2bb2b7e2ef8a756bfebb165fe6b652755a5d61a20a3fc46833d508f0241958fa198b2842f50e332941aefe6b05f814fb7425dd5ec8f"}, {0x48, 0x107, 0x9, "52e71908bbfa6126c735b014832a355ccc2097e54358d00fa45c3b25acd0874bb77c9fe4caf1cf613034fa7d63eba152c8b371c7a5"}, {0x48, 0x0, 0x4, "17844b80f48d8764f4c218189a3225f96994fc0ea629684c6c48aeb02a5cb1d9513304b6317a7a0fd2989f6f0ec921e4a3"}, {0xe0, 0x108, 0x1, "ae4b8f7bf121507ab01973acdab5acb5d9c98000aecca9a171b4b782ebe8a26453dc937c3f10641f08cc162ce1a5d2fd39cc9ece7dcdd53bf9148e214d4ed7cb0cf8ff3573c4b59290c829e0066c56d82bf2f93d3c2e48ff5c44f947609b32f77568be6aa991c41f5800d84b3d3b7602d84509ab17e2c2f999bb7299574610f43c128110ea043c0d60792ac59dda1aa048fb498327098eecadc38693955a91d11ea3af3742f3da553da98e12e71054dd1e582ef49fc1d699335dda70d410254f596ba31a93735a94ab26"}, {0x58, 0x10d, 0x2, "e73be8113726d6b89c8fd61be8ad67aa55cc2bbbac9181226e96010f7ccb84c625fec94894db962f6725ec75a817a3bd5c404bf7872a9fc944fb173bc0829c0cc3a1936b66d8"}], 0x328}}, {{&(0x7f0000001ec0)=@nl=@proc={0x10, 0x0, 0x25dfdbfc, 0x20}, 0x80, &(0x7f0000002340)=[{&(0x7f0000001f40)="00152b5acfd4410ed6bef37b13b6a37962e3c153ffcf46b4caf0f7791f629d1cfea39cd955752e38da9fdd410334b2a1b6ef95eb5ac15c9c671b36c3d584e581afd4e1b79cb177fbdee338a221398e39a3ac062175ea28248c1f8c829891e704ca068452ba2b7b77c187d831159dea479a033a419aef89eac4b96adbbc2eea544642361d0f145f9799b06f5e4d8a", 0x8e}, {&(0x7f0000002000)="a56d219ac384415a881d63adbda3692a14360aca256a4bb6b86a98b6e5aa90d36276d60ac87c39230219f32137df63c5872f6cd89d0622ecc2a1f0ea513212f23d34289b0b11dc7a682d5fcd66", 0x4d}, {&(0x7f0000002080)="e7f30c02440f24f3bdbf2d172867625e05b2a2dcce2448ec1460f45f064026164b9142c1aac308923ae3d0b49ab1723db140880ca92574138def6df523893b19d2f28b74e47354d447915e0bfb2c65e6adee2b5547977fb38b", 0x59}, {&(0x7f0000002100)="dee95f5690b916eb088d063dd8cfee46c06c88e502b17433dbc2db1ae6b04ecf02df6037dc78a5f0f3b7fe5f86331ba4e5e0bfcfd6fe83872ef0300a515002121c094120c6f5337ed71ed1e921fe63231cca1c4bbcabf587b8a623b7f2b048a98ac6ce6d26eb76ccb2a6463af34490fd0503b35d6726b71ab52aa6581732955d53c0c4301c5ebf5a32d10a25d0c6a086b6927034e32adfa41a90e1772a6b2f02d26187f01095631c3bcde776aec607d0a176b6e7b252972695b86ab99fe43734b10eddae1dd45ce9c30a0c59243b36adfb951741fff8f9ec1676efc33ecc64f32330b281b97cc54e31a7efbda8", 0xed}, {&(0x7f0000002200)="5d4875b1c1e99548d025bf4c5c71302750f743a1a72f8b3819e82aea1a635a9e51dd1c56672b6a705f9db943e5241d326f4f6d9e105d804974e999990e62c304727c4144f830787536a782ef5700537d4202df626cb054f9b666cbd0e7925436c4bec030b5b14ff4db7385ec20e4d3e7099e79f12d7447a7feb38507ef94d28137c46a7b73476061f5d63265c676dd22e409cebae1b9e0e3952deb2e31", 0x9d}, {&(0x7f00000022c0)="489b5bc76b5df9afe41c96c490ac82cf710bd9b36b0139f303b22a91e788b9ba5a3daf2d5e323027a17c2770931274c5740a", 0x32}, {&(0x7f0000002300)="bd1cbc91e06e2224379a1cde41e14025f4df2465fd2d0f73175c6d8c5f", 0x1d}], 0x7, &(0x7f00000023c0)=[{0xc8, 0x104, 0x2, "b5263523efb6e118d1600e2258eb0836ec2ef4a25ca4ceebda57f5197d0b8a89598fb2554953490b595d61d53e4a0fc360de77f467e8a9ec14346730f426b5d8b8e4e28c1ede99692a6ee9fc26897c58e78ead95143783a45de98b7cca80b60b4ea9a7e98c5098059c90351a56893980331f231550e9cc9d5781e1b15ebc0e2a945491837ba2a2a72269dace6cb73e63d56198fb47f318375419f436b899e21bc302a4d9a4b965410ed4c6373d7e335a643b89bb21bc"}, {0x10, 0x117, 0xf4a8}, {0x48, 0x118, 0x8001, "448129aad618d5fee2cde8b71ab5240f7ac9286808f0d5d7d2e637398554b995eedda372fd9fe54f11f66f23fdd5139e1200"}, {0x1010, 0x109, 0x0, "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"}, {0x60, 0x10a, 0x2, "8eb7353237d837e106d601f766421e4d797c65a86617330e8f73b93218da30e573f0d33884d1dda03754a310855a40f007b5eca47b0837a5b4db9889e4c4e4716373cbda49bd0fbb33bacd"}, {0xb0, 0xff, 0x2, "e383e06b45654d79bf96dffcda7f04ff783dcfd413d64e837e7612c0f4b2147dd109570fe071cdb229d4a731d7c4fdb7363bd2bf7747c00991eece2f9730aeb5955b132c81dcf6ba149f92285be3a9b7d8884ad3bd8b809dfc98f057418408bea9312b08264fc486323e0d4ba87c3237fe3293755277c04cbc08453a7ed59bacfb8672fb2b25dc21b5b8e9b1c088fe5009b821e7fe62eec7f1ec860176efd3"}, {0xb8, 0x102, 0x0, "079ba6736f6849ed7a977673258c9231492c82b21be2066c554631b96942ea70796b865ca9f03598f4821208f5f8bc2159216a11dcdaee912d701c908221c98f972f7d0ffa4b0781b532ef3594d6b989155bcedcfe0d4700e3d7566803f16c871776e91c0aa13e2b177e882c71e06e08552714ea0ac912dd511d5bc06f1ecfbb95765b8f3ccff5329852daacdadce67c392da0df04aab9bfe680628f6b5c5a7882"}, {0xf8, 0x10f, 0x9, "162ae400cad2966c9af7661673134cb20671a773a7a0011681799ac97feff95f258ebeedcebc2ea499edddcf31a6a85f664fe16e7015b73d6ffe3736081a6dcc1614ffffdfa33141a661d77f392eb4040fb8c31e86ab521c9d2b86aa81215adfac9095bbf49ff0bf3f995e01383991dcf168fdc743569d7b056cbaac9b5073b7ac2a1654af78256b28587b78b162e50b394a42ed80099c9a94e24ed4159f445e143930576934ebf666c12d4cfc2b273aae8aada1f7d4a412040e36e67fe2eaae58606a348bd590f34ec571b8723aa6f1425e89ba9fedc818e8228e9af07d8872ffd1f479"}], 0x13f0}}, {{&(0x7f0000003900)=@xdp={0x2c, 0xc150b1d777e00838, r2, 0xe}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003980)="97a9cf70eb9ff6de5443e7608854f426eab960f6c895f76bd3d6ffdad0f340e8c175ed066997a4130a036520a72659725c3e454f6e1eb3cd921c47eea80ccf149e71cc8c255019b008830172909056bfb7760294a0a6ea2fdcad2a802f7117c8f902eb983c71d05c34cbaee453b1b5b9cf89901c50a018b6330d4c9fdc884bcc0d9829e6f326a88431d349e36d281233da060b1389679d4e0330d52ae697ced25e05db", 0xa3}, {&(0x7f0000003a40)="0a1bc794a29a5f3a1cdeeb2457572ee615a23bc513a3179b4bdaaef65bed9c3ffa0aadf54cafe63b1bab13c158d9f4c21120c7609a19f4209a84103f29ac26933b398d5ec781c248ee47b525bc7a9f78004e4ba0d1823d21517addb6a09d1f8d1a41cb2d29679d2ad1abf9bfbeb97ab5b1d32f719ea7cfa623b0bb6115ef32988a290326b0acb4add9bd22ef15cc0a145064fa8b66f58c0381d2f5d0855ec53f49739c78015d188d0d9ae734de66848b668cc3553507e43803fd5fb88c840e3b6f691ed50d500fed5fe58427a68485", 0xcf}, {&(0x7f0000003b40)="02dc", 0x2}, {&(0x7f0000003b80)="341f25cf87c6001b88d620d0a0d962b4db872a6f3edacf47caa6e1b2e6d8599c304698df2d22a83e0f111f705d1082ba7c52c371", 0x34}, {&(0x7f0000003bc0)="f8c4d04354587093035d025f35889f5dc3e893b0f3af7dbfce2e", 0x1a}, {&(0x7f0000003c00)="d461834517b7ab6c920086fa28299bb4b05bedbc439726bf0cbfaf52257804b9fc36906d54e03765b499750b70e9e61c5938c189d55f7f30354e29e2a856dc4f6ea9ee6291468d7b721e6cc526e47199c2d7", 0x52}], 0x6}}, {{&(0x7f0000003d00)=@can={0x1d, r2}, 0x80, &(0x7f0000003e00)=[{&(0x7f0000003d80)="b601505422e1724da4aac0908185587c19df14c595d97fcac18875e5713adaf3f814d7a34bc0bc30a544b6a5ca057a6abacfaab5bd5bd95eeeb7c0af551905a6433f1eafde4350d6205a722d101c2a2d4b0668fdd23c8da77c6414d6351ece56683d188f826e83f0269c3bcaff2061", 0x6f}], 0x1, &(0x7f0000003e40)=[{0xd8, 0x107, 0x8, "c34f293eeecd9ade3ff3d1444cc55ce8008bc921050f033cc345b817d1e8c5a5f0fedb9ec6bd3f4f594819fafc937cbb55aaee9ce97fb6756eae0c5c03a1c0c3e4545a919a569536a54721f7d609945b9c5f776fa7cb074ff8b0284ed50a74b166a89e789b4543d966c42d8204d3ab5b462d5c9bf382c82105a7e1d1f732f29bcc6aed291802ecd1d8bf134830738503b3f05e23fc15c8d1176bd0ba03c9673a2ffa86a6c7bab09703b72af9a777291304fe551bbf263d3e41769268296402701f80"}], 0xd8}}], 0x5, 0x0) 20:44:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:29 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) [ 133.152290][ T8633] XFS (loop5): unknown mount option [nobarrier]. 20:44:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b0", 0xb9, 0x10000}], 0x0, 0x0) 20:44:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c36673", 0xb3, 0x10000}], 0x0, 0x0) 20:44:29 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) 20:44:29 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:29 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x34, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x40040) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/vcs\x00', 0x400, 0x0) write$apparmor_exec(r8, &(0x7f0000000e00)={'stack ', 'nobarrier'}, 0xf) r9 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r10 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r10}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) [ 133.612657][ T8658] XFS (loop2): unknown mount option [nobarrier]. [ 133.618516][ T8653] XFS (loop5): unknown mount option [nobarrier]. 20:44:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b0", 0xb9, 0x10000}], 0x0, 0x0) 20:44:29 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) creat(&(0x7f0000000a40)='./file0\x00', 0x82) 20:44:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b0", 0xb9, 0x10000}], 0x0, 0x0) 20:44:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d", 0xbc, 0x10000}], 0x0, 0x0) [ 133.961116][ T8681] XFS (loop5): unknown mount option [nobarrier]. 20:44:30 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) 20:44:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:30 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x117e00) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x64, r4, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80000000}, @TIPC_NLA_NET_ADDR={0x0, 0x2, 0xde5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x30000000}, 0x4) sendto$inet(r2, 0x0, 0xfea2, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 134.244712][ T8706] XFS (loop5): unknown mount option [nobarrier]. 20:44:30 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:30 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x34, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x40040) openat$vcs(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/vcs\x00', 0x400, 0x0) r8 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r9 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d", 0xbc, 0x10000}], 0x0, 0x0) 20:44:30 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) 20:44:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x206200, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x40806685, &(0x7f0000000200)={0x1, 0x2, 0x1000, 0x2d, &(0x7f0000000100)="aa167007d19689b0ae3edd8755b6d75d0128c4055905d7fd09da7aab0d0748152017759545e2973144a904675b", 0xeb, 0x0, &(0x7f0000000300)="3ca94d29d058a052100ccb4884b3e571dc29d3cb5d5b30fabd12acd6d8c2b8b9a0f1c590a0876e3c9b0236089f7fe812325bad76676156ca848a36654021618e0045a7c9f541bde8b9581616ffdca61065f180d5a501d17c73b92e3d0373113ba17cfd984717d28cdf0c54fe9fe242fb2fe4e58fcf3d3988f61a108725f6e1a5056d6c649b00360327bffa038ff2b51ef388b72b3254479cd6a60bc367e6aac50ecf3a1c8235cac83cffe10a6d847049029bd04fed010daa9a1b4bc18fb1bb51948ad990face87befbf1fc298bd41e466b7233b2a19c6a7f5b67e246f50e2195884675e87779629100a7ee"}) fchdir(r1) r3 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r3, &(0x7f0000000100)=ANY=[], 0x11d) dup(0xffffffffffffffff) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) [ 134.482592][ T8728] XFS (loop2): unknown mount option [nobarrier]. 20:44:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d", 0xbc, 0x10000}], 0x0, 0x0) 20:44:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x900) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) [ 134.567794][ T8739] XFS (loop5): unknown mount option [nobarrier]. 20:44:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x900) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:30 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) 20:44:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d71", 0xbd, 0x10000}], 0x0, 0x0) [ 134.907717][ T8765] XFS (loop5): unknown mount option [nobarrier]. 20:44:31 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x900) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:31 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) 20:44:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d71", 0xbd, 0x10000}], 0x0, 0x0) 20:44:31 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x34, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x40040) r8 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r9 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) [ 135.411380][ T8789] XFS (loop2): unknown mount option [nobarrier]. [ 135.434789][ T8784] XFS (loop5): unknown mount option [nobarrier]. 20:44:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d71", 0xbd, 0x10000}], 0x0, 0x0) 20:44:31 executing program 1: getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000000)={@multicast1}, &(0x7f0000000040)=0x8) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000240)='security.ima\x00', &(0x7f0000000280)=@v1={0x2, "1b3a4b08fc8c03068c"}, 0xa, 0x1) write(r1, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x4}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000000c0)=ANY=[@ANYBLOB="05000000000000000050000000000000eb00000000000000", @ANYPTR, @ANYRESOCT=r2, @ANYBLOB="90b5276b758f1a32ef5970f9ccd57e7c90dc8b1ff4d0eb4b3668411fd49fb9610147f61125365a039227879408c601c9cd6a8664ff20c55e178e6e2b3a3dbd969f182b72bf47de24044f6ac146d7444c4bfc84827bd9a16b276fed3fea68e2125d3c2f2c6ecb594dd1c11e78fe9e298ca4fd525c4754f8f352d904d1be6460e8f3dfa85084c38676bd90182286c4d35e7a305a16a77ce906e8a61704e0adf746e854dd2010c314a54c5d68a54c9d511b06f9ec299d97ab2a61499edece0d90f0cec705e3af6e669a2ca395d1974c8a7c2a5e34ef44dca7a5a33c799e2d52", @ANYBLOB="00000000000000000040000000000000f700000000000000", @ANYRESHEX=r1, @ANYRESHEX, @ANYPTR, @ANYRESHEX=r0, @ANYPTR=&(0x7f00000009c0)=ANY=[]]) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r3, r0, 0x0) 20:44:31 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) 20:44:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x96ef0c417310c6f9}, 0x900) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe}], 0x0, 0x0) [ 135.737638][ T8825] XFS (loop5): unknown mount option [nobarrier]. 20:44:32 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x900) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:32 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() 20:44:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe}], 0x0, 0x0) 20:44:32 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') r6 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe}], 0x0, 0x0) [ 136.295504][ T8838] XFS (loop5): unknown mount option [nobarrier]. [ 136.306675][ T8847] XFS (loop2): unknown mount option [nobarrier]. 20:44:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:32 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) 20:44:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:32 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:32 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) [ 136.654878][ T8881] FAULT_INJECTION: forcing a failure. [ 136.654878][ T8881] name failslab, interval 1, probability 0, space 0, times 1 [ 136.681106][ T8881] CPU: 0 PID: 8881 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 136.688935][ T8881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.698984][ T8881] Call Trace: [ 136.702270][ T8881] dump_stack+0x1d8/0x2f8 [ 136.706591][ T8881] should_fail+0x555/0x770 [ 136.711002][ T8881] __should_failslab+0x11a/0x160 [ 136.715928][ T8881] ? __se_sys_memfd_create+0x10a/0x4b0 [ 136.721370][ T8881] should_failslab+0x9/0x20 [ 136.725859][ T8881] __kmalloc+0x7a/0x340 [ 136.730009][ T8881] __se_sys_memfd_create+0x10a/0x4b0 [ 136.735279][ T8881] ? do_syscall_64+0x1d/0x1c0 [ 136.740042][ T8881] __x64_sys_memfd_create+0x5b/0x70 [ 136.745238][ T8881] do_syscall_64+0xf7/0x1c0 [ 136.749730][ T8881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 136.755609][ T8881] RIP: 0033:0x459a59 [ 136.759492][ T8881] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 136.779078][ T8881] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 136.787493][ T8881] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a59 [ 136.795448][ T8881] RDX: 00000000200003c8 RSI: 0000000000000000 RDI: 00000000004be9af [ 136.803405][ T8881] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 136.811366][ T8881] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fca6654b6d4 [ 136.819496][ T8881] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 [ 136.929396][ T8886] XFS (loop5): unknown mount option [nobarrier]. 20:44:33 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:33 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:33 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-control\x00', 0x48000, 0x0) r6 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:33 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) 20:44:33 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) [ 137.087388][ T8900] FAULT_INJECTION: forcing a failure. [ 137.087388][ T8900] name failslab, interval 1, probability 0, space 0, times 0 [ 137.112113][ T8900] CPU: 1 PID: 8900 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 137.120113][ T8900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.130167][ T8900] Call Trace: 20:44:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) [ 137.133551][ T8900] dump_stack+0x1d8/0x2f8 [ 137.137888][ T8900] should_fail+0x555/0x770 [ 137.142484][ T8900] __should_failslab+0x11a/0x160 [ 137.147418][ T8900] ? shmem_alloc_inode+0x1b/0x40 [ 137.152357][ T8900] should_failslab+0x9/0x20 [ 137.156862][ T8900] kmem_cache_alloc+0x56/0x2e0 [ 137.161886][ T8900] ? shmem_match+0x180/0x180 [ 137.166480][ T8900] shmem_alloc_inode+0x1b/0x40 [ 137.171240][ T8900] ? shmem_match+0x180/0x180 [ 137.175829][ T8900] new_inode_pseudo+0x68/0x240 [ 137.180616][ T8900] new_inode+0x28/0x1c0 [ 137.184765][ T8900] ? __kasan_check_read+0x11/0x20 [ 137.184779][ T8900] shmem_get_inode+0x11b/0x700 [ 137.184798][ T8900] ? __alloc_fd+0x58f/0x630 [ 137.199066][ T8900] __shmem_file_setup+0x129/0x280 [ 137.199080][ T8900] shmem_file_setup+0x2f/0x40 [ 137.199092][ T8900] __se_sys_memfd_create+0x28e/0x4b0 [ 137.199103][ T8900] ? do_syscall_64+0x1d/0x1c0 [ 137.199116][ T8900] __x64_sys_memfd_create+0x5b/0x70 [ 137.199127][ T8900] do_syscall_64+0xf7/0x1c0 [ 137.199142][ T8900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 137.199154][ T8900] RIP: 0033:0x459a59 [ 137.238123][ T8900] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 137.257733][ T8900] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 137.266141][ T8900] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a59 [ 137.274105][ T8900] RDX: 00000000200003c8 RSI: 0000000000000000 RDI: 00000000004be9af [ 137.282062][ T8900] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 137.290021][ T8900] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fca6654b6d4 [ 137.297980][ T8900] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 [ 137.318454][ T8898] XFS (loop2): unknown mount option [nobarrier]. [ 137.320417][ T8909] XFS (loop5): unknown mount option [nobarrier]. 20:44:33 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) 20:44:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:33 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) 20:44:33 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 137.517714][ T8929] XFS (loop5): unknown mount option [nobarrier]. [ 137.539565][ T8935] FAULT_INJECTION: forcing a failure. [ 137.539565][ T8935] name failslab, interval 1, probability 0, space 0, times 0 [ 137.562890][ T8935] CPU: 0 PID: 8935 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 137.570715][ T8935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.580853][ T8935] Call Trace: [ 137.584141][ T8935] dump_stack+0x1d8/0x2f8 [ 137.588464][ T8935] should_fail+0x555/0x770 [ 137.592893][ T8935] __should_failslab+0x11a/0x160 [ 137.597840][ T8935] ? security_inode_alloc+0x36/0x1e0 [ 137.603116][ T8935] should_failslab+0x9/0x20 [ 137.607616][ T8935] kmem_cache_alloc+0x56/0x2e0 [ 137.612370][ T8935] ? rcu_read_lock_sched_held+0x10b/0x170 [ 137.618081][ T8935] security_inode_alloc+0x36/0x1e0 [ 137.623188][ T8935] inode_init_always+0x3b5/0x8d0 [ 137.628114][ T8935] ? shmem_match+0x180/0x180 [ 137.632695][ T8935] new_inode_pseudo+0x7f/0x240 [ 137.637443][ T8935] new_inode+0x28/0x1c0 [ 137.641587][ T8935] ? __kasan_check_read+0x11/0x20 [ 137.646603][ T8935] shmem_get_inode+0x11b/0x700 [ 137.651372][ T8935] ? __alloc_fd+0x58f/0x630 [ 137.655869][ T8935] __shmem_file_setup+0x129/0x280 [ 137.660883][ T8935] shmem_file_setup+0x2f/0x40 [ 137.665548][ T8935] __se_sys_memfd_create+0x28e/0x4b0 [ 137.670820][ T8935] ? do_syscall_64+0x1d/0x1c0 [ 137.675484][ T8935] __x64_sys_memfd_create+0x5b/0x70 [ 137.680683][ T8935] do_syscall_64+0xf7/0x1c0 [ 137.685439][ T8935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 137.691317][ T8935] RIP: 0033:0x459a59 [ 137.695202][ T8935] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:44:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) [ 137.714793][ T8935] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 137.723189][ T8935] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a59 [ 137.731144][ T8935] RDX: 00000000200003c8 RSI: 0000000000000000 RDI: 00000000004be9af [ 137.739105][ T8935] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 137.747060][ T8935] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fca6654b6d4 [ 137.755543][ T8935] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:34 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:34 executing program 5: syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) 20:44:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:34 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:34 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) 20:44:34 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x305383, 0x0) r6 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) [ 137.997519][ T8955] FAULT_INJECTION: forcing a failure. [ 137.997519][ T8955] name failslab, interval 1, probability 0, space 0, times 0 [ 138.020952][ T8956] XFS (loop5): unknown mount option [nobarrier]. [ 138.035482][ T8959] XFS (loop2): unknown mount option [nobarrier]. [ 138.044938][ T8955] CPU: 0 PID: 8955 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 138.052837][ T8955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.052842][ T8955] Call Trace: [ 138.052858][ T8955] dump_stack+0x1d8/0x2f8 [ 138.052873][ T8955] should_fail+0x555/0x770 [ 138.052895][ T8955] __should_failslab+0x11a/0x160 [ 138.052907][ T8955] ? __d_alloc+0x2d/0x6e0 [ 138.052918][ T8955] should_failslab+0x9/0x20 [ 138.052929][ T8955] kmem_cache_alloc+0x56/0x2e0 [ 138.052942][ T8955] __d_alloc+0x2d/0x6e0 [ 138.052952][ T8955] ? lockdep_init_map+0x2a/0x680 [ 138.052964][ T8955] d_alloc_pseudo+0x1d/0x70 [ 138.052974][ T8955] alloc_file_pseudo+0xc3/0x260 [ 138.052992][ T8955] __shmem_file_setup+0x1a2/0x280 [ 138.053005][ T8955] shmem_file_setup+0x2f/0x40 [ 138.053015][ T8955] __se_sys_memfd_create+0x28e/0x4b0 [ 138.053028][ T8955] ? do_syscall_64+0x1d/0x1c0 [ 138.132358][ T8955] __x64_sys_memfd_create+0x5b/0x70 [ 138.138875][ T8955] do_syscall_64+0xf7/0x1c0 [ 138.143552][ T8955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 138.150399][ T8955] RIP: 0033:0x459a59 [ 138.154894][ T8955] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 138.174587][ T8955] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 138.183000][ T8955] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a59 [ 138.190959][ T8955] RDX: 00000000200003c8 RSI: 0000000000000000 RDI: 00000000004be9af [ 138.199102][ T8955] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 138.208116][ T8955] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fca6654b6d4 [ 138.216259][ T8955] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:34 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:34 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) 20:44:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:34 executing program 5: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) [ 138.366529][ T8974] XFS (loop5): unknown mount option [nobarrier]. [ 138.402582][ T8977] FAULT_INJECTION: forcing a failure. [ 138.402582][ T8977] name failslab, interval 1, probability 0, space 0, times 0 [ 138.448098][ T8977] CPU: 0 PID: 8977 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 138.455939][ T8977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.466088][ T8977] Call Trace: [ 138.466108][ T8977] dump_stack+0x1d8/0x2f8 [ 138.466124][ T8977] should_fail+0x555/0x770 [ 138.466142][ T8977] __should_failslab+0x11a/0x160 [ 138.466154][ T8977] ? __alloc_file+0x2c/0x390 [ 138.466164][ T8977] should_failslab+0x9/0x20 [ 138.466179][ T8977] kmem_cache_alloc+0x56/0x2e0 [ 138.473982][ T8977] __alloc_file+0x2c/0x390 [ 138.473997][ T8977] alloc_empty_file+0xac/0x1b0 [ 138.474009][ T8977] alloc_file+0x60/0x4c0 [ 138.474024][ T8977] alloc_file_pseudo+0x1d4/0x260 [ 138.474044][ T8977] __shmem_file_setup+0x1a2/0x280 [ 138.474056][ T8977] shmem_file_setup+0x2f/0x40 [ 138.510809][ T8977] __se_sys_memfd_create+0x28e/0x4b0 [ 138.520718][ T8977] ? do_syscall_64+0x1d/0x1c0 [ 138.520729][ T8977] __x64_sys_memfd_create+0x5b/0x70 [ 138.520739][ T8977] do_syscall_64+0xf7/0x1c0 20:44:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) [ 138.520754][ T8977] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 138.520763][ T8977] RIP: 0033:0x459a59 [ 138.520772][ T8977] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 138.520777][ T8977] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 138.583964][ T8977] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a59 [ 138.591964][ T8977] RDX: 00000000200003c8 RSI: 0000000000000000 RDI: 00000000004be9af [ 138.599941][ T8977] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 138.608033][ T8977] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fca6654b6d4 [ 138.617110][ T8977] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:35 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:35 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:35 executing program 5: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) 20:44:35 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000b40)={r5, @in6={{0xa, 0x2, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000000}}, 0x7fff, 0x20}, 0x90) r6 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:35 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) accept$alg(r0, 0x0, 0x0) [ 139.046220][ T8999] FAULT_INJECTION: forcing a failure. [ 139.046220][ T8999] name failslab, interval 1, probability 0, space 0, times 0 [ 139.066612][ T8999] CPU: 1 PID: 8999 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 139.074628][ T8999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.074634][ T8999] Call Trace: [ 139.074653][ T8999] dump_stack+0x1d8/0x2f8 [ 139.074668][ T8999] should_fail+0x555/0x770 [ 139.074687][ T8999] __should_failslab+0x11a/0x160 [ 139.074700][ T8999] ? security_file_alloc+0x36/0x200 [ 139.074715][ T8999] should_failslab+0x9/0x20 [ 139.088248][ T8999] kmem_cache_alloc+0x56/0x2e0 [ 139.103636][ T8999] security_file_alloc+0x36/0x200 [ 139.103651][ T8999] __alloc_file+0xde/0x390 [ 139.103665][ T8999] alloc_empty_file+0xac/0x1b0 [ 139.103676][ T8999] alloc_file+0x60/0x4c0 [ 139.103690][ T8999] alloc_file_pseudo+0x1d4/0x260 [ 139.103710][ T8999] __shmem_file_setup+0x1a2/0x280 [ 139.127064][ T8999] shmem_file_setup+0x2f/0x40 [ 139.155453][ T8999] __se_sys_memfd_create+0x28e/0x4b0 [ 139.160785][ T8999] ? do_syscall_64+0x1d/0x1c0 [ 139.165553][ T8999] __x64_sys_memfd_create+0x5b/0x70 [ 139.170848][ T8999] do_syscall_64+0xf7/0x1c0 [ 139.181431][ T8999] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 139.207134][ T8999] RIP: 0033:0x459a59 [ 139.211029][ T8999] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 139.231145][ T8999] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 139.240180][ T8999] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a59 20:44:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) [ 139.248238][ T8999] RDX: 00000000200003c8 RSI: 0000000000000000 RDI: 00000000004be9af [ 139.257138][ T8999] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 139.265288][ T8999] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fca6654b6d4 [ 139.273257][ T8999] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:35 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) accept$alg(r0, 0x0, 0x0) 20:44:35 executing program 0 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:35 executing program 5: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) [ 139.340612][ T9016] XFS (loop2): unknown mount option [nobarrier]. 20:44:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, 0x0, 0x0) [ 139.477475][ T9026] FAULT_INJECTION: forcing a failure. [ 139.477475][ T9026] name failslab, interval 1, probability 0, space 0, times 0 [ 139.537830][ T9026] CPU: 0 PID: 9026 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 139.545861][ T9026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.556011][ T9026] Call Trace: [ 139.559313][ T9026] dump_stack+0x1d8/0x2f8 [ 139.563640][ T9026] should_fail+0x555/0x770 [ 139.568052][ T9026] __should_failslab+0x11a/0x160 [ 139.572989][ T9026] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 139.578715][ T9026] should_failslab+0x9/0x20 [ 139.583214][ T9026] __kmalloc+0x7a/0x340 [ 139.587383][ T9026] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 139.593104][ T9026] tomoyo_realpath_from_path+0xdc/0x7c0 [ 139.598696][ T9026] tomoyo_path_perm+0x192/0x850 [ 139.603562][ T9026] tomoyo_path_truncate+0x1c/0x20 [ 139.608584][ T9026] security_path_truncate+0xd5/0x150 [ 139.614033][ T9026] do_sys_ftruncate+0x493/0x710 [ 139.618882][ T9026] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 139.625403][ T9026] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 139.631111][ T9026] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 139.636818][ T9026] ? do_syscall_64+0x1d/0x1c0 [ 139.641488][ T9026] __x64_sys_ftruncate+0x60/0x70 [ 139.646420][ T9026] do_syscall_64+0xf7/0x1c0 [ 139.650913][ T9026] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 139.656792][ T9026] RIP: 0033:0x459a27 [ 139.661199][ T9026] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:44:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, 0x0, 0x0) [ 139.681486][ T9026] RSP: 002b:00007fca6654aa88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 139.690146][ T9026] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a27 [ 139.698624][ T9026] RDX: 00000000200003c8 RSI: 0000000008100000 RDI: 0000000000000004 [ 139.706669][ T9026] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 139.715416][ T9026] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 139.723378][ T9026] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 [ 139.752626][ T9026] ERROR: Out of memory at tomoyo_realpath_from_path. [ 139.838853][ T9026] BTRFS: device fsid fff69206-0000-0000-b81e-1b00920efd9a devid 0 transid 135266304 /dev/loop0 20:44:36 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, 0x0, 0x0) 20:44:36 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', 0x0, 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) 20:44:36 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) creat(&(0x7f0000000a40)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={0x0, 0x5b, "b6c6fcfa29b162f41fd54ee04adcec1a92dad9f36300d6f8a928dcfaa400ba6f49201e5958fd19589f639156d45f6f941e2f830241d5b7fb196e0463320cad04505037bf6ff4ca72ccb6803cd39e426c5625e4d9c9ba8c27fcf6ea"}, &(0x7f0000000b00)=0x63) r4 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:36 executing program 0 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:36 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) accept$alg(r0, 0x0, 0x0) [ 140.011080][ T9058] FAULT_INJECTION: forcing a failure. [ 140.011080][ T9058] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 140.024310][ T9058] CPU: 1 PID: 9058 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 140.032198][ T9058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.042341][ T9058] Call Trace: [ 140.045630][ T9058] dump_stack+0x1d8/0x2f8 [ 140.050219][ T9058] should_fail+0x555/0x770 [ 140.054721][ T9058] should_fail_alloc_page+0x55/0x60 [ 140.059930][ T9058] prepare_alloc_pages+0x283/0x460 [ 140.065042][ T9058] __alloc_pages_nodemask+0xb2/0x5d0 [ 140.070592][ T9058] kmem_getpages+0x4d/0xa00 [ 140.075088][ T9058] cache_grow_begin+0x7e/0x2c0 [ 140.080035][ T9058] cache_alloc_refill+0x311/0x3f0 [ 140.085052][ T9058] ? check_preemption_disabled+0xb7/0x2a0 [ 140.090802][ T9058] __kmalloc+0x318/0x340 [ 140.095042][ T9058] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 140.100844][ T9058] tomoyo_realpath_from_path+0xdc/0x7c0 [ 140.106745][ T9058] tomoyo_path_perm+0x192/0x850 [ 140.111626][ T9058] tomoyo_path_truncate+0x1c/0x20 [ 140.116730][ T9058] security_path_truncate+0xd5/0x150 [ 140.122280][ T9058] do_sys_ftruncate+0x493/0x710 [ 140.127421][ T9058] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 140.133136][ T9058] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 140.138614][ T9058] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 140.144323][ T9058] ? do_syscall_64+0x1d/0x1c0 [ 140.148993][ T9058] __x64_sys_ftruncate+0x60/0x70 [ 140.155574][ T9058] do_syscall_64+0xf7/0x1c0 [ 140.160428][ T9058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 140.167263][ T9058] RIP: 0033:0x459a27 [ 140.171596][ T9058] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 140.192143][ T9058] RSP: 002b:00007fca6654aa88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 140.201184][ T9058] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a27 20:44:36 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 140.209276][ T9058] RDX: 00000000200003c8 RSI: 0000000008100000 RDI: 0000000000000004 [ 140.218195][ T9058] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 140.226761][ T9058] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 140.236236][ T9058] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) [ 140.324341][ T9062] XFS (loop2): unknown mount option [nobarrier]. 