d44af5c21d49a9b5430b724703f9b0284584796e6735d2f499941d001b756937f67d7860820a0d19f5bc277083e703a13e6ac94e0a3b15881387d5827e04d0e2a10cfa69f161903a77d08500116cbcdf06e262b9cdcd4530ccc7d7804362899fceeb9b2d7ef93637c6fea6380cb38ce90ebba7c48a2a007e45962c2568e8629278617051b2e71e1623c32f0f9d8221869deb990d23e92091d0ddb899ca49ccbb4fec35b7721c35cd81ad331be063d37643c3e5ad0de53f400229b45c002500617cbb598e9513feef5d03a2939e3262959d2ce2eb1e3d33f51350dc7cb9bdea87b638a5a0ce4814f2486c29d883c9c941f11f582d0796f910fc1b4bd54f357b172bffe05a831460abb8274e1225d7d4952a723114ec921513ddb737fb0f03cbf8de953d0af75ece60bd94a82a9e0dfa920dddf647331d8632f05ba8a326a8adc0ccd7ebd76d7ec09d29cd1ed1268e44547f53d0dc993041cebb5cc75ca070665edec30fe71000200e74da2ff7797fdfbae6248caa58c64b5c039149a4fb5bea99fdc0fad07df06f4eb810612abcd0f093963206f98a41f3bb6fa6ae3e37acea4cb42ba3e2d67b403c6c41e427c0dcd94e39dc2223eee1dedb3a42c7805790d21a8efc32003aa2f359785246ff8737aa9a7388a832afa73e4098f02206cb682646ab731a19a562939bc7b23f9ec6ffc733d486d76bdf9c5fae2df7e140a1adc75141662d038668c6e0ee4c75ca3300ff71193be3901dce915ce6024e2de8cd298a8a5c36b8a0c14b49fc5070e6bae29c9ea862bb481a3d00bcc8f5c6bee59e60c3110a039c364926cb5134625fc2e93c80acd1f6f78ba69ce18e76ee692ca09c199f7415ed2642e685da2ea4ca565098abe35832771de3f5baa292db4a6de2b6d6385f850fb565e041192b02cd8cfefc2903c60e040b937983d58d93df2f8db291a0909cf85b1a7b6a8cf5a6c0aaf38cf02f16e570af1cab0c0344c1278a497ca839d50aa11c2518a5dae17bd333e47ae0d535c1bd2b3a2138efa477afe7e9ca23fce4da5b1acebd6204c800c089edefc33244813d02c5f464797f4b09e792ba171f0a3e4988146ae05b6013c2a474230b1527133be9c6a8c80aa3a876f033617c2c72ca79a41bbdee608995ec5f4b63c6b66c4754f5d3b75e99d8cc29a3a46a52d74d0389902e304829f1cd4987afe052e26a370a32305922e79d09b1953e01677f8c2b790bec515509dd8914400036c78bd08902803c56c33c1129b3ce2149774120632ad5ec44b24e4bbc79576775c3b42ea6b82c3c97d09cc1ce287539bfc801ef9d7c82cc30a250f45eba6e73e131e5706d35289de937c75352463010526bb43efef671d02a20e7333c3ba6690463cdc580626867811b372386762f1e7d77a0d0053ead9a88d94951cf347fd87d605603de649c0d8a2d08b306376c733aa3efd52658b9430161a55da60ce6c1e0f4f4422d2c2a66f0a52322e06b52768eb10747274edddc20201b50a230ad9aced505d5a57a21e25c55de8390615585920e3ad186ecb6896f7e11d97792296bd83ed9aeb9e326efdc5d3f0b326ff64f0121b9106ebe73f811486e5d673db294af1ba3631d49489c483857570a71e1698bc023c18929c3cc855213adf7e3966bc0f1dafc687d67d5a80ca7150aa218b82a87cdb7cadc015208e904fe219111b2ba6c99f7e629221fadbf193f5d8b5b0a8c81a6fa5e93780f22c3656c1ea897c9bc35c4e7b51bda668bcdb2c27da91d5c403cc252d435c748a89b4639f112752b48813dafd511d1261e5e66dc30fec1316a1df1f2fb397f18781623af74b02bf96369bad545d674645005a567843155626a19cafee34a52420bcb869ef6144fcd5664e6c8045389fe1510c59200891977bdcabae030bf49de44611dde43194f4449c452bc0f88b2aaede8fd5de25f24e483f74918f841f891cf38bd53cdd6e3195b1749cc4b57851bc11beb17d358711411db8d6eddc164068ba8c2ed446abd4530422d6a157efd7b2a1f2be0d79b8700be973edd86f9ac971dd2fe755f9252f80b0df105c2fd0d5b75ef860eafb6cf131a39f8c571f2157475b69ca2539e8b91d1185130fcded0cfd25fd48e1fedc9e040fd5628118b071e18da196f3cd5119320f46b680a01725e19445d1561674c35f44a70db2c58dd02c96e52c4969f72a3634f8e5e2824d6694f3f6a75f6a5c17d6518a7b8cbb7a79f843738e2a32b9b5ac537df4a604cb1d45e42ef0c152533cc44f734ec07b2ee11d85e6194c67f6297d813cd9945cdcdd30c4d142416b08c89e739997914c8ccb30b9346a469c92105d8773a774522a7e836f35b9ebe1f4c72cb635e701b2934a53cdc6c8e4780f23fea17b133e8fea4c15c6a2c524f99ef4f536b13b357cc086dfa3cf8a37200075f3f9846f7c0ade888f55ddd31e456e1541ac41d5fc435f51ea4e34cee4c624b7e2ebd9d160eb98f5eadcd0ea61435081652f5d9db5ac0aa5522e50ccc71b6588ad21afabfa67960b02bc0ef2311548e3c1aeeab35450c547a471e437ea6731906a18e4257044f778ac1e2aeb04ff1a9ff240a4aecf2a033f92cb5ab891d8e6e7db329ff5dd4a51d326d36f9b68bc188db968889b48028945a6fa57be01e8b517b4d82a609fdd9d90c703e3b929388b1ccb4c906c9d2c5e645ea2ffc89d441a9f0f3a20edf4f892c1cb9b1fbcbd6bf2b8b1ea3751ec19765b3b3bc9251b30deda3d6b22c62c4a42849b5016f6c1861f8b00aa4f8e2f231dce8227a486f6b9ede3913a627223c0977f555f899da0297e48a5789b03e39b83eb8c1b2b0ab07c86f3d6b639169b64951b73990fb1f46bd765d5abb2b7ad773bf1a076fba5210d17a38598060ef5a583cd5744ec6e368f9b7162110f881