20:44:36 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', 0x0, 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) 20:44:36 executing program 0 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 20:44:36 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', 0x0, 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) [ 140.638093][ T9094] FAULT_INJECTION: forcing a failure. [ 140.638093][ T9094] name failslab, interval 1, probability 0, space 0, times 0 [ 140.655397][ T9094] CPU: 1 PID: 9094 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 140.663251][ T9094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.673317][ T9094] Call Trace: [ 140.676602][ T9094] dump_stack+0x1d8/0x2f8 [ 140.680937][ T9094] should_fail+0x555/0x770 [ 140.685440][ T9094] __should_failslab+0x11a/0x160 [ 140.690377][ T9094] ? tomoyo_encode2+0x273/0x5a0 [ 140.695220][ T9094] should_failslab+0x9/0x20 [ 140.699706][ T9094] __kmalloc+0x7a/0x340 [ 140.704781][ T9094] tomoyo_encode2+0x273/0x5a0 [ 140.709460][ T9094] ? dynamic_dname+0xf0/0xf0 [ 140.714385][ T9094] tomoyo_realpath_from_path+0x769/0x7c0 [ 140.720103][ T9094] tomoyo_path_perm+0x192/0x850 [ 140.725133][ T9094] tomoyo_path_truncate+0x1c/0x20 [ 140.730145][ T9094] security_path_truncate+0xd5/0x150 [ 140.735444][ T9094] do_sys_ftruncate+0x493/0x710 [ 140.740398][ T9094] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 140.746117][ T9094] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 140.751558][ T9094] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 140.757269][ T9094] ? do_syscall_64+0x1d/0x1c0 [ 140.763664][ T9094] __x64_sys_ftruncate+0x60/0x70 [ 140.768697][ T9094] do_syscall_64+0xf7/0x1c0 [ 140.773304][ T9094] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 140.779307][ T9094] RIP: 0033:0x459a27 [ 140.783183][ T9094] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 140.802962][ T9094] RSP: 002b:00007fca6654aa88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 140.811573][ T9094] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a27 [ 140.819628][ T9094] RDX: 00000000200003c8 RSI: 0000000008100000 RDI: 0000000000000004 [ 140.827764][ T9094] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 140.836089][ T9094] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 140.844047][ T9094] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 [ 140.852909][ T9094] ERROR: Out of memory at tomoyo_realpath_from_path. 20:44:37 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 20:44:37 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) creat(&(0x7f0000000a40)='./file0\x00', 0x82) r4 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:37 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) 20:44:37 executing program 0 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)}, 0x0) [ 141.102794][ T9111] FAULT_INJECTION: forcing a failure. [ 141.102794][ T9111] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 141.130570][ T9111] CPU: 0 PID: 9111 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 141.138400][ T9111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.148452][ T9111] Call Trace: [ 141.148483][ T9111] dump_stack+0x1d8/0x2f8 [ 141.148499][ T9111] should_fail+0x555/0x770 [ 141.148518][ T9111] should_fail_alloc_page+0x55/0x60 [ 141.148531][ T9111] prepare_alloc_pages+0x283/0x460 [ 141.158878][ T9112] XFS (loop5): unknown mount option [nobarrier]. [ 141.160548][ T9111] __alloc_pages_nodemask+0xb2/0x5d0 [ 141.160573][ T9111] alloc_pages_vma+0x4f7/0xd50 [ 141.160592][ T9111] shmem_alloc_and_acct_page+0x42c/0xbc0 [ 141.171353][ T9111] shmem_getpage_gfp+0x128b/0x2c20 [ 141.171381][ T9111] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 141.205230][ T9111] shmem_write_begin+0xcb/0x1b0 [ 141.210584][ T9111] generic_perform_write+0x25d/0x4e0 [ 141.216071][ T9111] __generic_file_write_iter+0x24b/0x520 [ 141.222138][ T9111] generic_file_write_iter+0x48e/0x630 [ 141.227886][ T9111] __vfs_write+0x5a1/0x740 [ 141.232295][ T9111] vfs_write+0x275/0x590 [ 141.236611][ T9111] __x64_sys_pwrite64+0x162/0x1d0 [ 141.241632][ T9111] do_syscall_64+0xf7/0x1c0 [ 141.246116][ T9111] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 141.252522][ T9111] RIP: 0033:0x4139a7 [ 141.256428][ T9111] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 141.281071][ T9111] RSP: 002b:00007fca6654aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 141.290170][ T9111] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 00000000004139a7 20:44:37 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 141.298134][ T9111] RDX: 00000000000000be RSI: 0000000020000240 RDI: 0000000000000004 [ 141.306199][ T9111] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 141.314160][ T9111] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 141.322553][ T9111] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)}, 0x0) [ 141.390748][ T9117] XFS (loop2): unknown mount option [nobarrier]. 20:44:37 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) 20:44:37 executing program 0 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 141.544451][ T9136] XFS (loop5): unknown mount option [nobarrier]. [ 141.556843][ T9141] FAULT_INJECTION: forcing a failure. [ 141.556843][ T9141] name failslab, interval 1, probability 0, space 0, times 0 [ 141.570285][ T9141] CPU: 0 PID: 9141 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 141.578172][ T9141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.588747][ T9141] Call Trace: [ 141.592034][ T9141] dump_stack+0x1d8/0x2f8 [ 141.596363][ T9141] should_fail+0x555/0x770 [ 141.602098][ T9141] __should_failslab+0x11a/0x160 [ 141.607031][ T9141] ? xas_create+0x1197/0x1910 [ 141.612138][ T9141] should_failslab+0x9/0x20 [ 141.618283][ T9141] kmem_cache_alloc+0x56/0x2e0 [ 141.623754][ T9141] xas_create+0x1197/0x1910 [ 141.628444][ T9141] xas_create_range+0x142/0x700 [ 141.633645][ T9141] shmem_add_to_page_cache+0x91e/0x1290 [ 141.639206][ T9141] shmem_getpage_gfp+0x184e/0x2c20 [ 141.644338][ T9141] shmem_write_begin+0xcb/0x1b0 [ 141.649179][ T9141] generic_perform_write+0x25d/0x4e0 [ 141.654464][ T9141] __generic_file_write_iter+0x24b/0x520 [ 141.660106][ T9141] generic_file_write_iter+0x48e/0x630 [ 141.665577][ T9141] __vfs_write+0x5a1/0x740 [ 141.670007][ T9141] vfs_write+0x275/0x590 [ 141.674259][ T9141] __x64_sys_pwrite64+0x162/0x1d0 [ 141.679536][ T9141] do_syscall_64+0xf7/0x1c0 [ 141.684904][ T9141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 141.690790][ T9141] RIP: 0033:0x4139a7 [ 141.694759][ T9141] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 141.715502][ T9141] RSP: 002b:00007fca6654aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 141.724867][ T9141] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 00000000004139a7 [ 141.732832][ T9141] RDX: 00000000000000be RSI: 0000000020000240 RDI: 0000000000000004 20:44:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)}, 0x0) [ 141.741313][ T9141] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 141.749274][ T9141] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 141.757234][ T9141] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:37 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:38 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3], 0x2}}, 0x0) 20:44:38 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:44:38 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:38 executing program 0 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:38 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 142.208096][ T9171] FAULT_INJECTION: forcing a failure. [ 142.208096][ T9171] name failslab, interval 1, probability 0, space 0, times 0 [ 142.239043][ T9171] CPU: 0 PID: 9171 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 142.247151][ T9171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.257219][ T9171] Call Trace: [ 142.257239][ T9171] dump_stack+0x1d8/0x2f8 [ 142.257252][ T9171] should_fail+0x555/0x770 [ 142.257266][ T9171] __should_failslab+0x11a/0x160 [ 142.257276][ T9171] ? __alloc_file+0x2c/0x390 [ 142.257287][ T9171] should_failslab+0x9/0x20 [ 142.257297][ T9171] kmem_cache_alloc+0x56/0x2e0 [ 142.257307][ T9171] __alloc_file+0x2c/0x390 [ 142.257319][ T9171] alloc_empty_file+0xac/0x1b0 [ 142.257330][ T9171] path_openat+0x9e/0x4420 [ 142.257340][ T9171] ? __kasan_kmalloc+0x178/0x1b0 [ 142.257379][ T9171] ? __lock_acquire+0xc75/0x1be0 [ 142.257399][ T9171] ? __kasan_check_write+0x14/0x20 [ 142.317438][ T9171] do_filp_open+0x192/0x3d0 [ 142.321940][ T9171] ? _raw_spin_unlock+0x2c/0x50 [ 142.326795][ T9171] do_sys_open+0x29f/0x560 [ 142.331206][ T9171] __x64_sys_open+0x87/0x90 [ 142.336484][ T9171] do_syscall_64+0xf7/0x1c0 [ 142.340977][ T9171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 142.347040][ T9171] RIP: 0033:0x413941 [ 142.350924][ T9171] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 142.370516][ T9171] RSP: 002b:00007fca6654aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 142.379002][ T9171] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000413941 [ 142.387050][ T9171] RDX: 00007fca6654ab0a RSI: 0000000000000002 RDI: 00007fca6654ab00 [ 142.395275][ T9171] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a 20:44:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3], 0x2}}, 0x0) [ 142.403236][ T9171] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 142.411197][ T9171] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 [ 142.428523][ T9180] XFS (loop2): unknown mount option [nobarrier]. [ 142.448992][ T9169] XFS (loop5): Invalid superblock magic number 20:44:38 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:38 executing program 0 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3], 0x2}}, 0x0) 20:44:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB], 0x3}}, 0x0) [ 142.605766][ T9200] FAULT_INJECTION: forcing a failure. [ 142.605766][ T9200] name failslab, interval 1, probability 0, space 0, times 0 [ 142.637482][ T9200] CPU: 1 PID: 9200 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 142.645404][ T9200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 20:44:38 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB], 0x3}}, 0x0) [ 142.655487][ T9200] Call Trace: [ 142.658787][ T9200] dump_stack+0x1d8/0x2f8 [ 142.663239][ T9200] should_fail+0x555/0x770 [ 142.667668][ T9200] __should_failslab+0x11a/0x160 [ 142.674085][ T9200] ? security_file_alloc+0x36/0x200 [ 142.679292][ T9200] should_failslab+0x9/0x20 [ 142.683802][ T9200] kmem_cache_alloc+0x56/0x2e0 [ 142.688580][ T9200] security_file_alloc+0x36/0x200 [ 142.693716][ T9200] __alloc_file+0xde/0x390 [ 142.698133][ T9200] alloc_empty_file+0xac/0x1b0 20:44:38 executing program 4: bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) r0 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) [ 142.704976][ T9200] path_openat+0x9e/0x4420 [ 142.709382][ T9200] ? __kasan_kmalloc+0x178/0x1b0 [ 142.709396][ T9200] ? __lock_acquire+0xc75/0x1be0 [ 142.709416][ T9200] ? __kasan_check_write+0x14/0x20 [ 142.709440][ T9200] do_filp_open+0x192/0x3d0 [ 142.709456][ T9200] ? _raw_spin_unlock+0x2c/0x50 [ 142.709479][ T9200] do_sys_open+0x29f/0x560 [ 142.738736][ T9200] __x64_sys_open+0x87/0x90 [ 142.743280][ T9200] do_syscall_64+0xf7/0x1c0 [ 142.749322][ T9200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 142.755649][ T9200] RIP: 0033:0x413941 [ 142.759687][ T9200] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 142.779480][ T9200] RSP: 002b:00007fca6654aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 142.779490][ T9200] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000413941 [ 142.779495][ T9200] RDX: 00007fca6654ab0a RSI: 0000000000000002 RDI: 00007fca6654ab00 [ 142.779500][ T9200] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 142.779504][ T9200] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 142.779509][ T9200] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:39 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:44:39 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000a00)={'caif0\x00', &(0x7f0000000940)=@ethtool_flash={0x33, 0x3f, "b05fea9f0fab1b74a33b0c0df8aa869c682dcd8eb43234658af23477d272a82f5ad010dc6fc6743c28d0862a1dcc21f16bf3a81a161337428d1ce439d8981d8ac7a5811d0ec2b4ce73004f7e922505fb7a4cc9df8d849d6e95fe4e3f5a904b63a56842066b1cfd04f5811f55ff92f1647b6c4d52c66fc9c171f05f370fddfcbe"}}) r4 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB], 0x3}}, 0x0) 20:44:39 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:39 executing program 0 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:39 executing program 4: bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) r0 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) 20:44:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="000000000400"], 0x3}}, 0x0) [ 142.987701][ T9226] XFS (loop2): unknown mount option [nobarrier]. [ 143.023729][ T9220] XFS (loop5): Invalid superblock magic number 20:44:39 executing program 4: bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) r0 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) [ 143.052309][ T9237] FAULT_INJECTION: forcing a failure. [ 143.052309][ T9237] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 143.066230][ T9237] CPU: 1 PID: 9237 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 143.074036][ T9237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.084096][ T9237] Call Trace: [ 143.087396][ T9237] dump_stack+0x1d8/0x2f8 [ 143.091734][ T9237] should_fail+0x555/0x770 [ 143.096708][ T9237] should_fail_alloc_page+0x55/0x60 [ 143.096720][ T9237] prepare_alloc_pages+0x283/0x460 [ 143.096735][ T9237] __alloc_pages_nodemask+0xb2/0x5d0 [ 143.096749][ T9237] ? __kasan_check_write+0x14/0x20 [ 143.096764][ T9237] kmem_getpages+0x4d/0xa00 [ 143.096776][ T9237] cache_grow_begin+0x7e/0x2c0 [ 143.096790][ T9237] cache_alloc_refill+0x311/0x3f0 [ 143.127598][ T9237] ? check_preemption_disabled+0xb7/0x2a0 [ 143.127616][ T9237] kmem_cache_alloc+0x2b9/0x2e0 [ 143.127625][ T9237] ? getname_flags+0xba/0x640 [ 143.127637][ T9237] getname_flags+0xba/0x640 20:44:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="000000000400"], 0x3}}, 0x0) [ 143.127651][ T9237] getname+0x19/0x20 [ 143.127662][ T9237] do_sys_open+0x261/0x560 [ 143.127682][ T9237] __x64_sys_open+0x87/0x90 [ 143.166903][ T9237] do_syscall_64+0xf7/0x1c0 [ 143.171800][ T9237] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 143.177686][ T9237] RIP: 0033:0x413941 [ 143.177696][ T9237] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 20:44:39 executing program 4: r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 143.177702][ T9237] RSP: 002b:00007fca6654aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 143.177712][ T9237] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000413941 [ 143.177718][ T9237] RDX: 00007fca6654ab0a RSI: 0000000000000002 RDI: 00007fca6654ab00 [ 143.177724][ T9237] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 143.177730][ T9237] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 143.177736][ T9237] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="000000000400"], 0x3}}, 0x0) 20:44:39 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:39 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:44:39 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) r4 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:39 executing program 4: r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:39 executing program 0 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000"], 0x3}}, 0x0) 20:44:39 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:39 executing program 4: r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 143.642119][ T9285] FAULT_INJECTION: forcing a failure. [ 143.642119][ T9285] name failslab, interval 1, probability 0, space 0, times 0 [ 143.655509][ T9269] XFS (loop5): Invalid superblock magic number [ 143.698866][ T9285] CPU: 1 PID: 9285 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 143.706704][ T9285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.716763][ T9285] Call Trace: [ 143.720063][ T9285] dump_stack+0x1d8/0x2f8 [ 143.724392][ T9285] should_fail+0x555/0x770 [ 143.728806][ T9285] __should_failslab+0x11a/0x160 [ 143.733736][ T9285] ? security_file_alloc+0x36/0x200 [ 143.738944][ T9285] should_failslab+0x9/0x20 [ 143.743444][ T9285] kmem_cache_alloc+0x56/0x2e0 [ 143.749252][ T9285] security_file_alloc+0x36/0x200 [ 143.754268][ T9285] __alloc_file+0xde/0x390 [ 143.758857][ T9285] alloc_empty_file+0xac/0x1b0 [ 143.763707][ T9285] path_openat+0x9e/0x4420 [ 143.768111][ T9285] ? __kasan_kmalloc+0x178/0x1b0 [ 143.773039][ T9285] ? __lock_acquire+0xc75/0x1be0 [ 143.777965][ T9285] ? rcu_read_lock_sched_held+0x10b/0x170 [ 143.784227][ T9285] do_filp_open+0x192/0x3d0 [ 143.788727][ T9285] ? _raw_spin_unlock+0x2c/0x50 [ 143.793753][ T9285] do_sys_open+0x29f/0x560 [ 143.798173][ T9285] __x64_sys_open+0x87/0x90 [ 143.802670][ T9285] do_syscall_64+0xf7/0x1c0 [ 143.807164][ T9285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 143.813058][ T9285] RIP: 0033:0x413941 [ 143.816941][ T9285] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 143.837592][ T9285] RSP: 002b:00007fca6654aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 20:44:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000"], 0x3}}, 0x0) [ 143.846172][ T9285] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000413941 [ 143.854129][ T9285] RDX: 00007fca6654ab0a RSI: 0000000000000002 RDI: 00007fca6654ab00 [ 143.862846][ T9285] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 143.872643][ T9285] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 143.880620][ T9285] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:40 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 143.939876][ T9289] XFS (loop2): unknown mount option [nobarrier]. 20:44:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e0000"], 0x3}}, 0x0) 20:44:40 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:40 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000900)={{0x2, @addr=0x2}, 0x8, 0x3f, 0x8}) r4 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:40 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) 20:44:40 executing program 0 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:40 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 144.161320][ T9314] XFS (loop2): unknown mount option [nobarrier]. [ 144.193723][ T9317] FAULT_INJECTION: forcing a failure. [ 144.193723][ T9317] name failslab, interval 1, probability 0, space 0, times 0 20:44:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e00000000"], 0x3}}, 0x0) 20:44:40 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:40 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 144.269987][ T9317] CPU: 1 PID: 9317 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 144.277926][ T9317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.288227][ T9317] Call Trace: [ 144.291538][ T9317] dump_stack+0x1d8/0x2f8 [ 144.295891][ T9317] should_fail+0x555/0x770 [ 144.300339][ T9317] __should_failslab+0x11a/0x160 [ 144.305372][ T9317] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 144.311224][ T9317] should_failslab+0x9/0x20 [ 144.315871][ T9317] __kmalloc+0x7a/0x340 20:44:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e00000000"], 0x3}}, 0x0) [ 144.320028][ T9317] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 144.320047][ T9317] tomoyo_realpath_from_path+0xdc/0x7c0 [ 144.320072][ T9317] tomoyo_check_open_permission+0x1ce/0x9d0 [ 144.320105][ T9317] tomoyo_file_open+0x141/0x190 [ 144.320120][ T9317] security_file_open+0x65/0x2f0 [ 144.320133][ T9317] do_dentry_open+0x345/0xf80 [ 144.320152][ T9317] vfs_open+0x73/0x80 [ 144.320162][ T9317] path_openat+0x1397/0x4420 [ 144.320208][ T9317] do_filp_open+0x192/0x3d0 [ 144.331621][ T9317] do_sys_open+0x29f/0x560 [ 144.331639][ T9317] __x64_sys_open+0x87/0x90 [ 144.331653][ T9317] do_syscall_64+0xf7/0x1c0 [ 144.331668][ T9317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 144.331677][ T9317] RIP: 0033:0x413941 [ 144.331686][ T9317] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 144.331692][ T9317] RSP: 002b:00007fca6654aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 144.331701][ T9317] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000413941 [ 144.331707][ T9317] RDX: 00007fca6654ab0a RSI: 0000000000000002 RDI: 00007fca6654ab00 [ 144.331712][ T9317] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 144.331717][ T9317] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 144.331722][ T9317] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 [ 144.351347][ T9317] ERROR: Out of memory at tomoyo_realpath_from_path. [ 144.509681][ T9325] XFS (loop5): unknown mount option [subj_type=]. 20:44:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32=r3, @ANYBLOB="0000000004000e00000000"], 0x3}}, 0x0) 20:44:40 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) 20:44:40 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:40 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, 0x0, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:40 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:40 executing program 0 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:40 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYBLOB="0000000004000e0000000000"], 0x2}}, 0x0) [ 144.793549][ T9357] XFS (loop5): unknown mount option [subj_type=]. 20:44:40 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, 0x0, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:40 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 144.836131][ T9363] FAULT_INJECTION: forcing a failure. [ 144.836131][ T9363] name failslab, interval 1, probability 0, space 0, times 0 20:44:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYBLOB="0000000004000e0000000000"], 0x2}}, 0x0) [ 144.898952][ T9363] CPU: 1 PID: 9363 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 144.907022][ T9363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.917210][ T9363] Call Trace: [ 144.920512][ T9363] dump_stack+0x1d8/0x2f8 [ 144.924850][ T9363] should_fail+0x555/0x770 [ 144.929527][ T9363] __should_failslab+0x11a/0x160 [ 144.934469][ T9363] ? tomoyo_encode2+0x273/0x5a0 [ 144.939527][ T9363] should_failslab+0x9/0x20 [ 144.944204][ T9363] __kmalloc+0x7a/0x340 [ 144.948356][ T9363] tomoyo_encode2+0x273/0x5a0 [ 144.953186][ T9363] tomoyo_realpath_from_path+0x769/0x7c0 [ 144.958827][ T9363] tomoyo_path_number_perm+0x166/0x640 [ 144.964315][ T9363] ? smack_file_ioctl+0x226/0x2e0 [ 144.969638][ T9363] ? __fget+0x4a1/0x510 [ 144.973781][ T9363] tomoyo_file_ioctl+0x23/0x30 [ 144.981385][ T9363] security_file_ioctl+0x6d/0xd0 [ 144.986341][ T9363] __x64_sys_ioctl+0xa3/0x120 [ 144.991296][ T9363] do_syscall_64+0xf7/0x1c0 [ 144.995922][ T9363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 145.002044][ T9363] RIP: 0033:0x4598c7 [ 145.006318][ T9363] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 145.026268][ T9363] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 145.035484][ T9363] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 00000000004598c7 [ 145.043823][ T9363] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 145.052494][ T9363] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 145.060750][ T9363] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 145.069118][ T9363] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 [ 145.078042][ T9363] ERROR: Out of memory at tomoyo_realpath_from_path. 20:44:41 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) 20:44:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYBLOB="0000000004000e0000000000"], 0x2}}, 0x0) 20:44:41 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, 0x0, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 145.162753][ T9372] XFS (loop2): unknown mount option [nobarrier]. [ 145.226798][ T9391] XFS (loop5): unknown mount option [subj_type=]. 20:44:41 executing program 0 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:41 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) openat$vim2m(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/video35\x00', 0x2, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:41 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:41 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) [ 145.425315][ T9407] FAULT_INJECTION: forcing a failure. [ 145.425315][ T9407] name failslab, interval 1, probability 0, space 0, times 0 [ 145.462332][ T9411] XFS (loop2): unknown mount option [nobarrier]. 20:44:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) [ 145.479057][ T9407] CPU: 1 PID: 9407 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 145.486903][ T9407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.497277][ T9407] Call Trace: [ 145.500586][ T9407] dump_stack+0x1d8/0x2f8 [ 145.504930][ T9407] should_fail+0x555/0x770 [ 145.509511][ T9407] __should_failslab+0x11a/0x160 [ 145.514635][ T9407] ? tomoyo_encode2+0x273/0x5a0 [ 145.519482][ T9407] should_failslab+0x9/0x20 [ 145.524089][ T9407] __kmalloc+0x7a/0x340 [ 145.528360][ T9407] tomoyo_encode2+0x273/0x5a0 [ 145.533058][ T9407] tomoyo_realpath_from_path+0x769/0x7c0 [ 145.538708][ T9407] tomoyo_check_open_permission+0x1ce/0x9d0 [ 145.544638][ T9407] tomoyo_file_open+0x141/0x190 [ 145.549495][ T9407] security_file_open+0x65/0x2f0 [ 145.554619][ T9407] do_dentry_open+0x345/0xf80 [ 145.559640][ T9407] vfs_open+0x73/0x80 [ 145.563636][ T9407] path_openat+0x1397/0x4420 [ 145.568270][ T9407] do_filp_open+0x192/0x3d0 [ 145.573118][ T9407] do_sys_open+0x29f/0x560 [ 145.577870][ T9407] __x64_sys_open+0x87/0x90 [ 145.582382][ T9407] do_syscall_64+0xf7/0x1c0 [ 145.586886][ T9407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 145.592913][ T9407] RIP: 0033:0x413941 [ 145.596796][ T9407] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 145.616805][ T9407] RSP: 002b:00007fca6654aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 20:44:41 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 145.625330][ T9407] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000413941 [ 145.633311][ T9407] RDX: 00007fca6654ab0a RSI: 0000000000000002 RDI: 00007fca6654ab00 [ 145.641360][ T9407] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 145.649333][ T9407] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 145.657306][ T9407] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 [ 145.671234][ T9407] ERROR: Out of memory at tomoyo_realpath_from_path. [ 145.735995][ T9415] XFS (loop5): unknown mount option [subj_type=]. 20:44:42 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:42 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/20, @ANYRES32, @ANYBLOB="0000000004000e0000000000"], 0x24}}, 0x0) 20:44:42 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@discard='discard'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) 20:44:42 executing program 0 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x2}}, 0x0) 20:44:42 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 145.977903][ T9438] XFS (loop5): unknown mount option [subj_type=]. [ 146.029764][ T9436] FAULT_INJECTION: forcing a failure. [ 146.029764][ T9436] name failslab, interval 1, probability 0, space 0, times 0 [ 146.049311][ T9436] CPU: 0 PID: 9436 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 146.057304][ T9436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.067532][ T9436] Call Trace: [ 146.070930][ T9436] dump_stack+0x1d8/0x2f8 [ 146.075402][ T9436] should_fail+0x555/0x770 [ 146.080276][ T9436] __should_failslab+0x11a/0x160 [ 146.085245][ T9436] ? tomoyo_encode2+0x273/0x5a0 [ 146.090234][ T9436] should_failslab+0x9/0x20 [ 146.094756][ T9436] __kmalloc+0x7a/0x340 [ 146.098916][ T9436] tomoyo_encode2+0x273/0x5a0 [ 146.103617][ T9436] tomoyo_realpath_from_path+0x769/0x7c0 [ 146.109251][ T9436] tomoyo_path_number_perm+0x166/0x640 [ 146.114727][ T9436] ? smack_file_ioctl+0x226/0x2e0 [ 146.119859][ T9436] ? __fget+0x4a1/0x510 [ 146.124008][ T9436] tomoyo_file_ioctl+0x23/0x30 [ 146.129157][ T9436] security_file_ioctl+0x6d/0xd0 [ 146.134118][ T9436] __x64_sys_ioctl+0xa3/0x120 [ 146.138902][ T9436] do_syscall_64+0xf7/0x1c0 [ 146.143542][ T9436] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 146.149425][ T9436] RIP: 0033:0x4598c7 [ 146.153309][ T9436] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 146.173045][ T9436] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 146.181595][ T9436] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 00000000004598c7 [ 146.189570][ T9436] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 146.197570][ T9436] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 146.205536][ T9436] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 146.213494][ T9436] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:42 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1ff) r3 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:42 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[{@discard='discard'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) 20:44:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x2}}, 0x0) [ 146.347127][ T9455] XFS (loop5): unknown mount option [subj_type=]. 20:44:42 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x2}}, 0x0) 20:44:42 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[{@discard='discard'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) [ 146.460931][ T9467] XFS (loop2): unknown mount option [nobarrier]. [ 146.525100][ T9436] ERROR: Out of memory at tomoyo_realpath_from_path. 20:44:42 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:42 executing program 0 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x3}}, 0x0) [ 146.630029][ T9481] XFS (loop5): unknown mount option [subj_type=]. 20:44:42 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[{@discard='discard'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) [ 146.775890][ T9494] FAULT_INJECTION: forcing a failure. [ 146.775890][ T9494] name failslab, interval 1, probability 0, space 0, times 0 [ 146.790155][ T9494] CPU: 0 PID: 9494 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 146.798022][ T9494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.808584][ T9494] Call Trace: [ 146.812038][ T9494] dump_stack+0x1d8/0x2f8 [ 146.816389][ T9494] should_fail+0x555/0x770 [ 146.820820][ T9494] __should_failslab+0x11a/0x160 [ 146.825767][ T9494] ? tomoyo_encode2+0x273/0x5a0 [ 146.830627][ T9494] should_failslab+0x9/0x20 [ 146.835122][ T9494] __kmalloc+0x7a/0x340 [ 146.839284][ T9494] tomoyo_encode2+0x273/0x5a0 [ 146.843956][ T9494] tomoyo_realpath_from_path+0x769/0x7c0 [ 146.849606][ T9494] tomoyo_path_number_perm+0x166/0x640 [ 146.855069][ T9494] ? smack_file_ioctl+0x226/0x2e0 [ 146.862165][ T9494] ? __fget+0x4a1/0x510 [ 146.866313][ T9494] tomoyo_file_ioctl+0x23/0x30 [ 146.871145][ T9494] security_file_ioctl+0x6d/0xd0 [ 146.876266][ T9494] __x64_sys_ioctl+0xa3/0x120 [ 146.881116][ T9494] do_syscall_64+0xf7/0x1c0 [ 146.885616][ T9494] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 146.891530][ T9494] RIP: 0033:0x4598c7 [ 146.895416][ T9494] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 146.916246][ T9494] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 20:44:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x3}}, 0x0) [ 146.924747][ T9494] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 00000000004598c7 [ 146.932713][ T9494] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 146.940911][ T9494] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 146.949024][ T9494] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 146.956982][ T9494] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 [ 146.968797][ T9494] ERROR: Out of memory at tomoyo_realpath_from_path. [ 147.024580][ T9501] XFS (loop5): unknown mount option [subj_type=]. 20:44:43 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:43 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x4000, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x3}}, 0x0) 20:44:43 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[{@swidth={'swidth'}}, {@discard='discard'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) 20:44:43 executing program 0 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="24000000650007050000", @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x3}}, 0x0) [ 147.237995][ T9518] FAULT_INJECTION: forcing a failure. [ 147.237995][ T9518] name failslab, interval 1, probability 0, space 0, times 0 [ 147.252380][ T9519] XFS (loop5): unknown mount option [subj_type=]. [ 147.260172][ T9518] CPU: 1 PID: 9518 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 147.267985][ T9518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.278833][ T9518] Call Trace: [ 147.282140][ T9518] dump_stack+0x1d8/0x2f8 [ 147.286620][ T9518] should_fail+0x555/0x770 [ 147.291187][ T9518] __should_failslab+0x11a/0x160 [ 147.296145][ T9518] ? tomoyo_encode2+0x273/0x5a0 [ 147.301054][ T9518] should_failslab+0x9/0x20 [ 147.305599][ T9518] __kmalloc+0x7a/0x340 [ 147.309772][ T9518] tomoyo_encode2+0x273/0x5a0 [ 147.314460][ T9518] tomoyo_realpath_from_path+0x769/0x7c0 [ 147.320280][ T9518] tomoyo_path_number_perm+0x166/0x640 [ 147.325780][ T9518] ? smack_file_ioctl+0x226/0x2e0 [ 147.330817][ T9518] ? __fget+0x4a1/0x510 20:44:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="24000000650007050000", @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x3}}, 0x0) [ 147.334986][ T9518] tomoyo_file_ioctl+0x23/0x30 [ 147.339852][ T9518] security_file_ioctl+0x6d/0xd0 [ 147.344916][ T9518] __x64_sys_ioctl+0xa3/0x120 [ 147.349610][ T9518] do_syscall_64+0xf7/0x1c0 [ 147.354136][ T9518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 147.360157][ T9518] RIP: 0033:0x4598c7 [ 147.364060][ T9518] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 147.384891][ T9518] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 147.393756][ T9518] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 00000000004598c7 [ 147.401728][ T9518] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 147.410337][ T9518] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 147.420254][ T9518] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 147.428377][ T9518] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 [ 147.438101][ T9518] ERROR: Out of memory at tomoyo_realpath_from_path. [ 147.479523][ T9527] XFS (loop2): unknown mount option [nobarrier]. 20:44:43 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="24000000650007050000", @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x3}}, 0x0) 20:44:43 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[{@swidth={'swidth'}}, {@discard='discard'}], [{@subj_type={'subj_type'}}]}) 20:44:43 executing program 0 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500000000000000", @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x3}}, 0x0) [ 147.667771][ T9540] XFS (loop5): unknown mount option [subj_type=]. [ 147.757854][ T9548] FAULT_INJECTION: forcing a failure. [ 147.757854][ T9548] name failslab, interval 1, probability 0, space 0, times 0 [ 147.778771][ T9548] CPU: 1 PID: 9548 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 147.786616][ T9548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.796697][ T9548] Call Trace: [ 147.800005][ T9548] dump_stack+0x1d8/0x2f8 [ 147.804354][ T9548] should_fail+0x555/0x770 [ 147.808963][ T9548] __should_failslab+0x11a/0x160 [ 147.814092][ T9548] ? loop_set_fd+0x1470/0x1470 [ 147.818866][ T9548] should_failslab+0x9/0x20 [ 147.823370][ T9548] kmem_cache_alloc_trace+0x5d/0x2f0 [ 147.828919][ T9548] ? __kthread_create_on_node+0xb2/0x3b0 [ 147.834627][ T9548] ? loop_set_fd+0x1470/0x1470 [ 147.839400][ T9548] __kthread_create_on_node+0xb2/0x3b0 [ 147.844876][ T9548] ? loop_set_fd+0x1470/0x1470 [ 147.849651][ T9548] kthread_create_on_node+0x72/0xa0 [ 147.855285][ T9548] ? lockdep_init_map+0x2a/0x680 [ 147.860233][ T9548] ? __kthread_init_worker+0x5a/0xe0 [ 147.865660][ T9548] loop_set_fd+0x6a8/0x1470 [ 147.870312][ T9548] ? check_preemption_disabled+0xb7/0x2a0 [ 147.876148][ T9548] ? tomoyo_path_number_perm+0x4e1/0x640 [ 147.881788][ T9548] lo_ioctl+0xd5/0x2200 [ 147.886984][ T9548] ? __kasan_slab_free+0x12a/0x1e0 [ 147.892270][ T9548] ? kasan_slab_free+0xe/0x10 [ 147.896955][ T9548] ? kfree+0x115/0x200 [ 147.901022][ T9548] ? tomoyo_path_number_perm+0x4e1/0x640 [ 147.906763][ T9548] ? tomoyo_file_ioctl+0x23/0x30 [ 147.911890][ T9548] ? security_file_ioctl+0x6d/0xd0 [ 147.917128][ T9548] ? __x64_sys_ioctl+0xa3/0x120 [ 147.922074][ T9548] ? do_syscall_64+0xf7/0x1c0 [ 147.926849][ T9548] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 147.932920][ T9548] ? debug_check_no_obj_freed+0x505/0x5b0 [ 147.938767][ T9548] ? rcu_lock_release+0x9/0x30 [ 147.943697][ T9548] ? rcu_lock_release+0x9/0x30 [ 147.948455][ T9548] ? lo_release+0x1f0/0x1f0 [ 147.953038][ T9548] blkdev_ioctl+0x807/0x2980 20:44:44 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 147.957846][ T9548] ? tomoyo_path_number_perm+0x53e/0x640 [ 147.963773][ T9548] block_ioctl+0xbd/0x100 [ 147.968190][ T9548] ? blkdev_iopoll+0x100/0x100 [ 147.973132][ T9548] do_vfs_ioctl+0x744/0x1730 [ 147.977873][ T9548] ? __fget+0x4a1/0x510 [ 147.982134][ T9548] ? tomoyo_file_ioctl+0x23/0x30 [ 147.987162][ T9548] ? security_file_ioctl+0xa1/0xd0 [ 147.992306][ T9548] __x64_sys_ioctl+0xe3/0x120 [ 147.997223][ T9548] do_syscall_64+0xf7/0x1c0 [ 148.001740][ T9548] entry_SYSCALL_64_after_hwframe+0x49/0xbe 20:44:44 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) munlockall() r2 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:44 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[{@swidth={'swidth'}}, {@discard='discard'}]}) [ 148.007634][ T9548] RIP: 0033:0x4598c7 [ 148.011530][ T9548] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 148.031279][ T9548] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 148.039858][ T9548] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 00000000004598c7 [ 148.048016][ T9548] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 20:44:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500000000000000", @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x3}}, 0x0) [ 148.056440][ T9548] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 148.064851][ T9548] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 148.073037][ T9548] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:44 executing program 0 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 148.186980][ T9561] XFS (loop5): Invalid superblock magic number [ 148.211152][ T9572] XFS (loop2): unknown mount option [nobarrier]. 20:44:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500000000000000", @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x3}}, 0x0) [ 148.265903][ T9578] FAULT_INJECTION: forcing a failure. [ 148.265903][ T9578] name failslab, interval 1, probability 0, space 0, times 0 [ 148.282770][ T9578] CPU: 1 PID: 9578 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 148.290605][ T9578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.300942][ T9578] Call Trace: [ 148.304258][ T9578] dump_stack+0x1d8/0x2f8 [ 148.308707][ T9578] should_fail+0x555/0x770 [ 148.313335][ T9578] __should_failslab+0x11a/0x160 [ 148.318271][ T9578] ? __kernfs_new_node+0x97/0x6b0 [ 148.323309][ T9578] should_failslab+0x9/0x20 [ 148.328296][ T9578] kmem_cache_alloc+0x56/0x2e0 [ 148.333162][ T9578] __kernfs_new_node+0x97/0x6b0 [ 148.338145][ T9578] ? __schedule+0x7e3/0xb80 [ 148.342698][ T9578] ? bd_set_size+0x97/0xb0 [ 148.347212][ T9578] kernfs_create_dir_ns+0x9b/0x230 [ 148.352595][ T9578] internal_create_group+0x207/0xd80 [ 148.357894][ T9578] sysfs_create_group+0x1f/0x30 [ 148.362771][ T9578] loop_set_fd+0xf54/0x1470 [ 148.367284][ T9578] lo_ioctl+0xd5/0x2200 [ 148.371438][ T9578] ? __kasan_slab_free+0x12a/0x1e0 [ 148.376716][ T9578] ? kasan_slab_free+0xe/0x10 [ 148.381395][ T9578] ? kfree+0x115/0x200 [ 148.385486][ T9578] ? tomoyo_path_number_perm+0x4e1/0x640 [ 148.391533][ T9578] ? tomoyo_file_ioctl+0x23/0x30 [ 148.396574][ T9578] ? security_file_ioctl+0x6d/0xd0 [ 148.401826][ T9578] ? __x64_sys_ioctl+0xa3/0x120 [ 148.407100][ T9578] ? do_syscall_64+0xf7/0x1c0 [ 148.412109][ T9578] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 148.418524][ T9578] ? debug_check_no_obj_freed+0x505/0x5b0 [ 148.424433][ T9578] ? rcu_lock_release+0x9/0x30 [ 148.429198][ T9578] ? rcu_lock_release+0x9/0x30 [ 148.433959][ T9578] ? lo_release+0x1f0/0x1f0 [ 148.439060][ T9578] blkdev_ioctl+0x807/0x2980 [ 148.443648][ T9578] ? tomoyo_path_number_perm+0x53e/0x640 [ 148.449533][ T9578] block_ioctl+0xbd/0x100 [ 148.453936][ T9578] ? blkdev_iopoll+0x100/0x100 [ 148.458692][ T9578] do_vfs_ioctl+0x744/0x1730 [ 148.463444][ T9578] ? __fget+0x4a1/0x510 [ 148.467593][ T9578] ? tomoyo_file_ioctl+0x23/0x30 [ 148.472605][ T9578] ? security_file_ioctl+0xa1/0xd0 [ 148.477704][ T9578] __x64_sys_ioctl+0xe3/0x120 [ 148.482369][ T9578] do_syscall_64+0xf7/0x1c0 [ 148.486884][ T9578] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 148.492770][ T9578] RIP: 0033:0x4598c7 [ 148.496771][ T9578] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 148.516628][ T9578] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 148.525114][ T9578] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 00000000004598c7 [ 148.533072][ T9578] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 148.541120][ T9578] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 148.549077][ T9578] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 148.557251][ T9578] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:44 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/18, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x3}}, 0x0) 20:44:44 executing program 0 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 148.804968][ T9594] FAULT_INJECTION: forcing a failure. [ 148.804968][ T9594] name failslab, interval 1, probability 0, space 0, times 0 [ 148.818113][ T9594] CPU: 0 PID: 9594 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 148.825928][ T9594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.836084][ T9594] Call Trace: [ 148.839391][ T9594] dump_stack+0x1d8/0x2f8 [ 148.843886][ T9594] should_fail+0x555/0x770 [ 148.848323][ T9594] __should_failslab+0x11a/0x160 [ 148.853271][ T9594] ? radix_tree_node_alloc+0x1a1/0x370 [ 148.858742][ T9594] should_failslab+0x9/0x20 [ 148.863261][ T9594] kmem_cache_alloc+0x56/0x2e0 [ 148.868021][ T9594] radix_tree_node_alloc+0x1a1/0x370 [ 148.873297][ T9594] idr_get_free+0x2b8/0x890 [ 148.877982][ T9594] idr_alloc_cyclic+0x18b/0x550 [ 148.882854][ T9594] __kernfs_new_node+0x124/0x6b0 [ 148.888075][ T9594] ? bd_set_size+0x97/0xb0 [ 148.892490][ T9594] kernfs_create_dir_ns+0x9b/0x230 [ 148.897836][ T9594] internal_create_group+0x207/0xd80 20:44:44 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:44 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) r2 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/18, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x3}}, 0x0) 20:44:45 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 148.903359][ T9594] sysfs_create_group+0x1f/0x30 [ 148.908200][ T9594] loop_set_fd+0xf54/0x1470 [ 148.912872][ T9594] lo_ioctl+0xd5/0x2200 [ 148.917348][ T9594] ? __kasan_slab_free+0x12a/0x1e0 [ 148.922564][ T9594] ? kasan_slab_free+0xe/0x10 [ 148.927253][ T9594] ? kfree+0x115/0x200 [ 148.931459][ T9594] ? tomoyo_path_number_perm+0x4e1/0x640 [ 148.937245][ T9594] ? tomoyo_file_ioctl+0x23/0x30 [ 148.942281][ T9594] ? security_file_ioctl+0x6d/0xd0 [ 148.947397][ T9594] ? __x64_sys_ioctl+0xa3/0x120 [ 148.952604][ T9594] ? do_syscall_64+0xf7/0x1c0 [ 148.957452][ T9594] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 148.963529][ T9594] ? debug_check_no_obj_freed+0x505/0x5b0 [ 148.969425][ T9594] ? rcu_lock_release+0x9/0x30 [ 148.974279][ T9594] ? rcu_lock_release+0x9/0x30 [ 148.979044][ T9594] ? lo_release+0x1f0/0x1f0 [ 148.983563][ T9594] blkdev_ioctl+0x807/0x2980 [ 148.988160][ T9594] ? tomoyo_path_number_perm+0x53e/0x640 [ 148.993795][ T9594] block_ioctl+0xbd/0x100 [ 148.998147][ T9594] ? blkdev_iopoll+0x100/0x100 [ 149.002963][ T9594] do_vfs_ioctl+0x744/0x1730 [ 149.007623][ T9594] ? __fget+0x4a1/0x510 [ 149.012043][ T9594] ? tomoyo_file_ioctl+0x23/0x30 [ 149.016968][ T9594] ? security_file_ioctl+0xa1/0xd0 [ 149.022073][ T9594] __x64_sys_ioctl+0xe3/0x120 [ 149.026745][ T9594] do_syscall_64+0xf7/0x1c0 [ 149.031380][ T9594] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 149.037260][ T9594] RIP: 0033:0x4598c7 [ 149.041459][ T9594] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 149.061555][ T9594] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 149.070087][ T9594] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 00000000004598c7 [ 149.078386][ T9594] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 149.086397][ T9594] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 149.094506][ T9594] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 149.102556][ T9594] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/18, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x3}}, 0x0) 20:44:45 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:45 executing program 0 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 149.247283][ T9609] XFS (loop2): unknown mount option [nobarrier]. 20:44:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/19, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x3}}, 0x0) 20:44:45 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 149.392649][ T9622] FAULT_INJECTION: forcing a failure. [ 149.392649][ T9622] name failslab, interval 1, probability 0, space 0, times 0 [ 149.417710][ T9622] CPU: 0 PID: 9622 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 149.425554][ T9622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.435856][ T9622] Call Trace: [ 149.439141][ T9622] dump_stack+0x1d8/0x2f8 [ 149.443477][ T9622] should_fail+0x555/0x770 [ 149.448256][ T9622] __should_failslab+0x11a/0x160 [ 149.453197][ T9622] ? __kernfs_new_node+0x97/0x6b0 [ 149.458346][ T9622] should_failslab+0x9/0x20 [ 149.462841][ T9622] kmem_cache_alloc+0x56/0x2e0 [ 149.467778][ T9622] __kernfs_new_node+0x97/0x6b0 [ 149.472965][ T9622] ? mutex_unlock+0xd/0x10 [ 149.477386][ T9622] ? kernfs_activate+0x4c7/0x4e0 [ 149.482560][ T9622] kernfs_new_node+0x97/0x170 [ 149.487241][ T9622] __kernfs_create_file+0x4a/0x2f0 20:44:45 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 149.492356][ T9622] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 149.497950][ T9622] internal_create_group+0x4be/0xd80 [ 149.503819][ T9622] sysfs_create_group+0x1f/0x30 [ 149.508773][ T9622] loop_set_fd+0xf54/0x1470 [ 149.513305][ T9622] lo_ioctl+0xd5/0x2200 [ 149.518156][ T9622] ? __kasan_slab_free+0x12a/0x1e0 [ 149.523490][ T9622] ? kasan_slab_free+0xe/0x10 [ 149.528495][ T9622] ? kfree+0x115/0x200 [ 149.532559][ T9622] ? tomoyo_path_number_perm+0x4e1/0x640 [ 149.538323][ T9622] ? tomoyo_file_ioctl+0x23/0x30 [ 149.543373][ T9622] ? security_file_ioctl+0x6d/0xd0 [ 149.548675][ T9622] ? __x64_sys_ioctl+0xa3/0x120 [ 149.553604][ T9622] ? do_syscall_64+0xf7/0x1c0 [ 149.558272][ T9622] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 149.564938][ T9622] ? debug_check_no_obj_freed+0x505/0x5b0 [ 149.571152][ T9622] ? rcu_lock_release+0x9/0x30 [ 149.576061][ T9622] ? rcu_lock_release+0x9/0x30 [ 149.581296][ T9622] ? lo_release+0x1f0/0x1f0 [ 149.586057][ T9622] blkdev_ioctl+0x807/0x2980 [ 149.590880][ T9622] ? tomoyo_path_number_perm+0x53e/0x640 [ 149.596623][ T9622] block_ioctl+0xbd/0x100 [ 149.600943][ T9622] ? blkdev_iopoll+0x100/0x100 [ 149.605794][ T9622] do_vfs_ioctl+0x744/0x1730 [ 149.610370][ T9622] ? __fget+0x4a1/0x510 [ 149.614521][ T9622] ? tomoyo_file_ioctl+0x23/0x30 [ 149.619622][ T9622] ? security_file_ioctl+0xa1/0xd0 [ 149.624912][ T9622] __x64_sys_ioctl+0xe3/0x120 [ 149.629929][ T9622] do_syscall_64+0xf7/0x1c0 [ 149.634706][ T9622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 149.640732][ T9622] RIP: 0033:0x4598c7 [ 149.644619][ T9622] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 149.665256][ T9622] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 149.673657][ T9622] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 00000000004598c7 [ 149.681621][ T9622] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 149.689582][ T9622] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 149.697650][ T9622] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 149.705771][ T9622] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:45 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/19, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x3}}, 0x0) 20:44:46 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:46 executing program 0 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:46 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) r2 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb1, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006500070500"/19, @ANYRES32=r3, @ANYBLOB="0000000004000e0000000000"], 0x3}}, 0x0) 20:44:46 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 150.014698][ T9650] FAULT_INJECTION: forcing a failure. [ 150.014698][ T9650] name failslab, interval 1, probability 0, space 0, times 0 [ 150.028566][ T9650] CPU: 1 PID: 9650 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 150.036548][ T9650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.046717][ T9650] Call Trace: [ 150.050047][ T9650] dump_stack+0x1d8/0x2f8 [ 150.054399][ T9650] should_fail+0x555/0x770 [ 150.058825][ T9650] __should_failslab+0x11a/0x160 [ 150.063776][ T9650] ? __kernfs_new_node+0x97/0x6b0 [ 150.068813][ T9650] should_failslab+0x9/0x20 [ 150.073877][ T9650] kmem_cache_alloc+0x56/0x2e0 [ 150.078847][ T9650] __kernfs_new_node+0x97/0x6b0 [ 150.083719][ T9650] ? mutex_unlock+0xd/0x10 [ 150.088683][ T9650] ? kernfs_activate+0x4c7/0x4e0 [ 150.093858][ T9650] kernfs_new_node+0x97/0x170 [ 150.098634][ T9650] __kernfs_create_file+0x4a/0x2f0 [ 150.103850][ T9650] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 150.109251][ T9650] internal_create_group+0x4be/0xd80 [ 150.115060][ T9650] sysfs_create_group+0x1f/0x30 [ 150.119931][ T9650] loop_set_fd+0xf54/0x1470 [ 150.124533][ T9650] lo_ioctl+0xd5/0x2200 [ 150.128846][ T9650] ? __kasan_slab_free+0x12a/0x1e0 [ 150.133953][ T9650] ? kasan_slab_free+0xe/0x10 [ 150.138897][ T9650] ? kfree+0x115/0x200 [ 150.142975][ T9650] ? tomoyo_path_number_perm+0x4e1/0x640 [ 150.148709][ T9650] ? tomoyo_file_ioctl+0x23/0x30 [ 150.153648][ T9650] ? security_file_ioctl+0x6d/0xd0 [ 150.159148][ T9650] ? __x64_sys_ioctl+0xa3/0x120 [ 150.164014][ T9650] ? do_syscall_64+0xf7/0x1c0 [ 150.169143][ T9650] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 150.175597][ T9650] ? debug_check_no_obj_freed+0x505/0x5b0 [ 150.181647][ T9650] ? rcu_lock_release+0x9/0x30 [ 150.186555][ T9650] ? rcu_lock_release+0x9/0x30 [ 150.191439][ T9650] ? lo_release+0x1f0/0x1f0 [ 150.195932][ T9650] blkdev_ioctl+0x807/0x2980 [ 150.200650][ T9650] ? tomoyo_path_number_perm+0x53e/0x640 [ 150.206440][ T9650] block_ioctl+0xbd/0x100 [ 150.211049][ T9650] ? blkdev_iopoll+0x100/0x100 [ 150.215802][ T9650] do_vfs_ioctl+0x744/0x1730 [ 150.220700][ T9650] ? __fget+0x4a1/0x510 [ 150.224863][ T9650] ? tomoyo_file_ioctl+0x23/0x30 [ 150.230012][ T9650] ? security_file_ioctl+0xa1/0xd0 [ 150.235127][ T9650] __x64_sys_ioctl+0xe3/0x120 [ 150.240018][ T9650] do_syscall_64+0xf7/0x1c0 [ 150.244634][ T9650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 150.251108][ T9650] RIP: 0033:0x4598c7 [ 150.255162][ T9650] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 150.274849][ T9650] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 150.283352][ T9650] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 00000000004598c7 [ 150.291847][ T9650] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 150.299914][ T9650] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 150.308038][ T9650] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 20:44:46 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 150.316101][ T9650] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:46 executing program 0 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:46 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 150.523427][ T9668] FAULT_INJECTION: forcing a failure. [ 150.523427][ T9668] name failslab, interval 1, probability 0, space 0, times 0 [ 150.536346][ T9668] CPU: 1 PID: 9668 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 150.544275][ T9668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.554345][ T9668] Call Trace: [ 150.557745][ T9668] dump_stack+0x1d8/0x2f8 [ 150.562501][ T9668] should_fail+0x555/0x770 [ 150.566941][ T9668] __should_failslab+0x11a/0x160 [ 150.572066][ T9668] ? __kernfs_new_node+0x97/0x6b0 [ 150.577107][ T9668] should_failslab+0x9/0x20 [ 150.581636][ T9668] kmem_cache_alloc+0x56/0x2e0 [ 150.587158][ T9668] __kernfs_new_node+0x97/0x6b0 [ 150.592027][ T9668] ? mutex_unlock+0xd/0x10 [ 150.596444][ T9668] ? kernfs_activate+0x4c7/0x4e0 [ 150.601571][ T9668] kernfs_new_node+0x97/0x170 [ 150.606375][ T9668] __kernfs_create_file+0x4a/0x2f0 [ 150.611755][ T9668] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 150.617150][ T9668] internal_create_group+0x4be/0xd80 20:44:46 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) r2 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:46 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:46 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 150.622737][ T9668] sysfs_create_group+0x1f/0x30 [ 150.627817][ T9668] loop_set_fd+0xf54/0x1470 [ 150.632348][ T9668] lo_ioctl+0xd5/0x2200 [ 150.636611][ T9668] ? __kasan_slab_free+0x12a/0x1e0 [ 150.641749][ T9668] ? kasan_slab_free+0xe/0x10 [ 150.646437][ T9668] ? kfree+0x115/0x200 [ 150.650515][ T9668] ? tomoyo_path_number_perm+0x4e1/0x640 [ 150.656292][ T9668] ? tomoyo_file_ioctl+0x23/0x30 [ 150.661359][ T9668] ? security_file_ioctl+0x6d/0xd0 [ 150.666592][ T9668] ? __x64_sys_ioctl+0xa3/0x120 [ 150.671442][ T9668] ? do_syscall_64+0xf7/0x1c0 [ 150.676353][ T9668] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 150.682535][ T9668] ? debug_check_no_obj_freed+0x505/0x5b0 [ 150.688694][ T9668] ? rcu_lock_release+0x9/0x30 [ 150.693665][ T9668] ? rcu_lock_release+0x9/0x30 [ 150.698436][ T9668] ? lo_release+0x1f0/0x1f0 [ 150.702941][ T9668] blkdev_ioctl+0x807/0x2980 [ 150.707536][ T9668] ? tomoyo_path_number_perm+0x53e/0x640 [ 150.713646][ T9668] block_ioctl+0xbd/0x100 [ 150.718306][ T9668] ? blkdev_iopoll+0x100/0x100 [ 150.723077][ T9668] do_vfs_ioctl+0x744/0x1730 [ 150.727836][ T9668] ? __fget+0x4a1/0x510 [ 150.732101][ T9668] ? tomoyo_file_ioctl+0x23/0x30 [ 150.737314][ T9668] ? security_file_ioctl+0xa1/0xd0 [ 150.742530][ T9668] __x64_sys_ioctl+0xe3/0x120 [ 150.747440][ T9668] do_syscall_64+0xf7/0x1c0 [ 150.751939][ T9668] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 150.757846][ T9668] RIP: 0033:0x4598c7 [ 150.762211][ T9668] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 150.782577][ T9668] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 150.791378][ T9668] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 00000000004598c7 [ 150.799550][ T9668] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 150.807527][ T9668] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 150.815577][ T9668] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 150.823689][ T9668] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:46 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, 0x0) 20:44:47 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:47 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)) r2 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:47 executing program 0 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:47 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:47 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:47 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, 0x0) [ 151.176180][ T9702] FAULT_INJECTION: forcing a failure. [ 151.176180][ T9702] name failslab, interval 1, probability 0, space 0, times 0 [ 151.189569][ T9702] CPU: 0 PID: 9702 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 151.197762][ T9702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.208287][ T9702] Call Trace: [ 151.211595][ T9702] dump_stack+0x1d8/0x2f8 [ 151.216208][ T9702] should_fail+0x555/0x770 [ 151.220732][ T9702] __should_failslab+0x11a/0x160 [ 151.225803][ T9702] ? radix_tree_node_alloc+0x1a1/0x370 [ 151.231447][ T9702] should_failslab+0x9/0x20 [ 151.236060][ T9702] kmem_cache_alloc+0x56/0x2e0 [ 151.240825][ T9702] radix_tree_node_alloc+0x1a1/0x370 [ 151.246330][ T9702] idr_get_free+0x2b8/0x890 [ 151.251005][ T9702] idr_alloc_cyclic+0x18b/0x550 [ 151.255878][ T9702] __kernfs_new_node+0x124/0x6b0 [ 151.260895][ T9702] ? mutex_unlock+0xd/0x10 [ 151.265312][ T9702] ? kernfs_activate+0x4c7/0x4e0 [ 151.270380][ T9702] kernfs_new_node+0x97/0x170 [ 151.275063][ T9702] __kernfs_create_file+0x4a/0x2f0 [ 151.280352][ T9702] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 151.285821][ T9702] internal_create_group+0x4be/0xd80 [ 151.291128][ T9702] sysfs_create_group+0x1f/0x30 [ 151.295974][ T9702] loop_set_fd+0xf54/0x1470 [ 151.301669][ T9702] lo_ioctl+0xd5/0x2200 [ 151.305827][ T9702] ? __kasan_slab_free+0x12a/0x1e0 [ 151.311020][ T9702] ? kasan_slab_free+0xe/0x10 [ 151.315691][ T9702] ? kfree+0x115/0x200 [ 151.319881][ T9702] ? tomoyo_path_number_perm+0x4e1/0x640 [ 151.325507][ T9702] ? tomoyo_file_ioctl+0x23/0x30 [ 151.330445][ T9702] ? security_file_ioctl+0x6d/0xd0 [ 151.335551][ T9702] ? __x64_sys_ioctl+0xa3/0x120 [ 151.340486][ T9702] ? do_syscall_64+0xf7/0x1c0 [ 151.345331][ T9702] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 151.351395][ T9702] ? debug_check_no_obj_freed+0x505/0x5b0 [ 151.357225][ T9702] ? rcu_lock_release+0x9/0x30 [ 151.362040][ T9702] ? rcu_lock_release+0x9/0x30 [ 151.366980][ T9702] ? lo_release+0x1f0/0x1f0 [ 151.371655][ T9702] blkdev_ioctl+0x807/0x2980 [ 151.376240][ T9702] ? tomoyo_path_number_perm+0x53e/0x640 [ 151.381891][ T9702] block_ioctl+0xbd/0x100 [ 151.386306][ T9702] ? blkdev_iopoll+0x100/0x100 [ 151.391264][ T9702] do_vfs_ioctl+0x744/0x1730 [ 151.395847][ T9702] ? __fget+0x4a1/0x510 [ 151.400000][ T9702] ? tomoyo_file_ioctl+0x23/0x30 [ 151.404940][ T9702] ? security_file_ioctl+0xa1/0xd0 [ 151.410054][ T9702] __x64_sys_ioctl+0xe3/0x120 [ 151.414734][ T9702] do_syscall_64+0xf7/0x1c0 [ 151.419239][ T9702] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 151.425127][ T9702] RIP: 0033:0x4598c7 [ 151.429112][ T9702] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 151.448711][ T9702] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 151.457124][ T9702] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 00000000004598c7 [ 151.465160][ T9702] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 20:44:47 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, 0x0) [ 151.473129][ T9702] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 151.481099][ T9702] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 151.489134][ T9702] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:47 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:47 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:47 executing program 0 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:47 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:47 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x4000) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) r1 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:47 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 151.756447][ T9733] FAULT_INJECTION: forcing a failure. [ 151.756447][ T9733] name failslab, interval 1, probability 0, space 0, times 0 [ 151.769424][ T9733] CPU: 1 PID: 9733 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 151.777383][ T9733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.787448][ T9733] Call Trace: [ 151.790753][ T9733] dump_stack+0x1d8/0x2f8 [ 151.795258][ T9733] should_fail+0x555/0x770 [ 151.799689][ T9733] __should_failslab+0x11a/0x160 [ 151.804642][ T9733] ? kzalloc+0x26/0x40 [ 151.808795][ T9733] should_failslab+0x9/0x20 [ 151.813296][ T9733] __kmalloc+0x7a/0x340 [ 151.817454][ T9733] kzalloc+0x26/0x40 [ 151.821480][ T9733] kobject_get_path+0xa7/0x1d0 [ 151.826334][ T9733] kobject_uevent_env+0x2f2/0x1260 [ 151.831478][ T9733] kobject_uevent+0x1f/0x30 [ 151.835980][ T9733] loop_set_fd+0xfc3/0x1470 [ 151.840561][ T9733] lo_ioctl+0xd5/0x2200 [ 151.844742][ T9733] ? __kasan_slab_free+0x12a/0x1e0 [ 151.849994][ T9733] ? kasan_slab_free+0xe/0x10 [ 151.854759][ T9733] ? kfree+0x115/0x200 [ 151.859319][ T9733] ? tomoyo_path_number_perm+0x4e1/0x640 [ 151.865298][ T9733] ? tomoyo_file_ioctl+0x23/0x30 [ 151.870470][ T9733] ? security_file_ioctl+0x6d/0xd0 [ 151.875669][ T9733] ? __x64_sys_ioctl+0xa3/0x120 [ 151.880514][ T9733] ? do_syscall_64+0xf7/0x1c0 [ 151.885188][ T9733] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 151.891257][ T9733] ? debug_check_no_obj_freed+0x505/0x5b0 [ 151.896988][ T9733] ? rcu_lock_release+0x9/0x30 [ 151.901764][ T9733] ? rcu_lock_release+0x9/0x30 [ 151.906540][ T9733] ? lo_release+0x1f0/0x1f0 [ 151.911160][ T9733] blkdev_ioctl+0x807/0x2980 [ 151.915754][ T9733] ? tomoyo_path_number_perm+0x53e/0x640 [ 151.921403][ T9733] block_ioctl+0xbd/0x100 [ 151.925730][ T9733] ? blkdev_iopoll+0x100/0x100 [ 151.930548][ T9733] do_vfs_ioctl+0x744/0x1730 [ 151.935167][ T9733] ? __fget+0x4a1/0x510 [ 151.939332][ T9733] ? tomoyo_file_ioctl+0x23/0x30 [ 151.944273][ T9733] ? security_file_ioctl+0xa1/0xd0 [ 151.949520][ T9733] __x64_sys_ioctl+0xe3/0x120 [ 151.954199][ T9733] do_syscall_64+0xf7/0x1c0 [ 151.958812][ T9733] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 151.966265][ T9733] RIP: 0033:0x4598c7 [ 151.970164][ T9733] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 151.989960][ T9733] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 151.999746][ T9733] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 00000000004598c7 20:44:48 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}}) [ 152.007800][ T9733] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 152.015813][ T9733] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 152.023782][ T9733] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 152.031748][ T9733] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 [ 152.048939][ T9736] 9pnet: Insufficient options for proto=fd 20:44:48 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 152.114581][ T9744] XFS (loop2): unknown mount option [nobarrier]. [ 152.157106][ T9749] 9pnet: Insufficient options for proto=fd 20:44:48 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:48 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:48 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) [ 152.325234][ T9762] 9pnet: Insufficient options for proto=fd 20:44:48 executing program 0 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:48 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 152.425781][ T9768] 9pnet: Insufficient options for proto=fd [ 152.486854][ T9772] FAULT_INJECTION: forcing a failure. [ 152.486854][ T9772] name failslab, interval 1, probability 0, space 0, times 0 [ 152.500550][ T9772] CPU: 0 PID: 9772 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 152.508475][ T9772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.518543][ T9772] Call Trace: [ 152.521846][ T9772] dump_stack+0x1d8/0x2f8 [ 152.526185][ T9772] should_fail+0x555/0x770 [ 152.530612][ T9772] __should_failslab+0x11a/0x160 20:44:48 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) [ 152.535544][ T9772] should_failslab+0x9/0x20 [ 152.540243][ T9772] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 152.545950][ T9772] ? __kmalloc_node_track_caller+0x3c/0x60 [ 152.551877][ T9772] __kmalloc_node_track_caller+0x3c/0x60 [ 152.557543][ T9772] ? alloc_uevent_skb+0x7f/0x230 [ 152.562633][ T9772] __alloc_skb+0xe8/0x500 [ 152.567014][ T9772] alloc_uevent_skb+0x7f/0x230 [ 152.572079][ T9772] kobject_uevent_env+0xcbb/0x1260 [ 152.577586][ T9772] kobject_uevent+0x1f/0x30 [ 152.582091][ T9772] loop_set_fd+0xfc3/0x1470 [ 152.586591][ T9772] lo_ioctl+0xd5/0x2200 [ 152.590731][ T9772] ? __kasan_slab_free+0x12a/0x1e0 [ 152.595835][ T9772] ? kasan_slab_free+0xe/0x10 [ 152.600668][ T9772] ? kfree+0x115/0x200 [ 152.604725][ T9772] ? tomoyo_path_number_perm+0x4e1/0x640 [ 152.610433][ T9772] ? tomoyo_file_ioctl+0x23/0x30 [ 152.615364][ T9772] ? security_file_ioctl+0x6d/0xd0 [ 152.620586][ T9772] ? __x64_sys_ioctl+0xa3/0x120 [ 152.625428][ T9772] ? do_syscall_64+0xf7/0x1c0 [ 152.630227][ T9772] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 152.636540][ T9772] ? debug_check_no_obj_freed+0x505/0x5b0 [ 152.642437][ T9772] ? rcu_lock_release+0x9/0x30 [ 152.647197][ T9772] ? rcu_lock_release+0x9/0x30 [ 152.651952][ T9772] ? lo_release+0x1f0/0x1f0 [ 152.656735][ T9772] blkdev_ioctl+0x807/0x2980 [ 152.661328][ T9772] ? tomoyo_path_number_perm+0x53e/0x640 [ 152.666994][ T9772] block_ioctl+0xbd/0x100 [ 152.671323][ T9772] ? blkdev_iopoll+0x100/0x100 [ 152.676077][ T9772] do_vfs_ioctl+0x744/0x1730 [ 152.680774][ T9772] ? __fget+0x4a1/0x510 [ 152.685111][ T9772] ? tomoyo_file_ioctl+0x23/0x30 [ 152.690132][ T9772] ? security_file_ioctl+0xa1/0xd0 [ 152.695373][ T9772] __x64_sys_ioctl+0xe3/0x120 [ 152.700210][ T9772] do_syscall_64+0xf7/0x1c0 [ 152.704761][ T9772] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 152.710642][ T9772] RIP: 0033:0x4598c7 [ 152.714530][ T9772] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 152.734980][ T9772] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 152.743617][ T9772] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 00000000004598c7 [ 152.751908][ T9772] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 152.760691][ T9772] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 152.769424][ T9772] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 152.777660][ T9772] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:48 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) r1 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:48 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$netlink(0x10, 0x3, 0x0) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) [ 152.836239][ T9780] 9pnet: Insufficient options for proto=fd 20:44:48 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:49 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:49 executing program 0 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 153.014194][ T9791] 9pnet: Insufficient options for proto=fd [ 153.024474][ T9795] XFS (loop2): unknown mount option [nobarrier]. [ 153.065668][ T9802] FAULT_INJECTION: forcing a failure. [ 153.065668][ T9802] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 153.079399][ T9802] CPU: 1 PID: 9802 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 153.088609][ T9802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.099364][ T9802] Call Trace: [ 153.102761][ T9802] dump_stack+0x1d8/0x2f8 [ 153.107621][ T9802] should_fail+0x555/0x770 [ 153.112525][ T9802] should_fail_alloc_page+0x55/0x60 [ 153.117829][ T9802] prepare_alloc_pages+0x283/0x460 [ 153.125485][ T9802] __alloc_pages_nodemask+0xb2/0x5d0 [ 153.131730][ T9802] kmem_getpages+0x4d/0xa00 [ 153.136891][ T9802] cache_grow_begin+0x7e/0x2c0 [ 153.142926][ T9802] cache_alloc_refill+0x311/0x3f0 [ 153.148266][ T9802] ? check_preemption_disabled+0xb7/0x2a0 [ 153.154431][ T9802] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 153.159961][ T9802] ? kobject_uevent_env+0x2cd/0x1260 [ 153.165629][ T9802] ? dev_uevent_filter+0xb0/0xb0 [ 153.171285][ T9802] kobject_uevent_env+0x2cd/0x1260 [ 153.176414][ T9802] kobject_uevent+0x1f/0x30 [ 153.181005][ T9802] loop_set_fd+0xfc3/0x1470 [ 153.185540][ T9802] lo_ioctl+0xd5/0x2200 [ 153.189846][ T9802] ? __kasan_slab_free+0x12a/0x1e0 [ 153.195484][ T9802] ? kasan_slab_free+0xe/0x10 [ 153.200604][ T9802] ? kfree+0x115/0x200 [ 153.205192][ T9802] ? tomoyo_path_number_perm+0x4e1/0x640 [ 153.211193][ T9802] ? tomoyo_file_ioctl+0x23/0x30 [ 153.216308][ T9802] ? security_file_ioctl+0x6d/0xd0 [ 153.221580][ T9802] ? __x64_sys_ioctl+0xa3/0x120 [ 153.226493][ T9802] ? do_syscall_64+0xf7/0x1c0 [ 153.231171][ T9802] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 153.237571][ T9802] ? debug_check_no_obj_freed+0x505/0x5b0 [ 153.246393][ T9802] ? rcu_lock_release+0x9/0x30 [ 153.252106][ T9802] ? rcu_lock_release+0x9/0x30 [ 153.257693][ T9802] ? lo_release+0x1f0/0x1f0 [ 153.262927][ T9802] blkdev_ioctl+0x807/0x2980 [ 153.268190][ T9802] ? tomoyo_path_number_perm+0x53e/0x640 [ 153.274324][ T9802] block_ioctl+0xbd/0x100 [ 153.278750][ T9802] ? blkdev_iopoll+0x100/0x100 [ 153.284186][ T9802] do_vfs_ioctl+0x744/0x1730 [ 153.288781][ T9802] ? __fget+0x4a1/0x510 [ 153.293120][ T9802] ? tomoyo_file_ioctl+0x23/0x30 [ 153.298069][ T9802] ? security_file_ioctl+0xa1/0xd0 [ 153.305343][ T9802] __x64_sys_ioctl+0xe3/0x120 [ 153.310025][ T9802] do_syscall_64+0xf7/0x1c0 [ 153.314862][ T9802] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 153.320934][ T9802] RIP: 0033:0x4598c7 [ 153.324829][ T9802] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 153.347817][ T9802] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 153.356611][ T9802] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 00000000004598c7 20:44:49 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:49 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:49 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 153.365235][ T9802] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 153.373552][ T9802] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 153.382166][ T9802] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 153.390225][ T9802] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:49 executing program 0 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:49 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:49 executing program 2: syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4040) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) [ 153.634773][ T9821] FAULT_INJECTION: forcing a failure. [ 153.634773][ T9821] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 153.649901][ T9821] CPU: 0 PID: 9821 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 153.657819][ T9821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.670189][ T9821] Call Trace: [ 153.674765][ T9821] dump_stack+0x1d8/0x2f8 [ 153.679872][ T9821] should_fail+0x555/0x770 [ 153.685412][ T9821] should_fail_alloc_page+0x55/0x60 [ 153.691097][ T9821] prepare_alloc_pages+0x283/0x460 [ 153.696541][ T9821] __alloc_pages_nodemask+0xb2/0x5d0 [ 153.702129][ T9821] kmem_getpages+0x4d/0xa00 [ 153.708215][ T9821] cache_grow_begin+0x7e/0x2c0 [ 153.713520][ T9821] cache_alloc_refill+0x311/0x3f0 [ 153.718735][ T9821] ? check_preemption_disabled+0xb7/0x2a0 [ 153.724751][ T9821] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 153.730573][ T9821] ? kobject_uevent_env+0x2cd/0x1260 [ 153.736149][ T9821] ? dev_uevent_filter+0xb0/0xb0 [ 153.741084][ T9821] kobject_uevent_env+0x2cd/0x1260 [ 153.746249][ T9821] kobject_uevent+0x1f/0x30 [ 153.750844][ T9821] loop_set_fd+0xfc3/0x1470 [ 153.755909][ T9821] lo_ioctl+0xd5/0x2200 [ 153.760782][ T9821] ? __kasan_slab_free+0x12a/0x1e0 [ 153.766050][ T9821] ? kasan_slab_free+0xe/0x10 [ 153.770909][ T9821] ? kfree+0x115/0x200 [ 153.777487][ T9821] ? tomoyo_path_number_perm+0x4e1/0x640 [ 153.785282][ T9821] ? tomoyo_file_ioctl+0x23/0x30 [ 153.790259][ T9821] ? security_file_ioctl+0x6d/0xd0 [ 153.795836][ T9821] ? __x64_sys_ioctl+0xa3/0x120 [ 153.800687][ T9821] ? do_syscall_64+0xf7/0x1c0 [ 153.805545][ T9821] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 153.811703][ T9821] ? debug_check_no_obj_freed+0x505/0x5b0 [ 153.817549][ T9821] ? rcu_lock_release+0x9/0x30 [ 153.822452][ T9821] ? rcu_lock_release+0x9/0x30 [ 153.828008][ T9821] ? lo_release+0x1f0/0x1f0 [ 153.833115][ T9821] blkdev_ioctl+0x807/0x2980 [ 153.837916][ T9821] ? tomoyo_path_number_perm+0x53e/0x640 [ 153.843762][ T9821] block_ioctl+0xbd/0x100 [ 153.848325][ T9821] ? blkdev_iopoll+0x100/0x100 [ 153.854487][ T9821] do_vfs_ioctl+0x744/0x1730 [ 153.860141][ T9821] ? __fget+0x4a1/0x510 [ 153.864444][ T9821] ? tomoyo_file_ioctl+0x23/0x30 [ 153.869553][ T9821] ? security_file_ioctl+0xa1/0xd0 [ 153.875616][ T9821] __x64_sys_ioctl+0xe3/0x120 [ 153.880598][ T9821] do_syscall_64+0xf7/0x1c0 [ 153.885497][ T9821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 153.891766][ T9821] RIP: 0033:0x4598c7 [ 153.895966][ T9821] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 153.917365][ T9821] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 20:44:50 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 153.926381][ T9821] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 00000000004598c7 [ 153.937222][ T9821] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 153.946396][ T9821] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 153.954361][ T9821] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 153.962360][ T9821] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:50 executing program 0 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:50 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 154.142528][ T9836] XFS (loop2): unknown mount option [nobarrier]. 20:44:50 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 154.185964][ T9841] FAULT_INJECTION: forcing a failure. [ 154.185964][ T9841] name failslab, interval 1, probability 0, space 0, times 0 [ 154.201963][ T9841] CPU: 0 PID: 9841 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 154.210371][ T9841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.222826][ T9841] Call Trace: [ 154.226365][ T9841] dump_stack+0x1d8/0x2f8 [ 154.230798][ T9841] should_fail+0x555/0x770 [ 154.235694][ T9841] __should_failslab+0x11a/0x160 [ 154.241274][ T9841] should_failslab+0x9/0x20 [ 154.247236][ T9841] kmem_cache_alloc_node+0x65/0x280 [ 154.253279][ T9841] ? __alloc_skb+0x9f/0x500 [ 154.258498][ T9841] __alloc_skb+0x9f/0x500 [ 154.263221][ T9841] alloc_uevent_skb+0x7f/0x230 [ 154.268934][ T9841] kobject_uevent_env+0xcbb/0x1260 [ 154.274528][ T9841] kobject_uevent+0x1f/0x30 [ 154.280002][ T9841] loop_set_fd+0xfc3/0x1470 [ 154.285202][ T9841] lo_ioctl+0xd5/0x2200 [ 154.290019][ T9841] ? __kasan_slab_free+0x12a/0x1e0 [ 154.297003][ T9841] ? kasan_slab_free+0xe/0x10 [ 154.301731][ T9841] ? kfree+0x115/0x200 [ 154.306081][ T9841] ? tomoyo_path_number_perm+0x4e1/0x640 [ 154.311696][ T9841] ? tomoyo_file_ioctl+0x23/0x30 [ 154.316865][ T9841] ? security_file_ioctl+0x6d/0xd0 [ 154.322562][ T9841] ? __x64_sys_ioctl+0xa3/0x120 [ 154.327509][ T9841] ? do_syscall_64+0xf7/0x1c0 [ 154.333318][ T9841] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 154.340494][ T9841] ? debug_check_no_obj_freed+0x505/0x5b0 [ 154.346446][ T9841] ? rcu_lock_release+0x9/0x30 [ 154.352691][ T9841] ? rcu_lock_release+0x9/0x30 [ 154.358554][ T9841] ? lo_release+0x1f0/0x1f0 [ 154.363353][ T9841] blkdev_ioctl+0x807/0x2980 [ 154.368114][ T9841] ? tomoyo_path_number_perm+0x53e/0x640 [ 154.374800][ T9841] block_ioctl+0xbd/0x100 [ 154.379169][ T9841] ? blkdev_iopoll+0x100/0x100 [ 154.384105][ T9841] do_vfs_ioctl+0x744/0x1730 [ 154.388803][ T9841] ? __fget+0x4a1/0x510 [ 154.393048][ T9841] ? tomoyo_file_ioctl+0x23/0x30 [ 154.397968][ T9841] ? security_file_ioctl+0xa1/0xd0 [ 154.403153][ T9841] __x64_sys_ioctl+0xe3/0x120 [ 154.409554][ T9841] do_syscall_64+0xf7/0x1c0 [ 154.414045][ T9841] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 154.420127][ T9841] RIP: 0033:0x4598c7 [ 154.424012][ T9841] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 154.443765][ T9841] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 154.452486][ T9841] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 00000000004598c7 [ 154.460809][ T9841] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 154.469852][ T9841] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 154.479193][ T9841] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 154.487328][ T9841] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:50 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:50 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:50 executing program 0 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 154.722460][ T9861] FAULT_INJECTION: forcing a failure. [ 154.722460][ T9861] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 154.735700][ T9861] CPU: 0 PID: 9861 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 154.743502][ T9861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.753560][ T9861] Call Trace: [ 154.756881][ T9861] dump_stack+0x1d8/0x2f8 [ 154.761395][ T9861] should_fail+0x555/0x770 [ 154.765881][ T9861] should_fail_alloc_page+0x55/0x60 [ 154.771092][ T9861] prepare_alloc_pages+0x283/0x460 [ 154.776326][ T9861] __alloc_pages_nodemask+0xb2/0x5d0 [ 154.781621][ T9861] kmem_getpages+0x4d/0xa00 [ 154.786122][ T9861] cache_grow_begin+0x7e/0x2c0 [ 154.790889][ T9861] cache_alloc_refill+0x311/0x3f0 [ 154.795917][ T9861] ? check_preemption_disabled+0xb7/0x2a0 [ 154.801632][ T9861] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 154.807258][ T9861] ? kobject_uevent_env+0x2cd/0x1260 [ 154.812534][ T9861] ? dev_uevent_filter+0xb0/0xb0 [ 154.817898][ T9861] kobject_uevent_env+0x2cd/0x1260 [ 154.823537][ T9861] kobject_uevent+0x1f/0x30 [ 154.828035][ T9861] loop_set_fd+0xfc3/0x1470 [ 154.832661][ T9861] lo_ioctl+0xd5/0x2200 [ 154.836806][ T9861] ? __kasan_slab_free+0x12a/0x1e0 [ 154.841988][ T9861] ? kasan_slab_free+0xe/0x10 [ 154.847172][ T9861] ? kfree+0x115/0x200 [ 154.851253][ T9861] ? tomoyo_path_number_perm+0x4e1/0x640 [ 154.857058][ T9861] ? tomoyo_file_ioctl+0x23/0x30 [ 154.862086][ T9861] ? security_file_ioctl+0x6d/0xd0 [ 154.867185][ T9861] ? __x64_sys_ioctl+0xa3/0x120 [ 154.872284][ T9861] ? do_syscall_64+0xf7/0x1c0 [ 154.876951][ T9861] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 154.883427][ T9861] ? debug_check_no_obj_freed+0x505/0x5b0 [ 154.889509][ T9861] ? rcu_lock_release+0x9/0x30 [ 154.894445][ T9861] ? rcu_lock_release+0x9/0x30 [ 154.899382][ T9861] ? lo_release+0x1f0/0x1f0 [ 154.904307][ T9861] blkdev_ioctl+0x807/0x2980 [ 154.908898][ T9861] ? tomoyo_path_number_perm+0x53e/0x640 [ 154.914540][ T9861] block_ioctl+0xbd/0x100 [ 154.918952][ T9861] ? blkdev_iopoll+0x100/0x100 [ 154.924774][ T9861] do_vfs_ioctl+0x744/0x1730 [ 154.929872][ T9861] ? __fget+0x4a1/0x510 [ 154.934304][ T9861] ? tomoyo_file_ioctl+0x23/0x30 [ 154.939638][ T9861] ? security_file_ioctl+0xa1/0xd0 [ 154.944843][ T9861] __x64_sys_ioctl+0xe3/0x120 [ 154.950156][ T9861] do_syscall_64+0xf7/0x1c0 [ 154.956669][ T9861] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 154.962663][ T9861] RIP: 0033:0x4598c7 [ 154.966567][ T9861] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 154.987462][ T9861] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 154.996815][ T9861] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 00000000004598c7 [ 155.005396][ T9861] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 155.013644][ T9861] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a 20:44:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:51 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 155.021810][ T9861] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 155.029881][ T9861] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:51 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:51 executing program 0 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:51 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:51 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 155.210917][ T9879] XFS (loop2): unknown mount option [nobarrier]. 20:44:51 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:51 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:51 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 155.338963][ T9885] FAULT_INJECTION: forcing a failure. [ 155.338963][ T9885] name failslab, interval 1, probability 0, space 0, times 0 [ 155.395363][ T9885] CPU: 0 PID: 9885 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 155.403495][ T9885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.414710][ T9885] Call Trace: [ 155.418933][ T9885] dump_stack+0x1d8/0x2f8 [ 155.423700][ T9885] should_fail+0x555/0x770 [ 155.428140][ T9885] __should_failslab+0x11a/0x160 [ 155.433076][ T9885] ? skb_clone+0x1cc/0x380 [ 155.437573][ T9885] should_failslab+0x9/0x20 [ 155.442071][ T9885] kmem_cache_alloc+0x56/0x2e0 [ 155.446999][ T9885] skb_clone+0x1cc/0x380 [ 155.451325][ T9885] netlink_broadcast_filtered+0x619/0x1080 [ 155.457135][ T9885] netlink_broadcast+0x3a/0x50 [ 155.461900][ T9885] kobject_uevent_env+0xcf0/0x1260 [ 155.467791][ T9885] kobject_uevent+0x1f/0x30 [ 155.472808][ T9885] loop_set_fd+0xfc3/0x1470 [ 155.477316][ T9885] lo_ioctl+0xd5/0x2200 [ 155.481719][ T9885] ? __kasan_slab_free+0x12a/0x1e0 [ 155.486905][ T9885] ? kasan_slab_free+0xe/0x10 [ 155.491568][ T9885] ? kfree+0x115/0x200 [ 155.495621][ T9885] ? tomoyo_path_number_perm+0x4e1/0x640 [ 155.501342][ T9885] ? tomoyo_file_ioctl+0x23/0x30 [ 155.506266][ T9885] ? security_file_ioctl+0x6d/0xd0 [ 155.511383][ T9885] ? __x64_sys_ioctl+0xa3/0x120 [ 155.516218][ T9885] ? do_syscall_64+0xf7/0x1c0 [ 155.520897][ T9885] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 155.526966][ T9885] ? debug_check_no_obj_freed+0x505/0x5b0 [ 155.532693][ T9885] ? rcu_lock_release+0x9/0x30 [ 155.537467][ T9885] ? rcu_lock_release+0x9/0x30 [ 155.542220][ T9885] ? lo_release+0x1f0/0x1f0 [ 155.546713][ T9885] blkdev_ioctl+0x807/0x2980 [ 155.551297][ T9885] ? tomoyo_path_number_perm+0x53e/0x640 [ 155.557021][ T9885] block_ioctl+0xbd/0x100 [ 155.561423][ T9885] ? blkdev_iopoll+0x100/0x100 [ 155.566961][ T9885] do_vfs_ioctl+0x744/0x1730 [ 155.571539][ T9885] ? __fget+0x4a1/0x510 [ 155.575687][ T9885] ? tomoyo_file_ioctl+0x23/0x30 [ 155.580622][ T9885] ? security_file_ioctl+0xa1/0xd0 [ 155.585741][ T9885] __x64_sys_ioctl+0xe3/0x120 [ 155.590415][ T9885] do_syscall_64+0xf7/0x1c0 [ 155.595003][ T9885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 155.600972][ T9885] RIP: 0033:0x4598c7 [ 155.604983][ T9885] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 155.624597][ T9885] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 155.633018][ T9885] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 00000000004598c7 [ 155.641043][ T9885] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 155.649027][ T9885] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 155.656984][ T9885] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 155.664951][ T9885] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:51 executing program 0 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:51 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:51 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) [ 155.894636][ T9916] FAULT_INJECTION: forcing a failure. [ 155.894636][ T9916] name failslab, interval 1, probability 0, space 0, times 0 [ 155.941276][ T9916] CPU: 1 PID: 9916 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 155.949372][ T9916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.959439][ T9916] Call Trace: [ 155.962999][ T9916] dump_stack+0x1d8/0x2f8 [ 155.967337][ T9916] should_fail+0x555/0x770 [ 155.971760][ T9916] __should_failslab+0x11a/0x160 [ 155.976698][ T9916] ? skb_clone+0x1cc/0x380 [ 155.981208][ T9916] should_failslab+0x9/0x20 [ 155.985707][ T9916] kmem_cache_alloc+0x56/0x2e0 [ 155.990579][ T9916] skb_clone+0x1cc/0x380 [ 155.994825][ T9916] netlink_broadcast_filtered+0x619/0x1080 [ 156.000647][ T9916] netlink_broadcast+0x3a/0x50 [ 156.005435][ T9916] kobject_uevent_env+0xcf0/0x1260 [ 156.010562][ T9916] kobject_uevent+0x1f/0x30 [ 156.015061][ T9916] loop_set_fd+0xfc3/0x1470 [ 156.019750][ T9916] lo_ioctl+0xd5/0x2200 [ 156.023899][ T9916] ? __kasan_slab_free+0x12a/0x1e0 [ 156.029268][ T9916] ? kasan_slab_free+0xe/0x10 [ 156.033954][ T9916] ? kfree+0x115/0x200 [ 156.038017][ T9916] ? tomoyo_path_number_perm+0x4e1/0x640 [ 156.043642][ T9916] ? tomoyo_file_ioctl+0x23/0x30 [ 156.048572][ T9916] ? security_file_ioctl+0x6d/0xd0 [ 156.054575][ T9916] ? __x64_sys_ioctl+0xa3/0x120 [ 156.059421][ T9916] ? do_syscall_64+0xf7/0x1c0 [ 156.064096][ T9916] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 156.070283][ T9916] ? debug_check_no_obj_freed+0x505/0x5b0 [ 156.076036][ T9916] ? rcu_lock_release+0x9/0x30 [ 156.080899][ T9916] ? rcu_lock_release+0x9/0x30 [ 156.085672][ T9916] ? lo_release+0x1f0/0x1f0 [ 156.090351][ T9916] blkdev_ioctl+0x807/0x2980 [ 156.094957][ T9916] ? tomoyo_path_number_perm+0x53e/0x640 [ 156.100803][ T9916] block_ioctl+0xbd/0x100 [ 156.105136][ T9916] ? blkdev_iopoll+0x100/0x100 [ 156.110347][ T9916] do_vfs_ioctl+0x744/0x1730 [ 156.115641][ T9916] ? __fget+0x4a1/0x510 [ 156.119974][ T9916] ? tomoyo_file_ioctl+0x23/0x30 [ 156.124914][ T9916] ? security_file_ioctl+0xa1/0xd0 [ 156.130373][ T9916] __x64_sys_ioctl+0xe3/0x120 [ 156.135149][ T9916] do_syscall_64+0xf7/0x1c0 [ 156.139655][ T9916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 156.145539][ T9916] RIP: 0033:0x4598c7 [ 156.149430][ T9916] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 156.169025][ T9916] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 156.179425][ T9916] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 00000000004598c7 [ 156.187389][ T9916] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 156.195356][ T9916] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 156.203323][ T9916] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 156.211462][ T9916] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:52 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:52 executing program 0 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 156.433206][ T9930] FAULT_INJECTION: forcing a failure. [ 156.433206][ T9930] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 156.446532][ T9930] CPU: 0 PID: 9930 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 156.454341][ T9930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.464395][ T9930] Call Trace: [ 156.467692][ T9930] dump_stack+0x1d8/0x2f8 [ 156.472028][ T9930] should_fail+0x555/0x770 [ 156.476446][ T9930] should_fail_alloc_page+0x55/0x60 [ 156.481731][ T9930] prepare_alloc_pages+0x283/0x460 [ 156.486846][ T9930] __alloc_pages_nodemask+0xb2/0x5d0 [ 156.492135][ T9930] ? lo_release+0x1f0/0x1f0 [ 156.496632][ T9930] ? blkdev_ioctl+0x807/0x2980 [ 156.501393][ T9930] kmem_getpages+0x4d/0xa00 [ 156.506006][ T9930] cache_grow_begin+0x7e/0x2c0 [ 156.510758][ T9930] cache_alloc_refill+0x311/0x3f0 [ 156.515768][ T9930] ? check_preemption_disabled+0xb7/0x2a0 [ 156.521465][ T9930] kmem_cache_alloc+0x2b9/0x2e0 [ 156.526290][ T9930] ? getname_flags+0xba/0x640 [ 156.530955][ T9930] getname_flags+0xba/0x640 [ 156.535437][ T9930] do_mkdirat+0x3c/0x320 [ 156.539664][ T9930] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 156.545363][ T9930] ? do_syscall_64+0x1d/0x1c0 [ 156.550118][ T9930] __x64_sys_mkdir+0x60/0x70 [ 156.554686][ T9930] do_syscall_64+0xf7/0x1c0 [ 156.559170][ T9930] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 156.565050][ T9930] RIP: 0033:0x458e77 [ 156.568922][ T9930] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 156.588509][ T9930] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 156.596895][ T9930] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000458e77 [ 156.604846][ T9930] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 156.612884][ T9930] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 156.620845][ T9930] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 156.628794][ T9930] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:52 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:52 executing program 5: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:52 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 156.685589][ T9926] 9pnet: Insufficient options for proto=fd 20:44:52 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:52 executing program 0 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:52 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:52 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:52 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:52 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 156.879298][ T9948] FAULT_INJECTION: forcing a failure. [ 156.879298][ T9948] name failslab, interval 1, probability 0, space 0, times 0 [ 156.953333][ T9948] CPU: 0 PID: 9948 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 156.961372][ T9948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.971430][ T9948] Call Trace: [ 156.974725][ T9948] dump_stack+0x1d8/0x2f8 [ 156.979206][ T9948] should_fail+0x555/0x770 [ 156.983634][ T9948] __should_failslab+0x11a/0x160 [ 156.988574][ T9948] ? tomoyo_encode2+0x273/0x5a0 [ 156.993527][ T9948] should_failslab+0x9/0x20 [ 156.998031][ T9948] __kmalloc+0x7a/0x340 [ 157.002195][ T9948] tomoyo_encode2+0x273/0x5a0 [ 157.006876][ T9948] tomoyo_realpath_from_path+0x769/0x7c0 [ 157.012527][ T9948] tomoyo_path_number_perm+0x166/0x640 [ 157.018037][ T9948] ? rcu_read_lock_sched_held+0x10b/0x170 [ 157.024022][ T9948] ? trace_kmem_cache_free+0xb2/0x110 [ 157.029398][ T9948] tomoyo_path_mkdir+0x9c/0xc0 [ 157.034169][ T9948] security_path_mkdir+0xed/0x170 [ 157.039195][ T9948] do_mkdirat+0x15c/0x320 [ 157.043581][ T9948] __x64_sys_mkdir+0x60/0x70 [ 157.048172][ T9948] do_syscall_64+0xf7/0x1c0 [ 157.052679][ T9948] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 157.058563][ T9948] RIP: 0033:0x458e77 [ 157.062462][ T9948] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 157.082506][ T9948] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 157.091760][ T9948] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000458e77 20:44:53 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 157.099814][ T9948] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 157.108162][ T9948] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 157.118140][ T9948] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 157.127447][ T9948] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:53 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:53 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 157.313898][ T9948] ERROR: Out of memory at tomoyo_realpath_from_path. 20:44:53 executing program 0 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 157.518171][ T9983] FAULT_INJECTION: forcing a failure. [ 157.518171][ T9983] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 157.531405][ T9983] CPU: 1 PID: 9983 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 157.539216][ T9983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.549283][ T9983] Call Trace: [ 157.552589][ T9983] dump_stack+0x1d8/0x2f8 [ 157.556973][ T9983] should_fail+0x555/0x770 [ 157.561392][ T9983] should_fail_alloc_page+0x55/0x60 [ 157.566585][ T9983] prepare_alloc_pages+0x283/0x460 [ 157.571689][ T9983] __alloc_pages_nodemask+0xb2/0x5d0 [ 157.576960][ T9983] ? lo_release+0x1f0/0x1f0 [ 157.581480][ T9983] ? blkdev_ioctl+0x807/0x2980 [ 157.586237][ T9983] kmem_getpages+0x4d/0xa00 [ 157.590729][ T9983] cache_grow_begin+0x7e/0x2c0 [ 157.596622][ T9983] cache_alloc_refill+0x311/0x3f0 [ 157.601652][ T9983] ? check_preemption_disabled+0xb7/0x2a0 [ 157.607387][ T9983] kmem_cache_alloc+0x2b9/0x2e0 [ 157.612233][ T9983] ? getname_flags+0xba/0x640 [ 157.616903][ T9983] getname_flags+0xba/0x640 [ 157.621402][ T9983] do_mkdirat+0x3c/0x320 [ 157.625635][ T9983] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 157.631341][ T9983] ? do_syscall_64+0x1d/0x1c0 [ 157.636010][ T9983] __x64_sys_mkdir+0x60/0x70 [ 157.640589][ T9983] do_syscall_64+0xf7/0x1c0 [ 157.645086][ T9983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 157.651155][ T9983] RIP: 0033:0x458e77 [ 157.655042][ T9983] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 157.675591][ T9983] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 157.683990][ T9983] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000458e77 [ 157.692308][ T9983] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 157.700266][ T9983] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 157.708223][ T9983] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 157.716272][ T9983] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:53 executing program 2: syz_mount_image$xfs(0x0, 0x0, 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:53 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:53 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:53 executing program 0 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:54 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 157.940727][ T9997] FAULT_INJECTION: forcing a failure. [ 157.940727][ T9997] name failslab, interval 1, probability 0, space 0, times 0 [ 157.990675][ T9997] CPU: 0 PID: 9997 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 157.998695][ T9997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 158.008758][ T9997] Call Trace: [ 158.012112][ T9997] dump_stack+0x1d8/0x2f8 [ 158.016443][ T9997] should_fail+0x555/0x770 [ 158.020857][ T9997] __should_failslab+0x11a/0x160 [ 158.025798][ T9997] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 158.031559][ T9997] should_failslab+0x9/0x20 [ 158.036061][ T9997] __kmalloc+0x7a/0x340 [ 158.040300][ T9997] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 158.046019][ T9997] tomoyo_realpath_from_path+0xdc/0x7c0 [ 158.051660][ T9997] tomoyo_path_number_perm+0x166/0x640 [ 158.057139][ T9997] ? rcu_read_lock_sched_held+0x10b/0x170 [ 158.062852][ T9997] ? trace_kmem_cache_free+0xb2/0x110 [ 158.068217][ T9997] tomoyo_path_mkdir+0x9c/0xc0 [ 158.073672][ T9997] security_path_mkdir+0xed/0x170 [ 158.080083][ T9997] do_mkdirat+0x15c/0x320 [ 158.084669][ T9997] __x64_sys_mkdir+0x60/0x70 [ 158.089276][ T9997] do_syscall_64+0xf7/0x1c0 [ 158.093962][ T9997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 158.100020][ T9997] RIP: 0033:0x458e77 [ 158.103909][ T9997] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 158.125800][ T9997] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 20:44:54 executing program 2: syz_mount_image$xfs(0x0, 0x0, 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:54 