b852107e8329364eb5644c9a490bf36d335368c969cd2cf335758634409a54b3491ac4ed415d85014edb837b17763b47cbc27005580143cb76e76faf7b095111e8dbc4360c86a5368c9d54a8cf01f194b6f386ad9fcdbadd486bc045c6be5dd361dbdba27bc202d131062b151c43272eeda92e368555a5f32e96bf0f099b5ada96f729b053f2939ef67119f1c3feeed66a736bc4f5a2c9a877e6da319a0b9e3314b2b600a8169636ec7af8d0c4d83d3dafc005e936379e5f1ff828c572ad1f3cea08bd83889b9d02a4239cbd019200f561e0a175ab1c516ecb543b3ba0c9d4ac93ebee8d93a51e43a038fd60740bef14787c341c8433c109eb0020cda36c33b7bc62c537126df139e46f59f7af6808b92ea1db05dc615a1aa497b9675f676ab7a328710cadb6bb795580f3b4f1ddb0636dd87871ba4f04993756f2d671f1519508761792eb65ceb482cf7141ca75c9f78a498ceff6fcaab78a1bd96f967b3737a10a6dcecce34c6051627162d408156222d9659c85297352c3db054f20662f19cf20a25aeb31dec2819c14723809f82e7fb42996e74da91f5f7f4caf7a4cb36efeffceda697183e833c96228b440159c0ceebe263ee3a829be9d47ad99cba110029606ef1833c073a1c9e91b67818d6fc517247735846773c1cfafbb6076b0c18cc79355323e6e047cb8f712edcc2c9850bb35a38e031236a499e907056cede14555655696cda22da8c93a3474cb8f6fc133571b2fab48f3d0c9f9b1805fa641726d5a9cb88c0c62e314d524caf0d02100f4dfab9da8d60236ccdd4d701d5788d62df27fe075a1156ab18f4b56d1e0abee444c8ce0b14936ae39e69352c2f6814a9bc70f192c4b601cd6b5227b8ae96b8a09d3d79cf8d681d5d796b1fc28bb5f7ce6c7a7fa0a2bc12d47561dc65baefbdc4026fb5c2efc54aaf04b8f7c8a1ae00a44ea361d8d8335bdb3271cb16be1696185ad6ea8234fcb53f40e28e612147778e79039e941b5da2fe9b363f1c0fa8eba30cc8b44bd26ee0960d8f2b7c25b2466eec87869c9225de4dbc172ba4f4d1a35f88b89f8fbe6e6eb56ea911d8c00414a07bcddba24", 0x1000, 0x6b}, {&(0x7f00000003c0)="9da24a3e9b8d342cc125d08fade293077a787fb7e0b7cdaeec176d86fa438055082214e306b90afbd7b61f5075ee9f9d630cef817351bbeb773b342c51595f31cf040b4976b2a27e8d168a7f32b789899c0db37c5ef9d1ea2da5073095fb5a7b252325a1a3707447f0f7d53d1489e6428c93fb16818d58722b01c98c878eac8b2937f55881f6fea36217201dc80e17f1b671f3d211602be37f231b3215054582a52a9733e033c7440d51", 0xaa, 0x99}, {&(0x7f0000001500)="547951f483a02ec456e330fc743650de8416635c9479b53539d4ca20dac9af5c8bb8bc2280a88b1dd310fbaff1dbd89084afc512e981dc318b3cbf6dbd4c1a03d3f5fb7ce31aaf4d7f9ed233280c2f082dfbc1634ef79cf84b02798054ac33a83a57ce4ea7cd8a0fecf72e6f02cc919cf6ec641e4070bcc729e771f342e2d0b6691544270e788fad313d421b37ee1f4193107663f29010243b32be464177256962df4455cf275750bef3fe47f94ad064ceab0941c5bbf69fb8b1f4a29cee937dc25a307dd62b05ccfa08055a074381", 0xcf, 0x8001}], 0x20, &(0x7f00000016c0)={[{@fat=@showexec='showexec'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0xfffffffffffffff9}}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffec9}}, {@nodots='nodots'}, {@dots='dots'}, {@dots='dots'}, {@dots='dots'}], [{@euid_lt={'euid<', r0}}]}) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="d5"]) 16:13:28 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:28 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:28 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:28 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:28 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:28 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:28 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:28 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:28 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:28 executing program 1: clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) 16:13:28 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:28 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:28 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:28 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:28 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:29 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:29 executing program 1: creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\'g']) 16:13:29 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:29 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:29 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:29 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:29 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 615.164389][T20219] overlayfs: unrecognized mount option "'g" or missing value 16:13:29 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:29 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:29 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:29 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:29 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:29 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000000)=0x2, 0x4) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) 16:13:29 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:29 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:29 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:29 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:29 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:29 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 615.607533][T20359] overlayfs: unrecognized mount option "o" or missing value 16:13:29 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:29 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:29 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:29 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:29 executing program 1: creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="99d7ad509b1690184bfb1fc2eefd6e1bae0d"]) 16:13:29 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:29 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:29 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:30 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 615.978160][T20491] overlayfs: unrecognized mount option "׭PKn " or missing value 16:13:30 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:30 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:30 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:30 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:30 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:30 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0x100000000, &(0x7f0000000000)="f53cb02e6301a3ba8a9469bb59155fb6877c254b7d"}) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) 16:13:30 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:30 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:30 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 616.288701][T20617] overlayfs: unrecognized mount option "o" or missing value 16:13:30 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:30 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:30 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:30 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:30 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:30 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="db1f4d5c"]) 16:13:30 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:30 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:30 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:30 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:30 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:30 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:30 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:30 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:30 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4a4000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000040)={0x2, 0x0, 0x10001, 0x8}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000080)={0x7, r1}) creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) 16:13:30 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:31 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:31 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:31 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:31 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 617.069141][T20885] overlayfs: unrecognized mount option "o" or missing value 16:13:31 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:31 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:31 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:31 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:31 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:31 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:31 