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 158.134203][ T9997] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000458e77 [ 158.142427][ T9997] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 158.150461][ T9997] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 158.158686][ T9997] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 158.166644][ T9997] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:54 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:54 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:54 executing program 2: syz_mount_image$xfs(0x0, 0x0, 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:54 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 158.248853][ T9997] ERROR: Out of memory at tomoyo_realpath_from_path. 20:44:54 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) 20:44:54 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="068e7f1e906909ff3a5d0895889119fb5543503099e57e7472f043f2634af8a82c024fbb4bd031a0f0a13f2f1d16cf1d0f2b29606f28961c684cad1b05eca505818a17b29577139dab503b2c48d60ceced88d14f2438fb7314841f215dae13b2ed4baae2017ded85a9e1f2cec8b52caf1817", 0x72, 0x7}, {&(0x7f0000000200)="e832ac79f2", 0x5, 0x3}, {&(0x7f0000000240)="2cc667a4fb7e459560015e72754f2e74c8af928cbb868ea38fef4424faa558e847c8bd1990dba9b41ab2c7e5f84362daf17355ea7326b8f741", 0x39, 0x7f}, {&(0x7f0000000280)="93c829d20c5778d671f7742e3a5ed4e9a00ceced2e0c3947443156e2546ec750debb459d9c1597d1b268f783efc22cd28335075593907bc330a30ea7844fd3cb0082c883b51593d80c3f02856f28054dc647ed03132b22be35858e750f23070f68156ad02ac04dd92f93de76056121dccc41e004f487dd632629e092a1ce40b0d252fa1640ad6be4ca2a4ee679d43f19", 0x90, 0xfffffffffffffff7}, {&(0x7f0000000340)="4a033febbf3319db75e7d2880e906913317541fa054bbfd57900ea777bca9cb98b7fd606f04fef9edf0fb788742d5b0de537e07f6b164ae09281fb3dca4132cb1e1469fe", 0x44, 0x9}, {&(0x7f00000003c0)="da7d40dacce2277ad05f8d89b3e1e0c3f937b5e037e7bfcb61cabaf0af77a57fb160303d60b8", 0x26, 0x81}, {&(0x7f0000000400)="1e1d209cea4c17d868eac4a80926ca7c552f9a5faca371c9baf34ace9b9facaa4675c7940d1caf7b162b34a861e18297b4c856721bff16df4c83a9e09cdf2358da66e87836235893fd3cdee3c5f3e9e641e0237f041fe704fa6a52c6418caddf8e04c424dce864a6ea93bab274e8ca4b176309589aecc4e828e999449b1111c57471a96debdeeb58aa6d77e3de3f5459a2454cb2304d9a8d546f84a5b28e4d662ac4eb5988114033c5fc45d57d60c51b3f1994919ab9c8b7a9377519e50b062cbcd28d61d3608e6f4e9315e229e78be2bd2885a04e1fb8a7e6b923680cb93eac6348372c548cba2ed25cd2dc", 0xec, 0xfffffffffffffff9}, {&(0x7f0000000500)="e1904fff38c0aba9016eb55fd82b2b530a3161ea54ddb9ad08c7752d6a64b2809e49be8c28975e8c579cb38502e3d2294ff1c76c6f12dc919659b93c85f02ae146d402a7be7806261bb6ccf6be6dc0982d542136972914e2702fa84d2be7be614fa71bcdc2379bb3cc6500d6d36fec5cc749503ee64fd919172047f27c2b195bf68f515b2ad956e685f81dd1a0abf3841bca8fd390ac386d109b93da4829873d46f71deddd19967c30a586415cb5716f7066d3290264928cb51aa3b83754843832b8a51eaaca5e66b249a2a61f34a172f5c0e3a9494a05b6c9b85e0142fd80f9469e8bdd56c86754fc24813ca7", 0xed, 0x5}, {&(0x7f0000000600)="92a6ec3c4382a0103471d8a1408502fb28d7a892b1f40f47394e5b5ea76d102605290f9a47e07d6ce84c598660ef684169bff3038e9a49716b34a5e54cbc5d278a58a8a4b67fe0d95f8024adf63118423ccea0654578397c36bca50b192e94ce088933f6d5925c4ba71f9dfdf8e6bcffb6186b74b3a21bc66a4b83a8ad668083b786dfa5d997e155066ece990039120a32301d74b9c3ca8e6844bf2678a50a67875e81b7c80890d19af71e0e8432aadc56398cd54c33f46e4131a2bd609f8a1b2abcfc5b701a8bc8228035758e586acd94552bd41962fa32bcfb796121965f8fb2647dd34f7c94b90a298c3b5ebaa90b93e38fa1c8db7d", 0xf7, 0x9e4}], 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:54 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) 20:44:54 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:54 executing program 0 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 158.719058][T10040] FAULT_INJECTION: forcing a failure. [ 158.719058][T10040] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 158.732290][T10040] CPU: 0 PID: 10040 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 158.740352][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 158.750933][T10040] Call Trace: [ 158.754241][T10040] dump_stack+0x1d8/0x2f8 [ 158.758584][T10040] should_fail+0x555/0x770 [ 158.763096][T10040] should_fail_alloc_page+0x55/0x60 [ 158.768296][T10040] prepare_alloc_pages+0x283/0x460 [ 158.773852][T10040] __alloc_pages_nodemask+0xb2/0x5d0 [ 158.779141][T10040] kmem_getpages+0x4d/0xa00 [ 158.783640][T10040] cache_grow_begin+0x7e/0x2c0 [ 158.788397][T10040] cache_alloc_refill+0x311/0x3f0 [ 158.793595][T10040] ? check_preemption_disabled+0xb7/0x2a0 [ 158.799310][T10040] __kmalloc+0x318/0x340 [ 158.804274][T10040] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 158.809986][T10040] tomoyo_realpath_from_path+0xdc/0x7c0 [ 158.815616][T10040] tomoyo_path_number_perm+0x166/0x640 [ 158.821107][T10040] ? rcu_read_lock_sched_held+0x10b/0x170 [ 158.826814][T10040] ? trace_kmem_cache_free+0xb2/0x110 [ 158.832197][T10040] tomoyo_path_mkdir+0x9c/0xc0 [ 158.836959][T10040] security_path_mkdir+0xed/0x170 [ 158.841986][T10040] do_mkdirat+0x15c/0x320 [ 158.846309][T10040] __x64_sys_mkdir+0x60/0x70 [ 158.850896][T10040] do_syscall_64+0xf7/0x1c0 [ 158.855411][T10040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 158.861325][T10040] RIP: 0033:0x458e77 [ 158.865208][T10040] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 158.886287][T10040] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 158.894818][T10040] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000458e77 [ 158.902785][T10040] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 158.910749][T10040] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a 20:44:55 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) [ 158.918914][T10040] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 158.926885][T10040] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:55 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:55 executing program 0 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:55 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) 20:44:55 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[{@swidth={'swidth', 0x3d, 0x2}}, {@nogrpid='nogrpid'}, {@discard='discard'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:55 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) 20:44:55 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) 20:44:55 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 159.379123][T10067] FAULT_INJECTION: forcing a failure. [ 159.379123][T10067] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 159.392345][T10067] CPU: 0 PID: 10067 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 159.400230][T10067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.410292][T10067] Call Trace: [ 159.413935][T10067] dump_stack+0x1d8/0x2f8 [ 159.418278][T10067] should_fail+0x555/0x770 [ 159.422704][T10067] should_fail_alloc_page+0x55/0x60 [ 159.427945][T10067] prepare_alloc_pages+0x283/0x460 [ 159.433051][T10067] __alloc_pages_nodemask+0xb2/0x5d0 [ 159.438336][T10067] kmem_getpages+0x4d/0xa00 [ 159.442834][T10067] cache_grow_begin+0x7e/0x2c0 [ 159.447589][T10067] cache_alloc_refill+0x311/0x3f0 [ 159.452623][T10067] ? check_preemption_disabled+0xb7/0x2a0 [ 159.458332][T10067] __kmalloc+0x318/0x340 [ 159.462561][T10067] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 159.468269][T10067] tomoyo_realpath_from_path+0xdc/0x7c0 [ 159.473810][T10067] tomoyo_path_number_perm+0x166/0x640 [ 159.479284][T10067] ? rcu_read_lock_sched_held+0x10b/0x170 [ 159.484992][T10067] ? trace_kmem_cache_free+0xb2/0x110 [ 159.490352][T10067] tomoyo_path_mkdir+0x9c/0xc0 [ 159.495109][T10067] security_path_mkdir+0xed/0x170 [ 159.500122][T10067] do_mkdirat+0x15c/0x320 [ 159.504442][T10067] __x64_sys_mkdir+0x60/0x70 [ 159.509026][T10067] do_syscall_64+0xf7/0x1c0 [ 159.513524][T10067] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 159.519401][T10067] RIP: 0033:0x458e77 [ 159.523281][T10067] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 159.542868][T10067] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 159.551267][T10067] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000458e77 [ 159.559226][T10067] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 159.567188][T10067] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a 20:44:55 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 159.575156][T10067] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 159.583117][T10067] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:55 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) 20:44:55 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:55 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x20000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:55 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:56 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:56 executing program 0 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:56 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 160.115796][T10104] FAULT_INJECTION: forcing a failure. [ 160.115796][T10104] name failslab, interval 1, probability 0, space 0, times 0 [ 160.139138][T10104] CPU: 1 PID: 10104 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 160.147051][T10104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.157284][T10104] Call Trace: [ 160.160584][T10104] dump_stack+0x1d8/0x2f8 [ 160.165529][T10104] should_fail+0x555/0x770 [ 160.169949][T10104] __should_failslab+0x11a/0x160 [ 160.174881][T10104] ? ext4_alloc_inode+0x1f/0x560 [ 160.179824][T10104] should_failslab+0x9/0x20 [ 160.184326][T10104] kmem_cache_alloc+0x56/0x2e0 [ 160.190169][T10104] ? set_qf_name+0x3c0/0x3c0 [ 160.194752][T10104] ext4_alloc_inode+0x1f/0x560 [ 160.199507][T10104] ? set_qf_name+0x3c0/0x3c0 [ 160.204088][T10104] new_inode_pseudo+0x68/0x240 [ 160.209106][T10104] new_inode+0x28/0x1c0 [ 160.213252][T10104] ? trace_ext4_request_inode+0x28b/0x2d0 [ 160.219316][T10104] __ext4_new_inode+0x43d/0x5650 [ 160.224254][T10104] ? memset+0x31/0x40 [ 160.228243][T10104] ? smk_curacc+0xa3/0xe0 [ 160.232568][T10104] ext4_mkdir+0x3f5/0x1450 [ 160.236991][T10104] ? security_inode_permission+0xdd/0x120 [ 160.242718][T10104] vfs_mkdir+0x43f/0x610 [ 160.246964][T10104] do_mkdirat+0x1d7/0x320 [ 160.251298][T10104] __x64_sys_mkdir+0x60/0x70 [ 160.255897][T10104] do_syscall_64+0xf7/0x1c0 [ 160.260407][T10104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 160.266293][T10104] RIP: 0033:0x458e77 [ 160.270184][T10104] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 160.289783][T10104] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 160.298188][T10104] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000458e77 [ 160.306155][T10104] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 20:44:56 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 160.314211][T10104] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 160.322180][T10104] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 160.330146][T10104] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:56 executing program 0 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 160.431947][T10112] FAULT_INJECTION: forcing a failure. [ 160.431947][T10112] name failslab, interval 1, probability 0, space 0, times 0 [ 160.448161][T10112] CPU: 0 PID: 10112 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 160.456660][T10112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.467665][T10112] Call Trace: [ 160.470953][T10112] dump_stack+0x1d8/0x2f8 [ 160.475278][T10112] should_fail+0x555/0x770 [ 160.479694][T10112] __should_failslab+0x11a/0x160 [ 160.484620][T10112] ? ext4_alloc_inode+0x1f/0x560 [ 160.489548][T10112] should_failslab+0x9/0x20 [ 160.494042][T10112] kmem_cache_alloc+0x56/0x2e0 [ 160.498795][T10112] ? set_qf_name+0x3c0/0x3c0 [ 160.503370][T10112] ext4_alloc_inode+0x1f/0x560 [ 160.508119][T10112] ? set_qf_name+0x3c0/0x3c0 [ 160.512694][T10112] new_inode_pseudo+0x68/0x240 [ 160.517811][T10112] new_inode+0x28/0x1c0 [ 160.521972][T10112] ? trace_ext4_request_inode+0x28b/0x2d0 [ 160.527677][T10112] __ext4_new_inode+0x43d/0x5650 [ 160.532599][T10112] ? memset+0x31/0x40 [ 160.536580][T10112] ? smk_curacc+0xa3/0xe0 [ 160.540909][T10112] ext4_mkdir+0x3f5/0x1450 [ 160.545326][T10112] ? security_inode_permission+0xdd/0x120 [ 160.551057][T10112] vfs_mkdir+0x43f/0x610 [ 160.555308][T10112] do_mkdirat+0x1d7/0x320 [ 160.559643][T10112] __x64_sys_mkdir+0x60/0x70 [ 160.564236][T10112] do_syscall_64+0xf7/0x1c0 [ 160.568731][T10112] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 160.574636][T10112] RIP: 0033:0x458e77 [ 160.578528][T10112] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 160.598117][T10112] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 160.606522][T10112] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000458e77 [ 160.614482][T10112] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 160.622438][T10112] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 160.630396][T10112] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 160.638353][T10112] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:56 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:56 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(0x0, 0x1, 0x20000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:56 executing program 0 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:56 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) accept$alg(r0, 0x0, 0x0) [ 160.811713][T10125] 9pnet: Insufficient options for proto=fd [ 160.870759][T10124] FAULT_INJECTION: forcing a failure. [ 160.870759][T10124] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 160.883983][T10124] CPU: 0 PID: 10124 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 160.891863][T10124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.901907][T10124] Call Trace: [ 160.905194][T10124] dump_stack+0x1d8/0x2f8 [ 160.909521][T10124] should_fail+0x555/0x770 [ 160.913936][T10124] should_fail_alloc_page+0x55/0x60 [ 160.919122][T10124] prepare_alloc_pages+0x283/0x460 [ 160.924230][T10124] __alloc_pages_nodemask+0xb2/0x5d0 [ 160.929506][T10124] ? tomoyo_path_number_perm+0x4e1/0x640 [ 160.935141][T10124] kmem_getpages+0x4d/0xa00 [ 160.939656][T10124] cache_grow_begin+0x7e/0x2c0 [ 160.944418][T10124] cache_alloc_refill+0x311/0x3f0 [ 160.949793][T10124] ? check_preemption_disabled+0xb7/0x2a0 [ 160.955507][T10124] kmem_cache_alloc+0x2b9/0x2e0 [ 160.960351][T10124] ? ext4_alloc_inode+0x1f/0x560 [ 160.965278][T10124] ? set_qf_name+0x3c0/0x3c0 [ 160.969890][T10124] ext4_alloc_inode+0x1f/0x560 [ 160.974640][T10124] ? set_qf_name+0x3c0/0x3c0 [ 160.979229][T10124] new_inode_pseudo+0x68/0x240 [ 160.984160][T10124] new_inode+0x28/0x1c0 [ 160.988307][T10124] ? trace_ext4_request_inode+0x28b/0x2d0 [ 160.994021][T10124] __ext4_new_inode+0x43d/0x5650 [ 160.998951][T10124] ? memset+0x31/0x40 [ 161.002936][T10124] ? smk_curacc+0xa3/0xe0 [ 161.007349][T10124] ext4_mkdir+0x3f5/0x1450 [ 161.011771][T10124] ? security_inode_permission+0xdd/0x120 [ 161.017489][T10124] vfs_mkdir+0x43f/0x610 [ 161.021734][T10124] do_mkdirat+0x1d7/0x320 [ 161.026083][T10124] __x64_sys_mkdir+0x60/0x70 [ 161.030683][T10124] do_syscall_64+0xf7/0x1c0 [ 161.035225][T10124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 161.041296][T10124] RIP: 0033:0x458e77 [ 161.045188][T10124] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:44:57 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(0x0, 0x1, 0x20000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:57 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 161.064780][T10124] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 161.073187][T10124] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000458e77 [ 161.081150][T10124] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 161.089122][T10124] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 161.097181][T10124] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 161.105149][T10124] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:57 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 161.241807][T10139] 9pnet: Insufficient options for proto=fd 20:44:57 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(0x0, 0x1, 0x20000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:57 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:57 executing program 0 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:57 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x0, 0x20000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) [ 161.408137][T10152] 9pnet: Insufficient options for proto=fd 20:44:57 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:57 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:57 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 161.523770][T10155] FAULT_INJECTION: forcing a failure. [ 161.523770][T10155] name failslab, interval 1, probability 0, space 0, times 0 [ 161.555222][T10162] 9pnet: Insufficient options for proto=fd [ 161.577824][T10155] CPU: 0 PID: 10155 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 161.585748][T10155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.595804][T10155] Call Trace: [ 161.599102][T10155] dump_stack+0x1d8/0x2f8 [ 161.603520][T10155] should_fail+0x555/0x770 [ 161.607937][T10155] __should_failslab+0x11a/0x160 [ 161.613569][T10155] ? kcalloc+0x2f/0x50 [ 161.617643][T10155] should_failslab+0x9/0x20 [ 161.622149][T10155] __kmalloc+0x7a/0x340 [ 161.626311][T10155] kcalloc+0x2f/0x50 [ 161.630209][T10155] ext4_find_extent+0x216/0xaa0 [ 161.635053][T10155] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 161.641374][T10155] ext4_ext_map_blocks+0x170/0x7170 [ 161.646601][T10155] ? __kasan_check_write+0x14/0x20 [ 161.651791][T10155] ? __down_read+0x14b/0x360 [ 161.656380][T10155] ext4_map_blocks+0x424/0x1e30 [ 161.661252][T10155] ? __kasan_check_write+0x14/0x20 [ 161.666369][T10155] ext4_getblk+0xae/0x460 [ 161.670706][T10155] ext4_bread+0x4a/0x340 [ 161.674949][T10155] ext4_append+0x175/0x310 [ 161.679369][T10155] ext4_mkdir+0x7ad/0x1450 [ 161.683801][T10155] vfs_mkdir+0x43f/0x610 [ 161.688045][T10155] do_mkdirat+0x1d7/0x320 [ 161.692378][T10155] __x64_sys_mkdir+0x60/0x70 [ 161.696963][T10155] do_syscall_64+0xf7/0x1c0 [ 161.701464][T10155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 161.707349][T10155] RIP: 0033:0x458e77 [ 161.711236][T10155] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 161.731006][T10155] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 161.739497][T10155] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000458e77 [ 161.747547][T10155] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 161.755688][T10155] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 161.763658][T10155] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 161.772416][T10155] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:57 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x0, 0x20000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:57 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:58 executing program 0 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 161.932088][T10177] 9pnet: Insufficient options for proto=fd 20:44:58 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:58 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x0, 0x20000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) [ 162.062194][T10183] FAULT_INJECTION: forcing a failure. [ 162.062194][T10183] name failslab, interval 1, probability 0, space 0, times 0 [ 162.106255][T10183] CPU: 0 PID: 10183 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 162.115258][T10183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.126626][T10183] Call Trace: [ 162.130132][T10183] dump_stack+0x1d8/0x2f8 [ 162.134465][T10183] should_fail+0x555/0x770 [ 162.138908][T10183] __should_failslab+0x11a/0x160 [ 162.143842][T10183] should_failslab+0x9/0x20 [ 162.148542][T10183] kmem_cache_alloc_trace+0x5d/0x2f0 [ 162.153820][T10183] ? smack_d_instantiate+0x732/0xd70 [ 162.159097][T10183] smack_d_instantiate+0x732/0xd70 [ 162.164307][T10183] ? lockdep_init_map+0x2a/0x680 [ 162.169757][T10183] security_d_instantiate+0xa5/0x100 [ 162.175563][T10183] d_instantiate_new+0x65/0x120 [ 162.180403][T10183] ext4_mkdir+0xfa9/0x1450 [ 162.184841][T10183] vfs_mkdir+0x43f/0x610 [ 162.189082][T10183] do_mkdirat+0x1d7/0x320 [ 162.193405][T10183] __x64_sys_mkdir+0x60/0x70 [ 162.198506][T10183] do_syscall_64+0xf7/0x1c0 [ 162.203121][T10183] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 162.209094][T10183] RIP: 0033:0x458e77 [ 162.212979][T10183] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 162.234911][T10183] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 162.243309][T10183] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000458e77 [ 162.251441][T10183] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 162.259431][T10183] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 162.267397][T10183] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 162.275377][T10183] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:58 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:58 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:58 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:58 executing program 0 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 162.538002][T10206] FAULT_INJECTION: forcing a failure. [ 162.538002][T10206] name failslab, interval 1, probability 0, space 0, times 0 [ 162.552189][T10206] CPU: 1 PID: 10206 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 162.560948][T10206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.571004][T10206] Call Trace: [ 162.574315][T10206] dump_stack+0x1d8/0x2f8 [ 162.578644][T10206] should_fail+0x555/0x770 [ 162.583066][T10206] __should_failslab+0x11a/0x160 [ 162.588256][T10206] ? __es_insert_extent+0x7ba/0x17c0 [ 162.594669][T10206] should_failslab+0x9/0x20 [ 162.599194][T10206] kmem_cache_alloc+0x56/0x2e0 [ 162.604055][T10206] __es_insert_extent+0x7ba/0x17c0 [ 162.609214][T10206] ext4_es_insert_extent+0x250/0x2ea0 [ 162.614690][T10206] ext4_map_blocks+0xe1c/0x1e30 [ 162.619548][T10206] ? __kasan_check_write+0x14/0x20 [ 162.624655][T10206] ext4_getblk+0xae/0x460 [ 162.628990][T10206] ext4_bread+0x4a/0x340 [ 162.633228][T10206] ext4_append+0x175/0x310 [ 162.637730][T10206] ext4_mkdir+0x7ad/0x1450 [ 162.642249][T10206] vfs_mkdir+0x43f/0x610 [ 162.646529][T10206] do_mkdirat+0x1d7/0x320 [ 162.651466][T10206] __x64_sys_mkdir+0x60/0x70 [ 162.656061][T10206] do_syscall_64+0xf7/0x1c0 [ 162.660565][T10206] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 162.666475][T10206] RIP: 0033:0x458e77 [ 162.670364][T10206] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 162.689976][T10206] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 162.698384][T10206] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000458e77 [ 162.706354][T10206] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 162.715017][T10206] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 162.722990][T10206] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 20:44:58 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 162.731911][T10206] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:58 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:58 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:58 executing program 0 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:59 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:59 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 162.979827][T10220] FAULT_INJECTION: forcing a failure. [ 162.979827][T10220] name failslab, interval 1, probability 0, space 0, times 0 [ 163.008720][T10220] CPU: 1 PID: 10220 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 163.016640][T10220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.027393][T10220] Call Trace: [ 163.030688][T10220] dump_stack+0x1d8/0x2f8 [ 163.035014][T10220] should_fail+0x555/0x770 [ 163.039507][T10220] __should_failslab+0x11a/0x160 [ 163.044518][T10220] ? kcalloc+0x2f/0x50 [ 163.048566][T10220] should_failslab+0x9/0x20 [ 163.053070][T10220] __kmalloc+0x7a/0x340 [ 163.057685][T10220] kcalloc+0x2f/0x50 [ 163.061581][T10220] ext4_find_extent+0x216/0xaa0 [ 163.066674][T10220] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 163.073138][T10220] ext4_ext_map_blocks+0x170/0x7170 [ 163.078431][T10220] ? trace_lock_acquire+0x159/0x1d0 [ 163.083817][T10220] ? __kasan_check_write+0x14/0x20 [ 163.088938][T10220] ext4_map_blocks+0x8f4/0x1e30 [ 163.093800][T10220] ? __kasan_check_write+0x14/0x20 [ 163.098898][T10220] ext4_getblk+0xae/0x460 [ 163.103235][T10220] ext4_bread+0x4a/0x340 [ 163.107522][T10220] ext4_append+0x175/0x310 [ 163.111954][T10220] ext4_mkdir+0x7ad/0x1450 [ 163.116726][T10220] vfs_mkdir+0x43f/0x610 [ 163.121041][T10220] do_mkdirat+0x1d7/0x320 [ 163.125353][T10220] __x64_sys_mkdir+0x60/0x70 [ 163.129922][T10220] do_syscall_64+0xf7/0x1c0 [ 163.134404][T10220] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 163.140270][T10220] RIP: 0033:0x458e77 [ 163.144155][T10220] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 163.164384][T10220] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 163.173173][T10220] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000458e77 [ 163.181218][T10220] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 163.189296][T10220] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 163.197341][T10220] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 163.205296][T10220] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:44:59 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:44:59 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:44:59 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:59 executing program 0 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:44:59 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 163.375235][T10243] 9pnet: Insufficient options for proto=fd [ 163.410358][T10242] FAULT_INJECTION: forcing a failure. [ 163.410358][T10242] name failslab, interval 1, probability 0, space 0, times 0 [ 163.438695][T10242] CPU: 0 PID: 10242 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 163.446617][T10242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.456749][T10242] Call Trace: [ 163.460029][T10242] dump_stack+0x1d8/0x2f8 [ 163.464631][T10242] should_fail+0x555/0x770 [ 163.469419][T10242] __should_failslab+0x11a/0x160 [ 163.474340][T10242] should_failslab+0x9/0x20 [ 163.478822][T10242] kmem_cache_alloc_trace+0x5d/0x2f0 [ 163.484085][T10242] ? smack_d_instantiate+0x732/0xd70 [ 163.489371][T10242] smack_d_instantiate+0x732/0xd70 [ 163.494474][T10242] ? lockdep_init_map+0x2a/0x680 [ 163.500345][T10242] security_d_instantiate+0xa5/0x100 [ 163.505605][T10242] d_instantiate_new+0x65/0x120 [ 163.510898][T10242] ext4_mkdir+0xfa9/0x1450 [ 163.516195][T10242] vfs_mkdir+0x43f/0x610 [ 163.520607][T10242] do_mkdirat+0x1d7/0x320 [ 163.524934][T10242] __x64_sys_mkdir+0x60/0x70 [ 163.529538][T10242] do_syscall_64+0xf7/0x1c0 [ 163.534021][T10242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 163.540416][T10242] RIP: 0033:0x458e77 [ 163.544503][T10242] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 163.564089][T10242] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 163.572486][T10242] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000458e77 [ 163.581130][T10242] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 20:44:59 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) [ 163.589096][T10242] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 163.597046][T10242] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 163.604994][T10242] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 [ 163.687643][T10253] 9pnet: Insufficient options for proto=fd 20:44:59 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:44:59 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) 20:44:59 executing program 0 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 163.883056][T10259] 9pnet: Insufficient options for proto=fd [ 163.945034][T10262] FAULT_INJECTION: forcing a failure. [ 163.945034][T10262] name failslab, interval 1, probability 0, space 0, times 0 [ 163.958209][T10262] CPU: 0 PID: 10262 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 163.966092][T10262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.966147][T10262] Call Trace: [ 163.966166][T10262] dump_stack+0x1d8/0x2f8 [ 163.966182][T10262] should_fail+0x555/0x770 [ 163.966202][T10262] __should_failslab+0x11a/0x160 [ 163.966213][T10262] ? __es_insert_extent+0x7ba/0x17c0 [ 163.966224][T10262] should_failslab+0x9/0x20 [ 163.966238][T10262] kmem_cache_alloc+0x56/0x2e0 [ 164.007955][T10262] __es_insert_extent+0x7ba/0x17c0 [ 164.013159][T10262] ? __kasan_check_write+0x14/0x20 [ 164.018449][T10262] ? do_raw_write_lock+0xf3/0x460 [ 164.023593][T10262] ext4_es_insert_extent+0x250/0x2ea0 [ 164.030038][T10262] ext4_ext_map_blocks+0x1806/0x7170 [ 164.035354][T10262] ? __down_read+0x14b/0x360 [ 164.039954][T10262] ext4_map_blocks+0x424/0x1e30 [ 164.045600][T10262] ? __kasan_check_write+0x14/0x20 [ 164.050716][T10262] ext4_getblk+0xae/0x460 [ 164.055050][T10262] ext4_bread+0x4a/0x340 [ 164.059297][T10262] ext4_append+0x175/0x310 [ 164.064025][T10262] ext4_mkdir+0x7ad/0x1450 [ 164.069153][T10262] vfs_mkdir+0x43f/0x610 [ 164.074528][T10262] do_mkdirat+0x1d7/0x320 [ 164.078871][T10262] __x64_sys_mkdir+0x60/0x70 [ 164.083468][T10262] do_syscall_64+0xf7/0x1c0 [ 164.088080][T10262] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 164.093978][T10262] RIP: 0033:0x458e77 [ 164.098138][T10262] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 164.117986][T10262] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 164.126395][T10262] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000458e77 [ 164.134366][T10262] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 20:45:00 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$netlink(0x10, 0x3, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:45:00 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) [ 164.142346][T10262] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 164.142353][T10262] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 164.142358][T10262] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:00 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:00 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:00 executing program 0 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 164.384556][T10281] FAULT_INJECTION: forcing a failure. [ 164.384556][T10281] name failslab, interval 1, probability 0, space 0, times 0 [ 164.397980][T10281] CPU: 0 PID: 10281 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 164.405881][T10281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.418541][T10281] Call Trace: [ 164.421840][T10281] dump_stack+0x1d8/0x2f8 [ 164.426186][T10281] should_fail+0x555/0x770 [ 164.430612][T10281] __should_failslab+0x11a/0x160 [ 164.435552][T10281] should_failslab+0x9/0x20 [ 164.440052][T10281] kmem_cache_alloc_trace+0x5d/0x2f0 [ 164.445333][T10281] ? smack_d_instantiate+0xabf/0xd70 [ 164.450699][T10281] smack_d_instantiate+0xabf/0xd70 [ 164.455823][T10281] ? lockdep_init_map+0x2a/0x680 [ 164.460761][T10281] security_d_instantiate+0xa5/0x100 [ 164.466048][T10281] d_instantiate_new+0x65/0x120 [ 164.470896][T10281] ext4_mkdir+0xfa9/0x1450 [ 164.475324][T10281] vfs_mkdir+0x43f/0x610 [ 164.479571][T10281] do_mkdirat+0x1d7/0x320 [ 164.483900][T10281] __x64_sys_mkdir+0x60/0x70 [ 164.488486][T10281] do_syscall_64+0xf7/0x1c0 [ 164.492986][T10281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 164.498873][T10281] RIP: 0033:0x458e77 [ 164.502759][T10281] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 164.522352][T10281] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 164.530856][T10281] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000458e77 [ 164.538823][T10281] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 164.546790][T10281] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 164.555364][T10281] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 164.563330][T10281] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:00 executing program 0 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:00 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) [ 164.786597][T10286] FAULT_INJECTION: forcing a failure. [ 164.786597][T10286] name failslab, interval 1, probability 0, space 0, times 0 [ 164.799718][T10286] CPU: 0 PID: 10286 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 164.807610][T10286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.817658][T10286] Call Trace: [ 164.820944][T10286] dump_stack+0x1d8/0x2f8 [ 164.825269][T10286] should_fail+0x555/0x770 [ 164.829679][T10286] __should_failslab+0x11a/0x160 [ 164.834607][T10286] ? __es_insert_extent+0x7ba/0x17c0 [ 164.839881][T10286] should_failslab+0x9/0x20 [ 164.844369][T10286] kmem_cache_alloc+0x56/0x2e0 [ 164.849127][T10286] __es_insert_extent+0x7ba/0x17c0 [ 164.854257][T10286] ext4_es_insert_extent+0x250/0x2ea0 [ 164.859629][T10286] ext4_map_blocks+0xe1c/0x1e30 [ 164.864492][T10286] ? __kasan_check_write+0x14/0x20 [ 164.869596][T10286] ext4_getblk+0xae/0x460 [ 164.873917][T10286] ext4_bread+0x4a/0x340 [ 164.878145][T10286] ext4_append+0x175/0x310 [ 164.882575][T10286] ext4_mkdir+0x7ad/0x1450 [ 164.886996][T10286] vfs_mkdir+0x43f/0x610 [ 164.891317][T10286] do_mkdirat+0x1d7/0x320 [ 164.895808][T10286] __x64_sys_mkdir+0x60/0x70 [ 164.900388][T10286] do_syscall_64+0xf7/0x1c0 [ 164.904878][T10286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 164.910755][T10286] RIP: 0033:0x458e77 [ 164.914636][T10286] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:45:01 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$netlink(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) [ 164.934227][T10286] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 164.942621][T10286] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000458e77 [ 164.950576][T10286] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 164.958531][T10286] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 164.966487][T10286] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 164.974441][T10286] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:01 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:45:01 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:01 executing program 0 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 165.067936][T10292] 9pnet: Insufficient options for proto=fd 20:45:01 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$netlink(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) 20:45:01 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:01 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 165.215055][T10302] FAULT_INJECTION: forcing a failure. [ 165.215055][T10302] name failslab, interval 1, probability 0, space 0, times 0 [ 165.224587][T10307] 9pnet: Insufficient options for proto=fd [ 165.247699][T10302] CPU: 0 PID: 10302 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 165.255649][T10302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.266323][T10302] Call Trace: [ 165.269629][T10302] dump_stack+0x1d8/0x2f8 [ 165.273964][T10302] should_fail+0x555/0x770 [ 165.278411][T10302] __should_failslab+0x11a/0x160 [ 165.283362][T10302] should_failslab+0x9/0x20 [ 165.287866][T10302] kmem_cache_alloc_trace+0x5d/0x2f0 [ 165.293151][T10302] ? smack_d_instantiate+0x732/0xd70 [ 165.298442][T10302] smack_d_instantiate+0x732/0xd70 [ 165.303558][T10302] ? lockdep_init_map+0x2a/0x680 [ 165.308497][T10302] security_d_instantiate+0xa5/0x100 [ 165.313809][T10302] d_instantiate_new+0x65/0x120 [ 165.318659][T10302] ext4_mkdir+0xfa9/0x1450 [ 165.318691][T10302] vfs_mkdir+0x43f/0x610 [ 165.318708][T10302] do_mkdirat+0x1d7/0x320 [ 165.318723][T10302] __x64_sys_mkdir+0x60/0x70 [ 165.318738][T10302] do_syscall_64+0xf7/0x1c0 [ 165.340742][T10302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 165.346631][T10302] RIP: 0033:0x458e77 [ 165.350522][T10302] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 165.370115][T10302] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 165.378518][T10302] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000458e77 [ 165.386483][T10302] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 165.394473][T10302] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 165.402438][T10302] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 20:45:01 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$netlink(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) 20:45:01 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) [ 165.410399][T10302] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:01 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 165.462153][T10315] 9pnet: Insufficient options for proto=fd 20:45:01 executing program 0 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:01 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) [ 165.667008][T10324] FAULT_INJECTION: forcing a failure. [ 165.667008][T10324] name failslab, interval 1, probability 0, space 0, times 0 [ 165.702586][T10324] CPU: 1 PID: 10324 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 165.710856][T10324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.720920][T10324] Call Trace: [ 165.724322][T10324] dump_stack+0x1d8/0x2f8 [ 165.728655][T10324] should_fail+0x555/0x770 [ 165.733076][T10324] __should_failslab+0x11a/0x160 [ 165.738009][T10324] ? ksys_mount+0x6a/0x100 [ 165.738022][T10324] should_failslab+0x9/0x20 [ 165.738036][T10324] __kmalloc_track_caller+0x79/0x340 [ 165.746928][T10324] strndup_user+0x76/0x130 [ 165.746944][T10324] ksys_mount+0x6a/0x100 [ 165.762843][T10324] __x64_sys_mount+0xbf/0xd0 [ 165.767433][T10324] do_syscall_64+0xf7/0x1c0 [ 165.771933][T10324] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 165.779326][T10324] RIP: 0033:0x45c4aa [ 165.783214][T10324] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 165.802945][T10324] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 20:45:01 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:01 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000f80)='9p\x00', 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) [ 165.811386][T10324] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 165.819357][T10324] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 165.827336][T10324] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 165.835302][T10324] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 165.843267][T10324] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:02 executing program 0 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:02 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) [ 166.015835][T10339] FAULT_INJECTION: forcing a failure. [ 166.015835][T10339] name failslab, interval 1, probability 0, space 0, times 0 20:45:02 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:02 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 166.106237][T10339] CPU: 0 PID: 10339 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 166.114162][T10339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.124309][T10339] Call Trace: [ 166.124327][T10339] dump_stack+0x1d8/0x2f8 [ 166.124345][T10339] should_fail+0x555/0x770 [ 166.124364][T10339] __should_failslab+0x11a/0x160 [ 166.124378][T10339] should_failslab+0x9/0x20 [ 166.124393][T10339] kmem_cache_alloc_trace+0x5d/0x2f0 [ 166.136400][T10339] ? smack_d_instantiate+0x962/0xd70 [ 166.136417][T10339] smack_d_instantiate+0x962/0xd70 [ 166.136436][T10339] ? lockdep_init_map+0x2a/0x680 [ 166.136451][T10339] security_d_instantiate+0xa5/0x100 [ 166.136463][T10339] d_instantiate_new+0x65/0x120 [ 166.136478][T10339] ext4_mkdir+0xfa9/0x1450 [ 166.180927][T10339] vfs_mkdir+0x43f/0x610 [ 166.185280][T10339] do_mkdirat+0x1d7/0x320 [ 166.189607][T10339] __x64_sys_mkdir+0x60/0x70 [ 166.194183][T10339] do_syscall_64+0xf7/0x1c0 [ 166.198685][T10339] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 166.204570][T10339] RIP: 0033:0x458e77 [ 166.208450][T10339] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 166.230745][T10339] RSP: 002b:00007fca6654aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 166.239139][T10339] RAX: ffffffffffffffda RBX: 00000000200003c8 RCX: 0000000000458e77 [ 166.247128][T10339] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 166.255098][T10339] RBP: 0000000000000025 R08: 0000000000000000 R09: 000000000000000a [ 166.263072][T10339] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 166.271040][T10339] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:02 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:45:02 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:45:02 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:02 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:45:02 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:45:02 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x2000000, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:45:02 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:02 executing program 5: bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r0 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) 20:45:02 executing program 0 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:02 executing program 5: bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r0 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) 20:45:02 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) [ 166.763213][T10377] FAULT_INJECTION: forcing a failure. [ 166.763213][T10377] name failslab, interval 1, probability 0, space 0, times 0 [ 166.851296][T10377] CPU: 0 PID: 10377 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 166.859218][T10377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.869363][T10377] Call Trace: [ 166.869383][T10377] dump_stack+0x1d8/0x2f8 [ 166.869400][T10377] should_fail+0x555/0x770 [ 166.869417][T10377] __should_failslab+0x11a/0x160 [ 166.869428][T10377] ? tomoyo_encode2+0x273/0x5a0 [ 166.869438][T10377] should_failslab+0x9/0x20 [ 166.869448][T10377] __kmalloc+0x7a/0x340 [ 166.869461][T10377] tomoyo_encode2+0x273/0x5a0 [ 166.904456][T10377] tomoyo_realpath_from_path+0x769/0x7c0 [ 166.910088][T10377] tomoyo_mount_permission+0x294/0xa30 [ 166.915537][T10377] ? filename_lookup+0x4b0/0x690 [ 166.920468][T10377] ? kmem_cache_free+0xd8/0xf0 [ 166.928971][T10377] tomoyo_sb_mount+0x35/0x40 [ 166.933549][T10377] security_sb_mount+0x84/0xe0 [ 166.938304][T10377] do_mount+0x10a/0x2510 [ 166.942653][T10377] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 166.948190][T10377] ? copy_mount_options+0x5f/0x3c0 [ 166.953289][T10377] ? copy_mount_options+0x308/0x3c0 [ 166.958502][T10377] ksys_mount+0xcc/0x100 [ 166.962736][T10377] __x64_sys_mount+0xbf/0xd0 [ 166.967317][T10377] do_syscall_64+0xf7/0x1c0 [ 166.971814][T10377] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 166.977696][T10377] RIP: 0033:0x45c4aa [ 166.981580][T10377] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 20:45:03 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:03 executing program 5: bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r0 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) [ 167.001178][T10377] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 167.009588][T10377] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 167.018325][T10377] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 167.026328][T10377] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 167.034295][T10377] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 167.042262][T10377] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:03 executing program 5: r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 167.129045][T10377] ERROR: Out of memory at tomoyo_realpath_from_path. 20:45:03 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:03 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:03 executing program 5: r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:45:03 executing program 0 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:03 executing program 5: r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 167.404160][T10406] FAULT_INJECTION: forcing a failure. [ 167.404160][T10406] name failslab, interval 1, probability 0, space 0, times 0 [ 167.417077][T10406] CPU: 1 PID: 10406 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 167.424967][T10406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.435039][T10406] Call Trace: [ 167.438331][T10406] dump_stack+0x1d8/0x2f8 [ 167.442653][T10406] should_fail+0x555/0x770 [ 167.447062][T10406] __should_failslab+0x11a/0x160 [ 167.451995][T10406] ? __sigqueue_alloc+0x2ce/0x440 [ 167.457011][T10406] should_failslab+0x9/0x20 [ 167.461501][T10406] kmem_cache_alloc+0x56/0x2e0 [ 167.466260][T10406] __sigqueue_alloc+0x2ce/0x440 [ 167.471106][T10406] __send_signal+0x508/0xcd0 [ 167.475687][T10406] send_signal+0x6e0/0x830 [ 167.480101][T10406] force_sig_info_to_task+0x247/0x2e0 [ 167.485466][T10406] force_sig_fault+0xbf/0x130 [ 167.490139][T10406] __bad_area_nosemaphore+0x307/0x470 [ 167.495502][T10406] bad_area+0x6b/0x80 [ 167.499475][T10406] do_user_addr_fault+0xacc/0xaf0 [ 167.504499][T10406] __do_page_fault+0xd3/0x1f0 [ 167.509162][T10406] do_page_fault+0x99/0xb0 [ 167.513565][T10406] page_fault+0x39/0x40 [ 167.517784][T10406] RIP: 0033:0x45365f [ 167.521665][T10406] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 167.542470][T10406] RSP: 002b:00007fca6654aa88 EFLAGS: 00010283 [ 167.548522][T10406] RAX: 00007fca6654ab40 RBX: 00000000200003c8 RCX: 0000000000000000 [ 167.556488][T10406] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007fca6654ab40 [ 167.564447][T10406] RBP: 0000000000000025 R08: 00000000000000e0 R09: 000000000000000a [ 167.572426][T10406] R10: 0000000000000075 R11: 00000000004e5d00 R12: 0000000000000004 [ 167.580381][T10406] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:03 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:45:03 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, 0x0) 20:45:03 executing program 0 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:03 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 167.770010][T10420] FAULT_INJECTION: forcing a failure. [ 167.770010][T10420] name failslab, interval 1, probability 0, space 0, times 0 [ 167.782981][T10420] CPU: 1 PID: 10420 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 167.790876][T10420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.800927][T10420] Call Trace: [ 167.804218][T10420] dump_stack+0x1d8/0x2f8 [ 167.808563][T10420] should_fail+0x555/0x770 [ 167.812984][T10420] __should_failslab+0x11a/0x160 [ 167.817918][T10420] ? ksys_mount+0x6a/0x100 [ 167.822506][T10420] should_failslab+0x9/0x20 [ 167.827004][T10420] __kmalloc_track_caller+0x79/0x340 [ 167.832297][T10420] strndup_user+0x76/0x130 [ 167.836709][T10420] ksys_mount+0x6a/0x100 [ 167.840947][T10420] __x64_sys_mount+0xbf/0xd0 [ 167.845538][T10420] do_syscall_64+0xf7/0x1c0 [ 167.850039][T10420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 167.856102][T10420] RIP: 0033:0x45c4aa [ 167.859986][T10420] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 167.879676][T10420] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 167.888179][T10420] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 167.896146][T10420] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 167.904115][T10420] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 167.912080][T10420] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 20:45:04 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:04 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, 0x0) 20:45:04 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 167.920048][T10420] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:04 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:04 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:04 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:45:04 executing program 0 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:04 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, 0x0) 20:45:04 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 168.234301][T10446] FAULT_INJECTION: forcing a failure. [ 168.234301][T10446] name failslab, interval 1, probability 0, space 0, times 0 [ 168.262512][T10446] CPU: 0 PID: 10446 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 168.270443][T10446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.282853][T10446] Call Trace: [ 168.286160][T10446] dump_stack+0x1d8/0x2f8 [ 168.290491][T10446] should_fail+0x555/0x770 [ 168.295102][T10446] __should_failslab+0x11a/0x160 [ 168.300043][T10446] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 168.305759][T10446] should_failslab+0x9/0x20 [ 168.310258][T10446] __kmalloc+0x7a/0x340 [ 168.314408][T10446] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 168.320128][T10446] tomoyo_realpath_from_path+0xdc/0x7c0 [ 168.325683][T10446] tomoyo_mount_permission+0x923/0xa30 [ 168.331170][T10446] ? kmem_cache_free+0xd8/0xf0 [ 168.335948][T10446] tomoyo_sb_mount+0x35/0x40 [ 168.340544][T10446] security_sb_mount+0x84/0xe0 [ 168.345923][T10446] do_mount+0x10a/0x2510 [ 168.350169][T10446] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 168.355703][T10446] ? copy_mount_options+0x5f/0x3c0 [ 168.360898][T10446] ? copy_mount_options+0x308/0x3c0 [ 168.366092][T10446] ksys_mount+0xcc/0x100 [ 168.370345][T10446] __x64_sys_mount+0xbf/0xd0 [ 168.374935][T10446] do_syscall_64+0xf7/0x1c0 [ 168.379440][T10446] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 168.385330][T10446] RIP: 0033:0x45c4aa [ 168.389239][T10446] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 168.410234][T10446] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 168.418745][T10446] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 168.426714][T10446] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 168.434683][T10446] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 168.442644][T10446] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 168.450702][T10446] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 [ 168.466079][T10446] ERROR: Out of memory at tomoyo_realpath_from_path. 20:45:04 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, &(0x7f00000010c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:45:04 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:45:04 executing program 0 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 168.634329][T10462] 9pnet: Insufficient options for proto=fd [ 168.695242][T10464] FAULT_INJECTION: forcing a failure. [ 168.695242][T10464] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 168.708461][T10464] CPU: 1 PID: 10464 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 168.716351][T10464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.726406][T10464] Call Trace: [ 168.726424][T10464] dump_stack+0x1d8/0x2f8 [ 168.726439][T10464] should_fail+0x555/0x770 [ 168.726460][T10464] should_fail_alloc_page+0x55/0x60 [ 168.726468][T10464] prepare_alloc_pages+0x283/0x460 [ 168.726482][T10464] __alloc_pages_nodemask+0xb2/0x5d0 [ 168.726503][T10464] kmem_getpages+0x4d/0xa00 [ 168.726514][T10464] cache_grow_begin+0x7e/0x2c0 [ 168.726525][T10464] cache_alloc_refill+0x311/0x3f0 [ 168.726534][T10464] ? check_preemption_disabled+0xb7/0x2a0 [ 168.726548][T10464] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 168.726555][T10464] ? copy_mount_options+0x5f/0x3c0 [ 168.726567][T10464] copy_mount_options+0x5f/0x3c0 [ 168.726579][T10464] ksys_mount+0xa0/0x100 20:45:04 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:04 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:45:04 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, &(0x7f00000010c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) [ 168.726591][T10464] __x64_sys_mount+0xbf/0xd0 [ 168.726604][T10464] do_syscall_64+0xf7/0x1c0 [ 168.726617][T10464] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 168.726632][T10464] RIP: 0033:0x45c4aa [ 168.738614][T10464] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 168.738621][T10464] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 168.738631][T10464] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 168.738638][T10464] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 168.738644][T10464] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 168.738651][T10464] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 168.738657][T10464] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:05 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 168.947633][T10475] 9pnet: Insufficient options for proto=fd 20:45:05 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:05 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:45:05 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:05 executing program 0 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:05 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:05 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, &(0x7f00000010c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:45:05 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 169.130404][T10488] FAULT_INJECTION: forcing a failure. [ 169.130404][T10488] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 169.143738][T10488] CPU: 1 PID: 10488 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 169.143745][T10488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.143749][T10488] Call Trace: [ 169.143766][T10488] dump_stack+0x1d8/0x2f8 [ 169.143781][T10488] should_fail+0x555/0x770 [ 169.143798][T10488] should_fail_alloc_page+0x55/0x60 [ 169.143805][T10488] prepare_alloc_pages+0x283/0x460 [ 169.143818][T10488] __alloc_pages_nodemask+0xb2/0x5d0 [ 169.143829][T10488] ? __kasan_kmalloc+0x178/0x1b0 [ 169.143846][T10488] kmem_getpages+0x4d/0xa00 [ 169.143859][T10488] cache_grow_begin+0x7e/0x2c0 [ 169.143872][T10488] cache_alloc_refill+0x311/0x3f0 [ 169.143881][T10488] ? check_preemption_disabled+0xb7/0x2a0 [ 169.143896][T10488] kmem_cache_alloc+0x2b9/0x2e0 [ 169.143904][T10488] ? getname_flags+0xba/0x640 [ 169.143917][T10488] getname_flags+0xba/0x640 [ 169.165131][T10488] user_path_at_empty+0x2d/0x50 [ 169.165144][T10488] do_mount+0xd7/0x2510 [ 169.165157][T10488] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 169.165168][T10488] ? copy_mount_options+0x5f/0x3c0 [ 169.173880][T10488] ? __kasan_check_read+0x11/0x20 [ 169.173890][T10488] ? copy_mount_options+0x308/0x3c0 [ 169.173903][T10488] ksys_mount+0xcc/0x100 [ 169.173915][T10488] __x64_sys_mount+0xbf/0xd0 [ 169.173929][T10488] do_syscall_64+0xf7/0x1c0 [ 169.184202][T10488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 169.184213][T10488] RIP: 0033:0x45c4aa [ 169.184223][T10488] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 169.184232][T10488] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 169.184242][T10488] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 169.184252][T10488] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 20:45:05 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 169.325953][T10488] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 169.333912][T10488] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 169.341870][T10488] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:05 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:45:05 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 169.373898][T10499] 9pnet: Insufficient options for proto=fd 20:45:05 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:45:05 executing program 0 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 169.528343][T10514] FAULT_INJECTION: forcing a failure. [ 169.528343][T10514] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 169.541652][T10514] CPU: 0 PID: 10514 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 169.549538][T10514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.559760][T10514] Call Trace: [ 169.563074][T10514] dump_stack+0x1d8/0x2f8 [ 169.567397][T10514] should_fail+0x555/0x770 [ 169.571902][T10514] should_fail_alloc_page+0x55/0x60 [ 169.577086][T10514] prepare_alloc_pages+0x283/0x460 [ 169.582200][T10514] __alloc_pages_nodemask+0xb2/0x5d0 [ 169.587463][T10514] ? __kasan_kmalloc+0x178/0x1b0 [ 169.592383][T10514] kmem_getpages+0x4d/0xa00 [ 169.596864][T10514] cache_grow_begin+0x7e/0x2c0 [ 169.601603][T10514] cache_alloc_refill+0x311/0x3f0 [ 169.606603][T10514] ? check_preemption_disabled+0xb7/0x2a0 [ 169.612477][T10514] kmem_cache_alloc+0x2b9/0x2e0 [ 169.617303][T10514] ? getname_flags+0xba/0x640 [ 169.621983][T10514] getname_flags+0xba/0x640 [ 169.626466][T10514] user_path_at_empty+0x2d/0x50 [ 169.632429][T10514] do_mount+0xd7/0x2510 [ 169.636579][T10514] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 169.642115][T10514] ? copy_mount_options+0x5f/0x3c0 [ 169.647225][T10514] ? __kasan_check_read+0x11/0x20 [ 169.652225][T10514] ? copy_mount_options+0x308/0x3c0 [ 169.657398][T10514] ksys_mount+0xcc/0x100 [ 169.661617][T10514] __x64_sys_mount+0xbf/0xd0 [ 169.666196][T10514] do_syscall_64+0xf7/0x1c0 [ 169.670678][T10514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 169.676555][T10514] RIP: 0033:0x45c4aa [ 169.680435][T10514] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 169.700029][T10514] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 169.708419][T10514] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 169.716460][T10514] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 169.724421][T10514] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 169.732377][T10514] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 169.740344][T10514] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:06 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:06 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:45:06 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:45:06 executing program 0 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:06 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 170.262049][T10524] FAULT_INJECTION: forcing a failure. [ 170.262049][T10524] name failslab, interval 1, probability 0, space 0, times 0 20:45:06 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:06 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 170.302268][T10531] 9pnet: Insufficient options for proto=fd [ 170.386470][T10524] CPU: 0 PID: 10524 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 170.394398][T10524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.404451][T10524] Call Trace: [ 170.407756][T10524] dump_stack+0x1d8/0x2f8 [ 170.412085][T10524] should_fail+0x555/0x770 [ 170.416513][T10524] __should_failslab+0x11a/0x160 [ 170.421452][T10524] ? tomoyo_encode2+0x273/0x5a0 [ 170.426422][T10524] should_failslab+0x9/0x20 [ 170.430925][T10524] __kmalloc+0x7a/0x340 [ 170.435091][T10524] tomoyo_encode2+0x273/0x5a0 [ 170.439770][T10524] tomoyo_encode+0x29/0x40 [ 170.444181][T10524] tomoyo_mount_permission+0x216/0xa30 [ 170.449641][T10524] ? filename_lookup+0x4b0/0x690 [ 170.454583][T10524] ? kmem_cache_free+0xd8/0xf0 [ 170.459367][T10524] tomoyo_sb_mount+0x35/0x40 [ 170.463955][T10524] security_sb_mount+0x84/0xe0 [ 170.469243][T10524] do_mount+0x10a/0x2510 [ 170.473484][T10524] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 170.479025][T10524] ? copy_mount_options+0x5f/0x3c0 [ 170.484130][T10524] ? copy_mount_options+0x308/0x3c0 [ 170.489330][T10524] ksys_mount+0xcc/0x100 [ 170.493579][T10524] __x64_sys_mount+0xbf/0xd0 [ 170.498173][T10524] do_syscall_64+0xf7/0x1c0 [ 170.502679][T10524] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 170.508564][T10524] RIP: 0033:0x45c4aa [ 170.512450][T10524] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 20:45:06 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 170.532160][T10524] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 170.540562][T10524] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 170.548528][T10524] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 170.556499][T10524] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 170.564468][T10524] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 170.572435][T10524] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:06 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:45:06 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:45:06 executing program 0 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:06 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 170.731996][T10554] FAULT_INJECTION: forcing a failure. [ 170.731996][T10554] name failslab, interval 1, probability 0, space 0, times 0 [ 170.755614][T10556] 9pnet: Insufficient options for proto=fd [ 170.756611][T10554] CPU: 1 PID: 10554 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 170.769337][T10554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.779560][T10554] Call Trace: [ 170.782853][T10554] dump_stack+0x1d8/0x2f8 [ 170.787182][T10554] should_fail+0x555/0x770 [ 170.791624][T10554] __should_failslab+0x11a/0x160 [ 170.796558][T10554] ? tomoyo_encode2+0x273/0x5a0 [ 170.801402][T10554] should_failslab+0x9/0x20 [ 170.805902][T10554] __kmalloc+0x7a/0x340 [ 170.810065][T10554] tomoyo_encode2+0x273/0x5a0 [ 170.814741][T10554] tomoyo_encode+0x29/0x40 [ 170.819153][T10554] tomoyo_mount_permission+0x216/0xa30 [ 170.824607][T10554] ? filename_lookup+0x4b0/0x690 [ 170.829551][T10554] ? kmem_cache_free+0xd8/0xf0 [ 170.834334][T10554] tomoyo_sb_mount+0x35/0x40 [ 170.838922][T10554] security_sb_mount+0x84/0xe0 [ 170.843686][T10554] do_mount+0x10a/0x2510 [ 170.847921][T10554] ? copy_mount_options+0x278/0x3c0 [ 170.853113][T10554] ? copy_mount_options+0x25e/0x3c0 [ 170.858309][T10554] ? __sanitizer_cov_trace_const_cmp2+0x90/0x90 [ 170.864546][T10554] ? copy_mount_options+0x308/0x3c0 [ 170.869916][T10554] ksys_mount+0xcc/0x100 [ 170.874160][T10554] __x64_sys_mount+0xbf/0xd0 [ 170.878749][T10554] do_syscall_64+0xf7/0x1c0 [ 170.883249][T10554] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 170.889136][T10554] RIP: 0033:0x45c4aa [ 170.893024][T10554] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 170.912618][T10554] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 170.921037][T10554] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 170.929001][T10554] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 170.936971][T10554] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 170.944934][T10554] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 170.952899][T10554] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:07 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:07 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}, {@fscache='fscache'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:45:07 executing program 0 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:07 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, 0x0) 20:45:07 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, 0x0) [ 171.155930][T10566] FAULT_INJECTION: forcing a failure. [ 171.155930][T10566] name failslab, interval 1, probability 0, space 0, times 0 [ 171.178871][T10570] 9pnet: Insufficient options for proto=fd [ 171.208063][T10566] CPU: 1 PID: 10566 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 171.215991][T10566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.226060][T10566] Call Trace: [ 171.229361][T10566] dump_stack+0x1d8/0x2f8 [ 171.233725][T10566] should_fail+0x555/0x770 [ 171.238156][T10566] __should_failslab+0x11a/0x160 [ 171.243105][T10566] ? tomoyo_encode2+0x273/0x5a0 [ 171.247959][T10566] should_failslab+0x9/0x20 [ 171.252469][T10566] __kmalloc+0x7a/0x340 [ 171.256634][T10566] tomoyo_encode2+0x273/0x5a0 [ 171.261329][T10566] tomoyo_realpath_from_path+0x769/0x7c0 [ 171.266978][T10566] tomoyo_mount_permission+0x294/0xa30 [ 171.272461][T10566] ? filename_lookup+0x4b0/0x690 [ 171.277405][T10566] ? kmem_cache_free+0xd8/0xf0 [ 171.282191][T10566] tomoyo_sb_mount+0x35/0x40 [ 171.286784][T10566] security_sb_mount+0x84/0xe0 [ 171.291547][T10566] do_mount+0x10a/0x2510 [ 171.295786][T10566] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 171.301324][T10566] ? copy_mount_options+0x5f/0x3c0 [ 171.306434][T10566] ? copy_mount_options+0x308/0x3c0 [ 171.311649][T10566] ksys_mount+0xcc/0x100 [ 171.315892][T10566] __x64_sys_mount+0xbf/0xd0 [ 171.320489][T10566] do_syscall_64+0xf7/0x1c0 [ 171.324994][T10566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 171.330876][T10566] RIP: 0033:0x45c4aa [ 171.334762][T10566] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 20:45:07 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:07 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 171.354456][T10566] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 171.362862][T10566] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 171.370825][T10566] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 171.378803][T10566] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 171.386780][T10566] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 171.394749][T10566] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:07 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:07 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:07 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}, {@privport='privport'}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:45:07 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, 0x0) [ 171.511741][T10566] ERROR: Out of memory at tomoyo_realpath_from_path. 20:45:07 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}}) 20:45:07 executing program 0 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:07 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}}) [ 171.682260][T10599] 9pnet: Insufficient options for proto=fd [ 171.682411][T10600] FAULT_INJECTION: forcing a failure. [ 171.682411][T10600] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 171.701305][T10600] CPU: 0 PID: 10600 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 171.709192][T10600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.719265][T10600] Call Trace: [ 171.722561][T10600] dump_stack+0x1d8/0x2f8 20:45:07 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:07 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}}) [ 171.724819][T10603] 9pnet: Insufficient options for proto=fd [ 171.726891][T10600] should_fail+0x555/0x770 [ 171.726911][T10600] should_fail_alloc_page+0x55/0x60 [ 171.726921][T10600] prepare_alloc_pages+0x283/0x460 [ 171.726936][T10600] __alloc_pages_nodemask+0xb2/0x5d0 [ 171.726958][T10600] kmem_getpages+0x4d/0xa00 [ 171.726971][T10600] cache_grow_begin+0x7e/0x2c0 [ 171.726984][T10600] cache_alloc_refill+0x311/0x3f0 [ 171.767155][T10600] ? check_preemption_disabled+0xb7/0x2a0 [ 171.772902][T10600] __kmalloc+0x318/0x340 [ 171.777146][T10600] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 171.782872][T10600] tomoyo_realpath_from_path+0xdc/0x7c0 [ 171.788453][T10600] tomoyo_mount_permission+0x294/0xa30 [ 171.793923][T10600] ? filename_lookup+0x4b0/0x690 [ 171.798870][T10600] ? kmem_cache_free+0xd8/0xf0 [ 171.803659][T10600] tomoyo_sb_mount+0x35/0x40 [ 171.808250][T10600] security_sb_mount+0x84/0xe0 [ 171.813028][T10600] do_mount+0x10a/0x2510 [ 171.817263][T10600] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 171.822783][T10600] ? copy_mount_options+0x5f/0x3c0 [ 171.827889][T10600] ? copy_mount_options+0x308/0x3c0 [ 171.833079][T10600] ksys_mount+0xcc/0x100 [ 171.837307][T10600] __x64_sys_mount+0xbf/0xd0 [ 171.842048][T10600] do_syscall_64+0xf7/0x1c0 [ 171.846561][T10600] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 171.852437][T10600] RIP: 0033:0x45c4aa [ 171.856308][T10600] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 171.878013][T10600] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 171.886684][T10600] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 171.894736][T10600] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 171.902704][T10600] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 171.910668][T10600] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 171.919637][T10600] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:08 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 171.946839][T10606] 9pnet: Insufficient options for proto=fd 20:45:08 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:08 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:08 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:08 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) 20:45:08 executing program 0 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:08 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'discard'}}], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) [ 172.391422][T10624] 9pnet: Insufficient options for proto=fd [ 172.400692][T10622] FAULT_INJECTION: forcing a failure. [ 172.400692][T10622] name failslab, interval 1, probability 0, space 0, times 0 [ 172.416477][T10622] CPU: 1 PID: 10622 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 172.424477][T10622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.434744][T10622] Call Trace: [ 172.438210][T10622] dump_stack+0x1d8/0x2f8 [ 172.442543][T10622] should_fail+0x555/0x770 [ 172.447917][T10622] __should_failslab+0x11a/0x160 [ 172.452851][T10622] ? tomoyo_encode2+0x273/0x5a0 [ 172.457874][T10622] should_failslab+0x9/0x20 [ 172.462582][T10622] __kmalloc+0x7a/0x340 [ 172.466753][T10622] tomoyo_encode2+0x273/0x5a0 [ 172.471441][T10622] tomoyo_realpath_from_path+0x769/0x7c0 [ 172.477080][T10622] tomoyo_mount_permission+0x923/0xa30 [ 172.482718][T10622] ? kmem_cache_free+0xd8/0xf0 [ 172.487501][T10622] tomoyo_sb_mount+0x35/0x40 [ 172.492082][T10622] security_sb_mount+0x84/0xe0 [ 172.496854][T10622] do_mount+0x10a/0x2510 [ 172.501135][T10622] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 172.506666][T10622] ? copy_mount_options+0x5f/0x3c0 [ 172.511767][T10622] ? copy_mount_options+0x308/0x3c0 [ 172.516966][T10622] ksys_mount+0xcc/0x100 [ 172.521219][T10622] __x64_sys_mount+0xbf/0xd0 [ 172.526071][T10622] do_syscall_64+0xf7/0x1c0 [ 172.530565][T10622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 172.536621][T10622] RIP: 0033:0x45c4aa [ 172.540607][T10622] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 172.560729][T10622] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 172.569130][T10622] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 172.577105][T10622] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 20:45:08 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) [ 172.585084][T10622] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 172.593050][T10622] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 172.601620][T10622] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:08 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) [ 172.653318][T10634] 9pnet: Insufficient options for proto=fd [ 172.674281][T10622] ERROR: Out of memory at tomoyo_realpath_from_path. 20:45:08 executing program 0 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:08 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 172.771846][T10637] 9pnet: Insufficient options for proto=fd [ 172.865004][T10640] FAULT_INJECTION: forcing a failure. [ 172.865004][T10640] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 172.878680][T10640] CPU: 0 PID: 10640 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 172.886758][T10640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.896942][T10640] Call Trace: [ 172.900239][T10640] dump_stack+0x1d8/0x2f8 [ 172.904918][T10640] should_fail+0x555/0x770 [ 172.909342][T10640] should_fail_alloc_page+0x55/0x60 [ 172.914796][T10640] prepare_alloc_pages+0x283/0x460 [ 172.919993][T10640] __alloc_pages_nodemask+0xb2/0x5d0 [ 172.925285][T10640] kmem_getpages+0x4d/0xa00 [ 172.929793][T10640] cache_grow_begin+0x7e/0x2c0 [ 172.934666][T10640] cache_alloc_refill+0x311/0x3f0 [ 172.939778][T10640] ? check_preemption_disabled+0xb7/0x2a0 [ 172.945586][T10640] __kmalloc+0x318/0x340 [ 172.949935][T10640] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 172.955689][T10640] tomoyo_realpath_from_path+0xdc/0x7c0 [ 172.961240][T10640] tomoyo_mount_permission+0x923/0xa30 [ 172.966707][T10640] ? kmem_cache_free+0xd8/0xf0 [ 172.971586][T10640] tomoyo_sb_mount+0x35/0x40 [ 172.976177][T10640] security_sb_mount+0x84/0xe0 [ 172.980941][T10640] do_mount+0x10a/0x2510 [ 172.985178][T10640] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 172.990808][T10640] ? copy_mount_options+0x5f/0x3c0 [ 172.995917][T10640] ? copy_mount_options+0x308/0x3c0 [ 173.001201][T10640] ksys_mount+0xcc/0x100 [ 173.005440][T10640] __x64_sys_mount+0xbf/0xd0 [ 173.010031][T10640] do_syscall_64+0xf7/0x1c0 [ 173.014536][T10640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.020437][T10640] RIP: 0033:0x45c4aa [ 173.024332][T10640] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 173.044546][T10640] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 173.053572][T10640] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa 20:45:09 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:09 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:09 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 173.061586][T10640] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 173.069553][T10640] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 173.077609][T10640] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 173.086038][T10640] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:09 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:09 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:09 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner'}}]}}) 20:45:09 executing program 0 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:09 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 173.491818][T10662] FAULT_INJECTION: forcing a failure. [ 173.491818][T10662] name failslab, interval 1, probability 0, space 0, times 0 [ 173.541561][T10662] CPU: 0 PID: 10662 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 173.549481][T10662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.559623][T10662] Call Trace: [ 173.562910][T10662] dump_stack+0x1d8/0x2f8 [ 173.567234][T10662] should_fail+0x555/0x770 [ 173.571821][T10662] __should_failslab+0x11a/0x160 [ 173.576752][T10662] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 173.582468][T10662] should_failslab+0x9/0x20 [ 173.586964][T10662] __kmalloc+0x7a/0x340 [ 173.591195][T10662] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 173.596904][T10662] tomoyo_realpath_from_path+0xdc/0x7c0 [ 173.602448][T10662] tomoyo_mount_permission+0x923/0xa30 [ 173.608168][T10662] ? kmem_cache_free+0xd8/0xf0 [ 173.612940][T10662] tomoyo_sb_mount+0x35/0x40 [ 173.617520][T10662] security_sb_mount+0x84/0xe0 [ 173.622275][T10662] do_mount+0x10a/0x2510 [ 173.626505][T10662] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 173.632137][T10662] ? copy_mount_options+0x5f/0x3c0 [ 173.637242][T10662] ? copy_mount_options+0x308/0x3c0 [ 173.642451][T10662] ksys_mount+0xcc/0x100 [ 173.647127][T10662] __x64_sys_mount+0xbf/0xd0 [ 173.651794][T10662] do_syscall_64+0xf7/0x1c0 [ 173.656297][T10662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.662446][T10662] RIP: 0033:0x45c4aa [ 173.666328][T10662] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 173.686028][T10662] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 173.694424][T10662] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 173.702380][T10662] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 173.710336][T10662] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 173.718287][T10662] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 173.726243][T10662] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 [ 173.746988][T10662] ERROR: Out of memory at tomoyo_realpath_from_path. 20:45:09 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:09 executing program 0 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 173.904452][T10677] FAULT_INJECTION: forcing a failure. [ 173.904452][T10677] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 173.917677][T10677] CPU: 0 PID: 10677 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 173.925566][T10677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.935611][T10677] Call Trace: [ 173.938943][T10677] dump_stack+0x1d8/0x2f8 [ 173.943270][T10677] should_fail+0x555/0x770 [ 173.947690][T10677] should_fail_alloc_page+0x55/0x60 [ 173.952879][T10677] prepare_alloc_pages+0x283/0x460 [ 173.957987][T10677] __alloc_pages_nodemask+0xb2/0x5d0 [ 173.963277][T10677] kmem_getpages+0x4d/0xa00 [ 173.967780][T10677] cache_grow_begin+0x7e/0x2c0 [ 173.972539][T10677] cache_alloc_refill+0x311/0x3f0 [ 173.977553][T10677] ? check_preemption_disabled+0xb7/0x2a0 [ 173.983266][T10677] __kmalloc+0x318/0x340 [ 173.987497][T10677] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 173.993206][T10677] tomoyo_realpath_from_path+0xdc/0x7c0 [ 173.998757][T10677] tomoyo_mount_permission+0x923/0xa30 [ 174.004220][T10677] ? kmem_cache_free+0xd8/0xf0 [ 174.008998][T10677] tomoyo_sb_mount+0x35/0x40 [ 174.013587][T10677] security_sb_mount+0x84/0xe0 [ 174.018368][T10677] do_mount+0x10a/0x2510 [ 174.022604][T10677] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 174.028136][T10677] ? copy_mount_options+0x5f/0x3c0 [ 174.033242][T10677] ? copy_mount_options+0x308/0x3c0 [ 174.038429][T10677] ksys_mount+0xcc/0x100 [ 174.042664][T10677] __x64_sys_mount+0xbf/0xd0 [ 174.047249][T10677] do_syscall_64+0xf7/0x1c0 [ 174.051743][T10677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.057624][T10677] RIP: 0033:0x45c4aa [ 174.061513][T10677] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 174.081123][T10677] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 174.089535][T10677] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 174.097494][T10677] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 20:45:10 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:10 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 174.105454][T10677] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 174.113413][T10677] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 174.121375][T10677] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:10 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:10 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x11}}]}}) 20:45:10 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:10 executing program 0 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:10 executing program 5: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:10 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:10 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 174.375581][T10698] FAULT_INJECTION: forcing a failure. [ 174.375581][T10698] name failslab, interval 1, probability 0, space 0, times 0 [ 174.402741][T10698] CPU: 1 PID: 10698 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 174.410654][T10698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.420704][T10698] Call Trace: [ 174.424079][T10698] dump_stack+0x1d8/0x2f8 [ 174.428411][T10698] should_fail+0x555/0x770 [ 174.432820][T10698] __should_failslab+0x11a/0x160 [ 174.437747][T10698] ? btrfs_mount+0x83/0x18e0 [ 174.442551][T10698] should_failslab+0x9/0x20 [ 174.447044][T10698] __kmalloc_track_caller+0x79/0x340 [ 174.452315][T10698] ? __fs_reclaim_release+0x4/0x20 [ 174.457414][T10698] kstrdup+0x34/0x70 [ 174.461300][T10698] btrfs_mount+0x83/0x18e0 [ 174.465803][T10698] ? check_preemption_disabled+0x47/0x2a0 [ 174.471515][T10698] ? vfs_parse_fs_string+0x13b/0x1a0 [ 174.476785][T10698] ? cap_capable+0x250/0x290 [ 174.481456][T10698] ? safesetid_security_capable+0x89/0xf0 [ 174.487185][T10698] legacy_get_tree+0xf9/0x1a0 [ 174.492373][T10698] ? btrfs_resize_thread_pool+0x290/0x290 [ 174.498083][T10698] vfs_get_tree+0x8b/0x2a0 [ 174.502489][T10698] do_mount+0x16c0/0x2510 [ 174.506808][T10698] ? copy_mount_options+0x308/0x3c0 [ 174.512081][T10698] ksys_mount+0xcc/0x100 [ 174.516312][T10698] __x64_sys_mount+0xbf/0xd0 [ 174.520891][T10698] do_syscall_64+0xf7/0x1c0 [ 174.525385][T10698] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.531262][T10698] RIP: 0033:0x45c4aa [ 174.535141][T10698] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 174.554732][T10698] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 174.563131][T10698] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa 20:45:10 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 174.571089][T10698] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 174.579044][T10698] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 174.587000][T10698] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 174.594956][T10698] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:10 executing program 0 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 174.805936][T10716] FAULT_INJECTION: forcing a failure. [ 174.805936][T10716] name failslab, interval 1, probability 0, space 0, times 0 [ 174.828401][T10716] CPU: 0 PID: 10716 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 174.836308][T10716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.846353][T10716] Call Trace: [ 174.849652][T10716] dump_stack+0x1d8/0x2f8 [ 174.853979][T10716] should_fail+0x555/0x770 [ 174.858392][T10716] __should_failslab+0x11a/0x160 [ 174.863321][T10716] should_failslab+0x9/0x20 [ 174.867817][T10716] kmem_cache_alloc_trace+0x5d/0x2f0 [ 174.873180][T10716] ? alloc_fs_context+0x65/0x640 [ 174.878114][T10716] alloc_fs_context+0x65/0x640 [ 174.882882][T10716] ? kfree+0x194/0x200 [ 174.886944][T10716] fs_context_for_mount+0x24/0x30 [ 174.891965][T10716] vfs_kern_mount+0x2c/0x160 [ 174.896547][T10716] btrfs_mount+0x34f/0x18e0 [ 174.901137][T10716] ? check_preemption_disabled+0x47/0x2a0 [ 174.906853][T10716] ? vfs_parse_fs_string+0x13b/0x1a0 [ 174.912129][T10716] ? cap_capable+0x250/0x290 [ 174.916709][T10716] ? safesetid_security_capable+0x89/0xf0 [ 174.922430][T10716] legacy_get_tree+0xf9/0x1a0 [ 174.927101][T10716] ? btrfs_resize_thread_pool+0x290/0x290 [ 174.932820][T10716] vfs_get_tree+0x8b/0x2a0 [ 174.937226][T10716] do_mount+0x16c0/0x2510 [ 174.941556][T10716] ? copy_mount_options+0x308/0x3c0 [ 174.946745][T10716] ksys_mount+0xcc/0x100 [ 174.950981][T10716] __x64_sys_mount+0xbf/0xd0 [ 174.955566][T10716] do_syscall_64+0xf7/0x1c0 [ 174.960069][T10716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.965948][T10716] RIP: 0033:0x45c4aa [ 174.969836][T10716] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 174.989519][T10716] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 174.997917][T10716] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa 20:45:11 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:11 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}}) [ 175.005879][T10716] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 175.013841][T10716] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 175.021805][T10716] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 175.029788][T10716] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:11 executing program 0 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:11 executing program 5: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 175.246584][T10730] FAULT_INJECTION: forcing a failure. [ 175.246584][T10730] name failslab, interval 1, probability 0, space 0, times 0 [ 175.283756][T10730] CPU: 1 PID: 10730 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 175.291676][T10730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.301728][T10730] Call Trace: [ 175.305015][T10730] dump_stack+0x1d8/0x2f8 [ 175.309346][T10730] should_fail+0x555/0x770 [ 175.313757][T10730] __should_failslab+0x11a/0x160 [ 175.318682][T10730] ? tomoyo_encode2+0x273/0x5a0 [ 175.323523][T10730] should_failslab+0x9/0x20 [ 175.328019][T10730] __kmalloc+0x7a/0x340 [ 175.332171][T10730] tomoyo_encode2+0x273/0x5a0 [ 175.336838][T10730] tomoyo_realpath_from_path+0x769/0x7c0 [ 175.342470][T10730] tomoyo_mount_permission+0x923/0xa30 [ 175.348072][T10730] ? kmem_cache_free+0xd8/0xf0 [ 175.352847][T10730] tomoyo_sb_mount+0x35/0x40 [ 175.357428][T10730] security_sb_mount+0x84/0xe0 [ 175.362180][T10730] do_mount+0x10a/0x2510 [ 175.366495][T10730] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 175.372024][T10730] ? copy_mount_options+0x5f/0x3c0 [ 175.377123][T10730] ? copy_mount_options+0x308/0x3c0 [ 175.382315][T10730] ksys_mount+0xcc/0x100 [ 175.386546][T10730] __x64_sys_mount+0xbf/0xd0 [ 175.391126][T10730] do_syscall_64+0xf7/0x1c0 [ 175.395617][T10730] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.401495][T10730] RIP: 0033:0x45c4aa [ 175.405378][T10730] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 175.424964][T10730] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 175.433361][T10730] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa 20:45:11 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 175.441319][T10730] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 175.449272][T10730] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 175.457263][T10730] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 175.465242][T10730] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:11 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:11 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 175.538708][T10730] ERROR: Out of memory at tomoyo_realpath_from_path. 20:45:11 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:11 executing program 0 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:11 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 175.730039][T10747] FAULT_INJECTION: forcing a failure. [ 175.730039][T10747] name failslab, interval 1, probability 0, space 0, times 0 [ 175.748760][T10747] CPU: 1 PID: 10747 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 175.756683][T10747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.766920][T10747] Call Trace: [ 175.770225][T10747] dump_stack+0x1d8/0x2f8 [ 175.774559][T10747] should_fail+0x555/0x770 [ 175.779068][T10747] __should_failslab+0x11a/0x160 [ 175.784784][T10747] ? vfs_parse_fs_string+0xed/0x1a0 [ 175.790068][T10747] should_failslab+0x9/0x20 [ 175.794569][T10747] __kmalloc_track_caller+0x79/0x340 [ 175.799946][T10747] kmemdup_nul+0x2a/0xa0 [ 175.804191][T10747] vfs_parse_fs_string+0xed/0x1a0 [ 175.809238][T10747] do_mount+0x11b8/0x2510 [ 175.813572][T10747] ? copy_mount_options+0x308/0x3c0 [ 175.818848][T10747] ksys_mount+0xcc/0x100 [ 175.823091][T10747] __x64_sys_mount+0xbf/0xd0 20:45:11 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}, {@dont_measure='dont_measure'}]}}) [ 175.827678][T10747] do_syscall_64+0xf7/0x1c0 [ 175.832181][T10747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.838173][T10747] RIP: 0033:0x45c4aa [ 175.842063][T10747] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 175.861661][T10747] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 175.870597][T10747] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 175.878574][T10747] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 175.878581][T10747] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 175.878587][T10747] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 175.878593][T10747] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:12 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:12 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:12 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f0000000540)) timer_delete(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) 20:45:12 executing program 0 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 176.166330][T10772] FAULT_INJECTION: forcing a failure. [ 176.166330][T10772] name failslab, interval 1, probability 0, space 0, times 0 [ 176.184767][T10772] CPU: 0 PID: 10772 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 176.192683][T10772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.202742][T10772] Call Trace: [ 176.206059][T10772] dump_stack+0x1d8/0x2f8 [ 176.210434][T10772] should_fail+0x555/0x770 [ 176.214858][T10772] __should_failslab+0x11a/0x160 [ 176.219802][T10772] should_failslab+0x9/0x20 [ 176.224309][T10772] kmem_cache_alloc_trace+0x5d/0x2f0 [ 176.229590][T10772] ? btrfs_mount_root+0x1b2/0x1040 [ 176.234705][T10772] btrfs_mount_root+0x1b2/0x1040 [ 176.239649][T10772] ? vfs_parse_fs_string+0x13b/0x1a0 [ 176.244934][T10772] ? rcu_read_lock_sched_held+0x10b/0x170 [ 176.250650][T10772] ? trace_kfree+0xb2/0x110 [ 176.255270][T10772] legacy_get_tree+0xf9/0x1a0 [ 176.259949][T10772] ? btrfs_control_open+0x40/0x40 [ 176.264974][T10772] vfs_get_tree+0x8b/0x2a0 [ 176.272262][T10772] vfs_kern_mount+0xc2/0x160 [ 176.276859][T10772] btrfs_mount+0x34f/0x18e0 [ 176.281366][T10772] ? check_preemption_disabled+0x47/0x2a0 [ 176.287093][T10772] ? vfs_parse_fs_string+0x13b/0x1a0 [ 176.292369][T10772] ? cap_capable+0x250/0x290 [ 176.296957][T10772] ? safesetid_security_capable+0x89/0xf0 [ 176.302674][T10772] legacy_get_tree+0xf9/0x1a0 [ 176.307363][T10772] ? btrfs_resize_thread_pool+0x290/0x290 [ 176.313085][T10772] vfs_get_tree+0x8b/0x2a0 [ 176.317499][T10772] do_mount+0x16c0/0x2510 [ 176.321831][T10772] ? copy_mount_options+0x308/0x3c0 [ 176.327028][T10772] ksys_mount+0xcc/0x100 [ 176.331371][T10772] __x64_sys_mount+0xbf/0xd0 [ 176.335961][T10772] do_syscall_64+0xf7/0x1c0 [ 176.340490][T10772] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.346374][T10772] RIP: 0033:0x45c4aa [ 176.350261][T10772] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 176.369864][T10772] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 176.378266][T10772] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 176.386235][T10772] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 176.394196][T10772] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 176.402185][T10772] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 176.410150][T10772] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) read$char_usb(0xffffffffffffffff, &(0x7f0000000400)=""/215, 0xd7) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) clone(0x5000000, &(0x7f0000000200)="4a0d0a9b317e6723a1f1fa02406df92d4bf304fe512847d032b1979bb2b35ed8186ba0eb351e210e41c1dd36e3b4aa2b70daa484e49a89e7f3387244daa5a217b655cfb07a2c", &(0x7f0000000180), &(0x7f0000000280), 0x0) 20:45:12 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}, {@subj_user={'subj_user', 0x3d, 'discard'}}]}}) 20:45:12 executing program 0 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:12 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 176.624392][T10785] FAULT_INJECTION: forcing a failure. [ 176.624392][T10785] name failslab, interval 1, probability 0, space 0, times 0 20:45:12 executing program 5: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0c0583b, 0x0) r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0x14, 0x13, 0xa797af82610ea335, 0x0, 0x0, {0x0, 0xf0ffff, 0x600}}, 0x14}}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000040)=0x10000000006) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 20:45:12 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 176.705120][T10785] CPU: 1 PID: 10785 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 176.713042][T10785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.723109][T10785] Call Trace: [ 176.726408][T10785] dump_stack+0x1d8/0x2f8 [ 176.730739][T10785] should_fail+0x555/0x770 [ 176.735164][T10785] __should_failslab+0x11a/0x160 [ 176.740104][T10785] should_failslab+0x9/0x20 [ 176.744629][T10785] kmem_cache_alloc_trace+0x5d/0x2f0 [ 176.749921][T10785] ? legacy_init_fs_context+0x51/0xc0 [ 176.755301][T10785] legacy_init_fs_context+0x51/0xc0 [ 176.760501][T10785] alloc_fs_context+0x53a/0x640 [ 176.765444][T10785] fs_context_for_mount+0x24/0x30 [ 176.771255][T10785] vfs_kern_mount+0x2c/0x160 [ 176.775940][T10785] btrfs_mount+0x34f/0x18e0 [ 176.780451][T10785] ? check_preemption_disabled+0x47/0x2a0 [ 176.786171][T10785] ? vfs_parse_fs_string+0x13b/0x1a0 [ 176.791469][T10785] ? cap_capable+0x250/0x290 [ 176.796315][T10785] ? safesetid_security_capable+0x89/0xf0 [ 176.802037][T10785] legacy_get_tree+0xf9/0x1a0 [ 176.806707][T10785] ? btrfs_resize_thread_pool+0x290/0x290 [ 176.812424][T10785] vfs_get_tree+0x8b/0x2a0 [ 176.816836][T10785] do_mount+0x16c0/0x2510 [ 176.821165][T10785] ? copy_mount_options+0x308/0x3c0 [ 176.826357][T10785] ksys_mount+0xcc/0x100 [ 176.830597][T10785] __x64_sys_mount+0xbf/0xd0 [ 176.835182][T10785] do_syscall_64+0xf7/0x1c0 [ 176.839699][T10785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.845588][T10785] RIP: 0033:0x45c4aa [ 176.849481][T10785] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 176.869085][T10785] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 176.877491][T10785] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 176.885453][T10785] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 176.893501][T10785] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 20:45:13 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:13 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 176.901901][T10785] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 176.909862][T10785] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:13 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:13 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:13 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:13 executing program 0 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:13 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") sendmsg$nl_route(r0, &(0x7f0000504000)={0x0, 0x0, &(0x7f0000812ff0)={&(0x7f000047c000)=ANY=[@ANYBLOB="3400000010000900"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000c00010000000068f71d0000"], 0x34}}, 0x0) [ 177.183383][T10816] FAULT_INJECTION: forcing a failure. [ 177.183383][T10816] name failslab, interval 1, probability 0, space 0, times 0 [ 177.201323][T10816] CPU: 1 PID: 10816 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 177.209237][T10816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.219298][T10816] Call Trace: [ 177.222593][T10816] dump_stack+0x1d8/0x2f8 [ 177.227097][T10816] should_fail+0x555/0x770 [ 177.232327][T10816] __should_failslab+0x11a/0x160 [ 177.237262][T10816] ? getname_kernel+0x59/0x2f0 [ 177.242025][T10816] should_failslab+0x9/0x20 [ 177.246521][T10816] kmem_cache_alloc+0x56/0x2e0 [ 177.251322][T10816] getname_kernel+0x59/0x2f0 [ 177.255912][T10816] kern_path+0x1f/0x40 [ 177.259984][T10816] blkdev_get_by_path+0x71/0x270 [ 177.264921][T10816] btrfs_get_bdev_and_sb+0x48/0x280 [ 177.270116][T10816] open_fs_devices+0x14d/0xb40 [ 177.274875][T10816] ? list_sort+0x5fc/0x860 [ 177.279284][T10816] ? btrfs_open_devices+0x1b0/0x1b0 [ 177.284471][T10816] btrfs_open_devices+0x11d/0x1b0 [ 177.289487][T10816] btrfs_mount_root+0x6ef/0x1040 [ 177.294426][T10816] ? trace_kfree+0xb2/0x110 [ 177.298923][T10816] legacy_get_tree+0xf9/0x1a0 [ 177.303584][T10816] ? btrfs_control_open+0x40/0x40 [ 177.308598][T10816] vfs_get_tree+0x8b/0x2a0 [ 177.313016][T10816] vfs_kern_mount+0xc2/0x160 [ 177.317592][T10816] btrfs_mount+0x34f/0x18e0 [ 177.322088][T10816] ? check_preemption_disabled+0x47/0x2a0 [ 177.327801][T10816] ? vfs_parse_fs_string+0x13b/0x1a0 [ 177.333071][T10816] ? cap_capable+0x250/0x290 [ 177.337647][T10816] ? safesetid_security_capable+0x89/0xf0 [ 177.343355][T10816] legacy_get_tree+0xf9/0x1a0 [ 177.348019][T10816] ? btrfs_resize_thread_pool+0x290/0x290 [ 177.353813][T10816] vfs_get_tree+0x8b/0x2a0 [ 177.358220][T10816] do_mount+0x16c0/0x2510 [ 177.362545][T10816] ? copy_mount_options+0x308/0x3c0 [ 177.367729][T10816] ksys_mount+0xcc/0x100 [ 177.371958][T10816] __x64_sys_mount+0xbf/0xd0 [ 177.376538][T10816] do_syscall_64+0xf7/0x1c0 [ 177.381033][T10816] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.386912][T10816] RIP: 0033:0x45c4aa [ 177.390794][T10816] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 177.412130][T10816] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 177.420526][T10816] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa 20:45:13 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@uid_gt={'uid>'}}]}}) 20:45:13 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf540000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:13 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf540000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 177.428573][T10816] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 177.436527][T10816] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 177.444481][T10816] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 177.452436][T10816] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:13 executing program 5: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) 20:45:13 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:13 executing program 0 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:13 executing program 5: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) [ 177.646414][T10839] FAULT_INJECTION: forcing a failure. [ 177.646414][T10839] name failslab, interval 1, probability 0, space 0, times 0 [ 177.677267][T10839] CPU: 1 PID: 10839 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 177.685182][T10839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.695243][T10839] Call Trace: [ 177.698545][T10839] dump_stack+0x1d8/0x2f8 [ 177.702876][T10839] should_fail+0x555/0x770 [ 177.702897][T10839] __should_failslab+0x11a/0x160 [ 177.702913][T10839] should_failslab+0x9/0x20 [ 177.702925][T10839] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 177.702938][T10839] ? __kmalloc_node+0x3c/0x60 [ 177.712274][T10839] ? smack_sb_eat_lsm_opts+0x867/0xa20 [ 177.712292][T10839] __kmalloc_node+0x3c/0x60 [ 177.712307][T10839] kvmalloc_node+0xcc/0x130 [ 177.712321][T10839] btrfs_mount_root+0xe3/0x1040 [ 177.712337][T10839] ? vfs_parse_fs_string+0x13b/0x1a0 [ 177.751728][T10839] ? rcu_read_lock_sched_held+0x10b/0x170 [ 177.757449][T10839] ? trace_kfree+0xb2/0x110 [ 177.761961][T10839] legacy_get_tree+0xf9/0x1a0 [ 177.766639][T10839] ? btrfs_control_open+0x40/0x40 [ 177.771656][T10839] vfs_get_tree+0x8b/0x2a0 [ 177.776078][T10839] vfs_kern_mount+0xc2/0x160 [ 177.780665][T10839] btrfs_mount+0x34f/0x18e0 [ 177.785174][T10839] ? check_preemption_disabled+0x47/0x2a0 [ 177.790897][T10839] ? vfs_parse_fs_string+0x13b/0x1a0 [ 177.796170][T10839] ? cap_capable+0x250/0x290 [ 177.800761][T10839] ? safesetid_security_capable+0x89/0xf0 [ 177.806477][T10839] legacy_get_tree+0xf9/0x1a0 [ 177.811146][T10839] ? btrfs_resize_thread_pool+0x290/0x290 [ 177.817056][T10839] vfs_get_tree+0x8b/0x2a0 [ 177.821474][T10839] do_mount+0x16c0/0x2510 [ 177.825821][T10839] ? copy_mount_options+0x308/0x3c0 [ 177.831034][T10839] ksys_mount+0xcc/0x100 [ 177.835270][T10839] __x64_sys_mount+0xbf/0xd0 [ 177.839870][T10839] do_syscall_64+0xf7/0x1c0 20:45:13 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:13 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 177.844375][T10839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.850268][T10839] RIP: 0033:0x45c4aa [ 177.854159][T10839] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 177.873756][T10839] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 177.873765][T10839] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa 20:45:13 executing program 5: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="e05b0f34"], 0x4}}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xc}], 0x100000000000005a}}], 0x1, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="50e641f10f1c36f2df4a55583a0e1de380918cb2dc35f2d64773efd38714074bb15860136224b7168f60f8816ed37df00817602785e3edc39dd91ccf3a845c82743f0b40", @ANYBLOB="00af028630c8ca6149495efe3ab56a61c57c16f655329cad1f4804d524f7e5", @ANYRESDEC=0x0], 0x0, 0x77}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r0, 0x30) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:45:14 executing program 4: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:14 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 177.873771][T10839] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 177.873776][T10839] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 177.873781][T10839] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 177.873786][T10839] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:14 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}]}}) 20:45:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000), &(0x7f0000000040)=0xc) 20:45:14 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf540000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:14 executing program 0 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:14 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:14 executing program 5: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000080)="07098f29fe3a8de93274054ef49ef0a650c47839", 0x0}, 0x18) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x80800) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f00000004c0)={{0x7fff, 0x9, 0x365, 0x100, 0x401, 0x3ff}, 0x0, 0x4, 0x5, 0x3, 0x0, "65d15942ce6ad32c70646c452e7b397e9c71847aca0966ad184cd3d9576306f1b443f1f0385f0a6de4e7b51aa30fb05f261beb71eb2400e4a0ef81416f0c52bcff1b2faac7df28c6cb35036e2d7ef0410207487adf965d50a798a979e1ec34e333775fd2fae8b322d2d874898219de469ed4584052a2f0778113e8c3da9c33da"}) readlink(0x0, 0x0, 0xa) r2 = socket(0x10, 0x1, 0x5) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="48000000100005070000000000000000000000009dbc6d3be4b79cf7091bc066a3d189e74ad1440c880b296028470d376f660a33bcfdbe4016d5d666c5e66e57471b6718f8738a14254b0f2a2e6bfb5399926ab7", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8, 0x1, 'htb\x00'}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newtfilter={0x3c, 0x2c, 0x701, 0x0, 0x0, {0x0, r6}, [@filter_kind_options=@f_cgroup={{0xc, 0x1, 'cgroup\x00'}, {0x4}}, @TCA_CHAIN={0x8, 0xb, 0x4}]}, 0x3c}}, 0x0) sendmsg(r2, &(0x7f00000007c0)={&(0x7f0000000200)=@xdp={0x2c, 0x4, r6, 0x39}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000580)="e58aca2df4ff1c1ecf00c7793665d13404ee809ba01139fbc0e65481ade1fa569917f72e0655786b88a05652d5d18559502503d7eafe0a495aa17b6849dfe26b3bac701d0d64fc9ae9d32f32bec29705e720725339750dd33a19f27c4ed1fb9bc9ce02552f0999eb0dc19ed7c1fd4daa11ab0122566a69dcb4198d0ee24732978902eeaf985fa3ae55675ddd9803fd82a8620ca7d7ee4330be", 0x99}, {&(0x7f0000000380)="f037f598e390ba0188a9c956cc868315f9563f5706a9da43b0b35a58a3b2e2bd634fb124e8836ecfd521b0eef5a10bee7cb2ba93de8a717880e6554196f89d3f1e990501228abb24478077ae3858e47bf2c665519eb8e459734ac497d2719c83bc0578d3aca7fa68981a558e58", 0x6d}, {&(0x7f00000002c0)="5f454edfd9fdb0950f53c1ef8663f3d3dba7acf1c8bf349fb346bc28e5366b47f59bffa3071b87e726ac44a70600a5cdc00a25da10c9", 0x36}, {&(0x7f0000000640)="f64678d4ff15c3f492bc1438ce992966ed8be1734716b2477d38510546967c44b8a3eeb09e75904eba65643323fae6b1ba5de3c4e5e7399423cf362cf3e74be1b4a13f4de742b316f9bb919de0a02ced3028ca612ab09a875dec1aff7f095faaff0d40a902824d29ea300ef05ca094559688c6c2204e2b55eb2ad371e5ccf65c096f1c4491a30fce92c36712dacc1fd7b563", 0x92}, {&(0x7f0000000700)="9c72b93bbc98b21a11507486baa076676b0f4a6d4faf8e3c178c8dea928a2bc5a64312b6175abf501d40bcf7dae21f462291c93f2d8fab5be2fbaed53acdcc4f09515beeef4682db94ad765f382a85a6cb6414d285bce6cffae1f3fda19bcc493da844b0a765f86c3e19df0ee4724eca7c22b0030cc481f2c9480b2ce14b91784924ba2e2ba29e02fc8e29820c5ae23ac04c1719b23d4086e1368e7eb463d4041f23714911fe7c2a52003b2a26e5841b37bc0b", 0xb3}], 0x5, &(0x7f0000000d80)=[{0xe0, 0xff, 0x1, "4f8c93f865f63d0efead91eacb119e915c6e5c1e62d33a72d243d4b8d3485a9b7ed01e2585fadcf3b1d09def81968761f80f29a3963b7e72072360c5e52436d19f855600294d69018a657e7b64b950ee913575b6be65fabfc1e83fb8b679861dd45c473f05333f493e9f3557405e10aedba099510d1e039994cef3164f7d94010485e07a631512192bb71c5ec3306fd83d85041581cdd1f4531593cba1ce2223e6e9fd1ad3a746a2f442616bacd9f3b0c5306eaa01461eddc6b164a3a5b6e4ea4d382829d7b86c7c5a"}, {0x20, 0x1, 0xa7, "05a04e980be2eb7192bed60e9bf4"}, {0x1010, 0x88, 0x10000, "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"}, {0xf8, 0x10e, 0x7ff, "6f3f97a3fc34a2789a2fe8a40c51ac4d614e0f409324a391e7b26518dff4c71040a84fa0165cbe6388fbcdbece28cbf3ed228971179c2e7cd780795bfedef74965ca4ef91f48339e564c2aeca8de6240df7dd390060dceb099d448062eb0bd590f7af4b84fbd2e53a186dea3effd8718201b7759d705afa9874fb15e4c284d9fee3f74e8cefd759c0cd34582540f35e7e4c97b14f028c27334307fab8fd5bfb7818144bd51bd8e9703504ed5b8a128505c880d44749d0a6b18df4765100aa0cf3750c5c26bed6153acd6869cfa3e5e0c6d31895c856de02580d20b365f253674bc8c40fe81f09727"}, {0xa8, 0x3a, 0x7, "1dcb63f3e1ea12964f07b09da9c70e0be847a0fcdae93b1ebeb8e5a56a4d2cd947168b95411f6e1e8414e4fdd18e4ea3fa1aafa39d7bd5fd1d70b12268d62b7b5b32b0cdeee701dd9a311b538b18a89d83fd12482bcc09a655d52077f7a0964bd40cef33a207d51958d4fa0d58d231fe10621f717366a9e7f61548bb403bd5cddd0d72f79c514130603ce795945ac873a59f56118f"}, {0xd0, 0x119, 0xf01, "72fc9e859b54cf51572d0e2f6d4eeba634853547504d4855839be2876206c8dacdb2a24f96d716f712e9fcff4c06d3ec2d763e86d9da03d02930456cafc7c87b6f890024be5c8fff26f9fafdd75449c8afa61e5bfac673ec50b6aafb61306865dbabf55eb5b50b67a35c1c7df41858beb5193f18400bb7aa5f0a354987162073fd85aa2fc580bf3bf9c3ab09153e9be4e651966cd3e8488b47d83e4f0e0e18a668c64232c8d8948d878af9d1fa2c0f97333a3878db26bb5eaad2"}, {0x30, 0x105, 0x0, "3c493df8d15419703ac633791941dfef69232999681fb1e9b9e4"}, {0xa0, 0x1d7, 0x7fffffff, "3f64b9d15383c3113248ed009d3409d9196b0592dec2ac490e6897bd63515fdf641928605864fbbec84296f2d4e4428e56ca4201a441ca3528e9e56cc9ca3abb6fb14e6fcf1799a5879bb8313956c3de74194fec9f26a5e279820d4bcf7fbee80988d7a4f04ebc6d3208d3f4578565d6dc7b0a313d0d4542ffb17e3e1e7cd445bb3dc350dc40678795d360becebfba"}], 0x1450}, 0x800) r7 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r7, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r7) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="10320300000000000000ccb3a40a6c0408e0bc1eed8ee4178feca6584b0a302625d1a84ab7f3d0223172f087aa52555e2eff070000ec86abfe80233a10c0d3d34739e925192ed1c01dd5d8fbbe36ce90a51ec0e046cdb1c712485877b2357c78"], 0x10) listen(0xffffffffffffffff, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 20:45:14 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 178.428395][T10874] FAULT_INJECTION: forcing a failure. [ 178.428395][T10874] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 178.441616][T10874] CPU: 1 PID: 10874 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 178.441628][T10874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.441633][T10874] Call Trace: [ 178.441649][T10874] dump_stack+0x1d8/0x2f8 [ 178.441664][T10874] should_fail+0x555/0x770 [ 178.441682][T10874] should_fail_alloc_page+0x55/0x60 [ 178.441694][T10874] prepare_alloc_pages+0x283/0x460 [ 178.459630][T10874] __alloc_pages_nodemask+0xb2/0x5d0 [ 178.459653][T10874] kmem_getpages+0x4d/0xa00 [ 178.459666][T10874] cache_grow_begin+0x7e/0x2c0 [ 178.459679][T10874] cache_alloc_refill+0x311/0x3f0 [ 178.459690][T10874] ? check_preemption_disabled+0xb7/0x2a0 [ 178.459705][T10874] kmem_cache_alloc_node_trace+0x2a3/0x2d0 [ 178.459715][T10874] ? __kmalloc_node+0x3c/0x60 [ 178.459728][T10874] ? smack_sb_eat_lsm_opts+0x867/0xa20 [ 178.523091][T10874] __kmalloc_node+0x3c/0x60 [ 178.527600][T10874] kvmalloc_node+0xcc/0x130 [ 178.532110][T10874] btrfs_mount_root+0xe3/0x1040 [ 178.536968][T10874] ? vfs_parse_fs_string+0x13b/0x1a0 [ 178.536980][T10874] ? rcu_read_lock_sched_held+0x10b/0x170 [ 178.536992][T10874] ? trace_kfree+0xb2/0x110 [ 178.537005][T10874] legacy_get_tree+0xf9/0x1a0 [ 178.537017][T10874] ? btrfs_control_open+0x40/0x40 [ 178.548012][T10874] vfs_get_tree+0x8b/0x2a0 [ 178.548028][T10874] vfs_kern_mount+0xc2/0x160 [ 178.548041][T10874] btrfs_mount+0x34f/0x18e0 [ 178.548059][T10874] ? check_preemption_disabled+0x47/0x2a0 [ 178.581503][T10874] ? vfs_parse_fs_string+0x13b/0x1a0 [ 178.584617][T10877] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 178.586780][T10874] ? cap_capable+0x250/0x290 [ 178.586795][T10874] ? safesetid_security_capable+0x89/0xf0 [ 178.586811][T10874] legacy_get_tree+0xf9/0x1a0 [ 178.586821][T10874] ? btrfs_resize_thread_pool+0x290/0x290 [ 178.586835][T10874] vfs_get_tree+0x8b/0x2a0 [ 178.586852][T10874] do_mount+0x16c0/0x2510 [ 178.625559][T10874] ? copy_mount_options+0x308/0x3c0 [ 178.630759][T10874] ksys_mount+0xcc/0x100 [ 178.634999][T10874] __x64_sys_mount+0xbf/0xd0 [ 178.639578][T10874] do_syscall_64+0xf7/0x1c0 [ 178.644065][T10874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.649939][T10874] RIP: 0033:0x45c4aa [ 178.653810][T10874] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 20:45:14 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad430100000000009500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 178.673392][T10874] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 178.681786][T10874] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 178.689739][T10874] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 178.697960][T10874] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 178.705906][T10874] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 178.713858][T10874] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:14 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, 'mask'}}, {@permit_directio='permit_directio'}]}}) [ 178.777870][T10889] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 20:45:14 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad430100000000009500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:14 executing program 4: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:14 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad430100000000009500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:15 executing program 5: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000080)="07098f29fe3a8de93274054ef49ef0a650c47839", 0x0}, 0x18) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x80800) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f00000004c0)={{0x7fff, 0x9, 0x365, 0x100, 0x401, 0x3ff}, 0x0, 0x4, 0x5, 0x3, 0x0, "65d15942ce6ad32c70646c452e7b397e9c71847aca0966ad184cd3d9576306f1b443f1f0385f0a6de4e7b51aa30fb05f261beb71eb2400e4a0ef81416f0c52bcff1b2faac7df28c6cb35036e2d7ef0410207487adf965d50a798a979e1ec34e333775fd2fae8b322d2d874898219de469ed4584052a2f0778113e8c3da9c33da"}) readlink(0x0, 0x0, 0xa) r2 = socket(0x10, 0x1, 0x5) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="48000000100005070000000000000000000000009dbc6d3be4b79cf7091bc066a3d189e74ad1440c880b296028470d376f660a33bcfdbe4016d5d666c5e66e57471b6718f8738a14254b0f2a2e6bfb5399926ab7", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8, 0x1, 'htb\x00'}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newtfilter={0x3c, 0x2c, 0x701, 0x0, 0x0, {0x0, r6}, [@filter_kind_options=@f_cgroup={{0xc, 0x1, 'cgroup\x00'}, {0x4}}, @TCA_CHAIN={0x8, 0xb, 0x4}]}, 0x3c}}, 0x0) sendmsg(r2, &(0x7f00000007c0)={&(0x7f0000000200)=@xdp={0x2c, 0x4, r6, 0x39}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000580)="e58aca2df4ff1c1ecf00c7793665d13404ee809ba01139fbc0e65481ade1fa569917f72e0655786b88a05652d5d18559502503d7eafe0a495aa17b6849dfe26b3bac701d0d64fc9ae9d32f32bec29705e720725339750dd33a19f27c4ed1fb9bc9ce02552f0999eb0dc19ed7c1fd4daa11ab0122566a69dcb4198d0ee24732978902eeaf985fa3ae55675ddd9803fd82a8620ca7d7ee4330be", 0x99}, {&(0x7f0000000380)="f037f598e390ba0188a9c956cc868315f9563f5706a9da43b0b35a58a3b2e2bd634fb124e8836ecfd521b0eef5a10bee7cb2ba93de8a717880e6554196f89d3f1e990501228abb24478077ae3858e47bf2c665519eb8e459734ac497d2719c83bc0578d3aca7fa68981a558e58", 0x6d}, {&(0x7f00000002c0)="5f454edfd9fdb0950f53c1ef8663f3d3dba7acf1c8bf349fb346bc28e5366b47f59bffa3071b87e726ac44a70600a5cdc00a25da10c9", 0x36}, {&(0x7f0000000640)="f64678d4ff15c3f492bc1438ce992966ed8be1734716b2477d38510546967c44b8a3eeb09e75904eba65643323fae6b1ba5de3c4e5e7399423cf362cf3e74be1b4a13f4de742b316f9bb919de0a02ced3028ca612ab09a875dec1aff7f095faaff0d40a902824d29ea300ef05ca094559688c6c2204e2b55eb2ad371e5ccf65c096f1c4491a30fce92c36712dacc1fd7b563", 0x92}, {&(0x7f0000000700)="9c72b93bbc98b21a11507486baa076676b0f4a6d4faf8e3c178c8dea928a2bc5a64312b6175abf501d40bcf7dae21f462291c93f2d8fab5be2fbaed53acdcc4f09515beeef4682db94ad765f382a85a6cb6414d285bce6cffae1f3fda19bcc493da844b0a765f86c3e19df0ee4724eca7c22b0030cc481f2c9480b2ce14b91784924ba2e2ba29e02fc8e29820c5ae23ac04c1719b23d4086e1368e7eb463d4041f23714911fe7c2a52003b2a26e5841b37bc0b", 0xb3}], 0x5, &(0x7f0000000d80)=[{0xe0, 0xff, 0x1, "4f8c93f865f63d0efead91eacb119e915c6e5c1e62d33a72d243d4b8d3485a9b7ed01e2585fadcf3b1d09def81968761f80f29a3963b7e72072360c5e52436d19f855600294d69018a657e7b64b950ee913575b6be65fabfc1e83fb8b679861dd45c473f05333f493e9f3557405e10aedba099510d1e039994cef3164f7d94010485e07a631512192bb71c5ec3306fd83d85041581cdd1f4531593cba1ce2223e6e9fd1ad3a746a2f442616bacd9f3b0c5306eaa01461eddc6b164a3a5b6e4ea4d382829d7b86c7c5a"}, {0x20, 0x1, 0xa7, "05a04e980be2eb7192bed60e9bf4"}, {0x1010, 0x88, 0x10000, "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"}, {0xf8, 0x10e, 0x7ff, "6f3f97a3fc34a2789a2fe8a40c51ac4d614e0f409324a391e7b26518dff4c71040a84fa0165cbe6388fbcdbece28cbf3ed228971179c2e7cd780795bfedef74965ca4ef91f48339e564c2aeca8de6240df7dd390060dceb099d448062eb0bd590f7af4b84fbd2e53a186dea3effd8718201b7759d705afa9874fb15e4c284d9fee3f74e8cefd759c0cd34582540f35e7e4c97b14f028c27334307fab8fd5bfb7818144bd51bd8e9703504ed5b8a128505c880d44749d0a6b18df4765100aa0cf3750c5c26bed6153acd6869cfa3e5e0c6d31895c856de02580d20b365f253674bc8c40fe81f09727"}, {0xa8, 0x3a, 0x7, "1dcb63f3e1ea12964f07b09da9c70e0be847a0fcdae93b1ebeb8e5a56a4d2cd947168b95411f6e1e8414e4fdd18e4ea3fa1aafa39d7bd5fd1d70b12268d62b7b5b32b0cdeee701dd9a311b538b18a89d83fd12482bcc09a655d52077f7a0964bd40cef33a207d51958d4fa0d58d231fe10621f717366a9e7f61548bb403bd5cddd0d72f79c514130603ce795945ac873a59f56118f"}, {0xd0, 0x119, 0xf01, "72fc9e859b54cf51572d0e2f6d4eeba634853547504d4855839be2876206c8dacdb2a24f96d716f712e9fcff4c06d3ec2d763e86d9da03d02930456cafc7c87b6f890024be5c8fff26f9fafdd75449c8afa61e5bfac673ec50b6aafb61306865dbabf55eb5b50b67a35c1c7df41858beb5193f18400bb7aa5f0a354987162073fd85aa2fc580bf3bf9c3ab09153e9be4e651966cd3e8488b47d83e4f0e0e18a668c64232c8d8948d878af9d1fa2c0f97333a3878db26bb5eaad2"}, {0x30, 0x105, 0x0, "3c493df8d15419703ac633791941dfef69232999681fb1e9b9e4"}, {0xa0, 0x1d7, 0x7fffffff, "3f64b9d15383c3113248ed009d3409d9196b0592dec2ac490e6897bd63515fdf641928605864fbbec84296f2d4e4428e56ca4201a441ca3528e9e56cc9ca3abb6fb14e6fcf1799a5879bb8313956c3de74194fec9f26a5e279820d4bcf7fbee80988d7a4f04ebc6d3208d3f4578565d6dc7b0a313d0d4542ffb17e3e1e7cd445bb3dc350dc40678795d360becebfba"}], 0x1450}, 0x800) r7 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r7, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r7) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="10320300000000000000ccb3a40a6c0408e0bc1eed8ee4178feca6584b0a302625d1a84ab7f3d0223172f087aa52555e2eff070000ec86abfe80233a10c0d3d34739e925192ed1c01dd5d8fbbe36ce90a51ec0e046cdb1c712485877b2357c78"], 0x10) listen(0xffffffffffffffff, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 20:45:15 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:15 executing program 0 (fault-call:0 fault-nth:80): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:15 executing program 4: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:15 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 179.091669][T10904] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 179.093077][T10912] FAULT_INJECTION: forcing a failure. [ 179.093077][T10912] name failslab, interval 1, probability 0, space 0, times 0 [ 179.152416][T10912] CPU: 0 PID: 10912 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 179.160333][T10912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.170389][T10912] Call Trace: [ 179.173682][T10912] dump_stack+0x1d8/0x2f8 [ 179.178017][T10912] should_fail+0x555/0x770 [ 179.182440][T10912] __should_failslab+0x11a/0x160 [ 179.187379][T10912] ? getname_kernel+0x59/0x2f0 [ 179.192179][T10912] should_failslab+0x9/0x20 [ 179.196685][T10912] kmem_cache_alloc+0x56/0x2e0 [ 179.201441][T10912] getname_kernel+0x59/0x2f0 [ 179.206018][T10912] kern_path+0x1f/0x40 [ 179.210078][T10912] blkdev_get_by_path+0x71/0x270 [ 179.215021][T10912] btrfs_scan_one_device+0xbd/0x450 [ 179.220206][T10912] ? btrfs_mount_root+0x477/0x1040 [ 179.225302][T10912] ? trace_hardirqs_on+0x74/0x80 [ 179.230243][T10912] btrfs_mount_root+0x4af/0x1040 [ 179.235183][T10912] ? trace_kfree+0xb2/0x110 [ 179.239771][T10912] legacy_get_tree+0xf9/0x1a0 [ 179.244438][T10912] ? btrfs_control_open+0x40/0x40 [ 179.249580][T10912] vfs_get_tree+0x8b/0x2a0 [ 179.254002][T10912] vfs_kern_mount+0xc2/0x160 [ 179.258588][T10912] btrfs_mount+0x34f/0x18e0 [ 179.263089][T10912] ? check_preemption_disabled+0x47/0x2a0 [ 179.268811][T10912] ? vfs_parse_fs_string+0x13b/0x1a0 [ 179.274089][T10912] ? cap_capable+0x250/0x290 [ 179.278678][T10912] ? safesetid_security_capable+0x89/0xf0 [ 179.284397][T10912] legacy_get_tree+0xf9/0x1a0 [ 179.289059][T10912] ? btrfs_resize_thread_pool+0x290/0x290 [ 179.294777][T10912] vfs_get_tree+0x8b/0x2a0 [ 179.299184][T10912] do_mount+0x16c0/0x2510 [ 179.303508][T10912] ? copy_mount_options+0x308/0x3c0 [ 179.308694][T10912] ksys_mount+0xcc/0x100 [ 179.312925][T10912] __x64_sys_mount+0xbf/0xd0 [ 179.317529][T10912] do_syscall_64+0xf7/0x1c0 [ 179.322297][T10912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.328187][T10912] RIP: 0033:0x45c4aa [ 179.332079][T10912] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 179.351680][T10912] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 179.360077][T10912] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 179.368132][T10912] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 179.376087][T10912] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 179.384057][T10912] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 179.392019][T10912] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:15 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:15 executing program 5: socket(0x0, 0x0, 0x0) stat(0x0, 0x0) r0 = gettid() prctl$PR_GET_FPEMU(0x9, 0x0) geteuid() ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, 0x0) sysinfo(&(0x7f0000000040)=""/9) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$perf(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) gettid() clock_getres(0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x1000000000016) 20:45:15 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, 'mask'}}]}}) 20:45:15 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:15 executing program 0 (fault-call:0 fault-nth:81): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 20:45:15 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:15 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000000000950000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 179.647691][T10939] FAULT_INJECTION: forcing a failure. [ 179.647691][T10939] name failslab, interval 1, probability 0, space 0, times 0 [ 179.674731][T10939] CPU: 1 PID: 10939 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 179.682655][T10939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.692708][T10939] Call Trace: [ 179.692735][T10939] dump_stack+0x1d8/0x2f8 [ 179.692752][T10939] should_fail+0x555/0x770 [ 179.692770][T10939] __should_failslab+0x11a/0x160 [ 179.692783][T10939] should_failslab+0x9/0x20 [ 179.692794][T10939] kmem_cache_alloc_trace+0x5d/0x2f0 [ 179.692809][T10939] ? btrfs_alloc_device+0x78/0x580 [ 179.714208][T10939] btrfs_alloc_device+0x78/0x580 [ 179.714221][T10939] ? blkdev_put+0x2c8/0x3b0 [ 179.714240][T10939] close_fs_devices+0x4ae/0x8d0 [ 179.734024][T10939] btrfs_close_devices+0x33/0x130 [ 179.734037][T10939] btrfs_mount_root+0xa9d/0x1040 [ 179.734058][T10939] ? trace_kfree+0xb2/0x110 [ 179.753290][T10939] legacy_get_tree+0xf9/0x1a0 [ 179.757950][T10939] ? btrfs_control_open+0x40/0x40 [ 179.762959][T10939] vfs_get_tree+0x8b/0x2a0 [ 179.767361][T10939] vfs_kern_mount+0xc2/0x160 [ 179.773147][T10939] btrfs_mount+0x34f/0x18e0 [ 179.777631][T10939] ? check_preemption_disabled+0x47/0x2a0 [ 179.783337][T10939] ? vfs_parse_fs_string+0x13b/0x1a0 [ 179.788609][T10939] ? cap_capable+0x250/0x290 [ 179.793257][T10939] ? safesetid_security_capable+0x89/0xf0 [ 179.798953][T10939] legacy_get_tree+0xf9/0x1a0 [ 179.803605][T10939] ? btrfs_resize_thread_pool+0x290/0x290 [ 179.809301][T10939] vfs_get_tree+0x8b/0x2a0 [ 179.813693][T10939] do_mount+0x16c0/0x2510 [ 179.818000][T10939] ? copy_mount_options+0x308/0x3c0 [ 179.823190][T10939] ksys_mount+0xcc/0x100 [ 179.827421][T10939] __x64_sys_mount+0xbf/0xd0 [ 179.831991][T10939] do_syscall_64+0xf7/0x1c0 [ 179.836482][T10939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.842348][T10939] RIP: 0033:0x45c4aa [ 179.846219][T10939] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 179.866059][T10939] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 179.874444][T10939] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 179.882393][T10939] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 179.890341][T10939] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 20:45:15 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1000000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x1f4, 0x0, 0xfffffffffffffed7) 20:45:16 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:16 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000000000950000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 179.898288][T10939] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 179.906319][T10939] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 20:45:16 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 179.994090][T10955] cgroup: fork rejected by pids controller in /syz1 20:45:16 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="240000005a0007031dfffd946fa2830020200a0009000300001d85680c1ba6a20400ff7e", 0x24}], 0x1}, 0x0) 20:45:16 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000fc0)='/dev/adsp#\x00', 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='9p\x00', 0x0, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:45:16 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 180.181956][T10939] ------------[ cut here ]------------ [ 180.187454][T10939] kernel BUG at fs/btrfs/volumes.c:1266! [ 180.221524][T10939] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 180.227720][T10939] CPU: 0 PID: 10939 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 180.235622][T10939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.245686][T10939] RIP: 0010:close_fs_devices+0x8c1/0x8d0 [ 180.251308][T10939] Code: 69 fa fe 48 8b 5d c0 e9 73 ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 7c 87 48 89 df e8 79 69 fa fe e9 7a ff ff ff e8 ff 30 c1 fe <0f> 0b e8 f8 30 c1 fe 0f 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 [ 180.270909][T10939] RSP: 0018:ffff88808cde79a0 EFLAGS: 00010246 [ 180.277224][T10939] RAX: ffffffff82b20171 RBX: ffff88809bc265a8 RCX: 0000000000040000 [ 180.285182][T10939] RDX: ffffc90005f3d000 RSI: 000000000003ffff RDI: 0000000000040000 [ 180.293135][T10939] RBP: ffff88808cde7a30 R08: ffffffff82b2d578 R09: ffffed1015d46b05 [ 180.301089][T10939] R10: ffffed1015d46b05 R11: 0000000000000000 R12: dffffc0000000000 [ 180.309048][T10939] R13: ffff88809bc265b0 R14: ffff88809bc264c0 R15: ffff8880a18b4340 [ 180.317003][T10939] FS: 00007fca6654b700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 180.325921][T10939] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 180.332497][T10939] CR2: 00007f9c5fb4cc90 CR3: 000000009304f000 CR4: 00000000001406f0 [ 180.340455][T10939] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 180.348407][T10939] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 180.356360][T10939] Call Trace: [ 180.359656][T10939] btrfs_close_devices+0x33/0x130 [ 180.364676][T10939] btrfs_mount_root+0xa9d/0x1040 [ 180.369600][T10939] ? trace_kfree+0xb2/0x110 [ 180.374092][T10939] legacy_get_tree+0xf9/0x1a0 [ 180.378752][T10939] ? btrfs_control_open+0x40/0x40 [ 180.383756][T10939] vfs_get_tree+0x8b/0x2a0 [ 180.388158][T10939] vfs_kern_mount+0xc2/0x160 [ 180.392733][T10939] btrfs_mount+0x34f/0x18e0 [ 180.397227][T10939] ? check_preemption_disabled+0x47/0x2a0 [ 180.402949][T10939] ? vfs_parse_fs_string+0x13b/0x1a0 [ 180.409875][T10939] ? cap_capable+0x250/0x290 [ 180.414535][T10939] ? safesetid_security_capable+0x89/0xf0 [ 180.420326][T10939] legacy_get_tree+0xf9/0x1a0 [ 180.424986][T10939] ? btrfs_resize_thread_pool+0x290/0x290 [ 180.430689][T10939] vfs_get_tree+0x8b/0x2a0 [ 180.435088][T10939] do_mount+0x16c0/0x2510 [ 180.439405][T10939] ? copy_mount_options+0x308/0x3c0 [ 180.444586][T10939] ksys_mount+0xcc/0x100 [ 180.448812][T10939] __x64_sys_mount+0xbf/0xd0 [ 180.453386][T10939] do_syscall_64+0xf7/0x1c0 [ 180.457873][T10939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.463749][T10939] RIP: 0033:0x45c4aa [ 180.467713][T10939] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 180.487297][T10939] RSP: 002b:00007fca6654aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 180.495690][T10939] RAX: ffffffffffffffda RBX: 00007fca6654ab40 RCX: 000000000045c4aa [ 180.503643][T10939] RDX: 00007fca6654aae0 RSI: 0000000020000080 RDI: 00007fca6654ab00 [ 180.511609][T10939] RBP: 0000000000000025 R08: 00007fca6654ab40 R09: 00007fca6654aae0 [ 180.519569][T10939] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 20:45:16 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x2c, &(0x7f0000000300)={0x0, 0x45a, 0x10001}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 20:45:16 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 180.527519][T10939] R13: 00000000004c8da4 R14: 00000000004e0200 R15: 0000000000000003 [ 180.535482][T10939] Modules linked in: [ 180.567994][T10939] ---[ end trace 8730ff4f0543bd62 ]--- [ 180.568568][ T3892] kobject: 'loop0' (00000000375820fd): kobject_uevent_env [ 180.573650][T10939] RIP: 0010:close_fs_devices+0x8c1/0x8d0 [ 180.580742][ T3892] kobject: 'loop0' (00000000375820fd): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 180.588956][T10965] kobject: 'loop2' (00000000dc9b7926): kobject_uevent_env [ 180.606280][T10939] Code: 69 fa fe 48 8b 5d c0 e9 73 ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 7c 87 48 89 df e8 79 69 fa fe e9 7a ff ff ff e8 ff 30 c1 fe <0f> 0b e8 f8 30 c1 fe 0f 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 [ 180.629137][T10965] kobject: 'loop2' (00000000dc9b7926): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 180.643866][T10939] RSP: 0018:ffff88808cde79a0 EFLAGS: 00010246 [ 180.651037][T10939] RAX: ffffffff82b20171 RBX: ffff88809bc265a8 RCX: 0000000000040000 [ 180.662386][ T3892] kobject: 'loop4' (000000002d50adde): kobject_uevent_env [ 180.674220][T10939] RDX: ffffc90005f3d000 RSI: 000000000003ffff RDI: 0000000000040000 [ 180.680508][ T3892] kobject: 'loop4' (000000002d50adde): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 180.684806][T10939] RBP: ffff88808cde7a30 R08: ffffffff82b2d578 R09: ffffed1015d46b05 [ 180.714580][T10939] R10: ffffed1015d46b05 R11: 0000000000000000 R12: dffffc0000000000 [ 180.724876][ T3892] kobject: 'loop5' (0000000064395403): kobject_uevent_env [ 180.729484][T10939] R13: ffff88809bc265b0 R14: ffff88809bc264c0 R15: ffff8880a18b4340 [ 180.742446][T10939] FS: 00007fca6654b700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 180.752325][T10939] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 180.765132][ T3892] kobject: 'loop5' (0000000064395403): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 180.767185][T10939] CR2: 0000000000710158 CR3: 000000009304f000 CR4: 00000000001406f0 [ 180.786639][T10939] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 180.795271][T10939] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 180.815941][T10939] Kernel panic - not syncing: Fatal exception [ 180.822764][T10939] Kernel Offset: disabled [ 180.827084][T10939] Rebooting in 86400 seconds..