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) 16:13:31 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:31 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:31 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:31 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:31 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:31 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:31 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:31 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:31 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:31 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000000)={0x5, 0x9, 0x9}) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) 16:13:31 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:31 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:31 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:31 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 617.782056][T21155] overlayfs: unrecognized mount option "o" or missing value 16:13:31 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:31 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:32 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:32 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:32 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:32 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="401d12edcdb5ff92cb3a78354a22d78591d52568b428f0ae90366fb3c1768a4d4e15eeeca89056c4cbb5bba04ce1dad0976eb10f0ef97efd4e9435a47841a50999af7e78f75b248b5507d3cbe5b14b3c410a72afb1b7b2d31497ce60455db31eb25339f7c8a5a12125ad5ef283c87561fd177c13358c440034a2b638c21f8edc46fe3bdef6c68c615dc407224876d9edac5c86af901d08e6fa865d9c4889dcd6086804c16ea64c6301248ab1516a7860ef3c150f585f3c94058e28a4c4de40ba0b78fb512bb328dddac8d55bfe5352de4417cd4b737a8533dca8b7f5788f2df2b6236a01"]) execve(&(0x7f0000000000)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000040)='overlay\x00', &(0x7f0000000080)=',\x00', &(0x7f0000000140)='overlay\x00', &(0x7f0000000180)='overlay\x00', &(0x7f00000001c0)='overlay\x00', &(0x7f0000000240)='mime_typebdev^]&\x00', &(0x7f0000000280)='overlay\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='-nodevsecurity(vmnet1GPL!%trusted)\\-GPLkeyring\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='@wlan0$bdev#/selinuxselfGPL\x00', &(0x7f00000003c0)='overlay\x00']) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000440)={0x7, 0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000480)={r1, 0x100}) recvfrom$unix(r0, &(0x7f0000000200)=""/4, 0x4, 0x2000, &(0x7f0000000640)=@abs={0x1, 0x0, 0x4e21}, 0x6e) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000500)={0xffff, "ba4bc67b548298208b3aacbc7004032fb19806729d25b81d6316ed142712bb23", 0x2, 0x1}) 16:13:32 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:32 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:32 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:32 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:32 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 618.173542][T21287] overlayfs: unrecognized mount option "@͵:x5J"ׅ%h(6ovMN쨐V˵LЗn~N5xA ~x[$UK0x0, @multicast2, @multicast1}, &(0x7f000000e900)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000009040)={'vcan0\x00', r1}) sendmmsg(r0, &(0x7f000000a700)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)="85", 0x1}, {&(0x7f0000000140)}, {&(0x7f0000000180)="5b8e92f8592537d32a2641dfb48f1537385aa4b97baaa8b5527b", 0x1a}, {&(0x7f00000001c0)="1332b6b2453b50a11344365ec471c863e74c3eb53390ecaca579a8f132ad7f6f7bfa3ec117fe9b8d24ff168279abd8371fa417522bf1f926e63411f543529151840fcf5f9c4fdf6eb948c7219f9b1d93f10ce96bd9ab2d80dd647e", 0x5b}, {&(0x7f0000000240)="818abafc3b81f0cf94b232f9998c2b887878fcdbfd4dad524f75a9780a83452bdd593dc57aa61c496cf6e6520621aaf7be4bcc418ee933645a7e3d16a9465cde8c63f499b5e3aef17643ce02767b68d76a5743f96b81c084b5a9880551c672a0293e10b2aa036044fda6d3540e8349affb", 0x71}, {&(0x7f00000002c0)="e5fa09315807a7d12be0744340a19f1f484e54328cc9a8d7c9dfc410441dcaa53d9ff1ee6cb8a223f788237574f0647d123ab6bda287be2a6e8876e2d8904a46523173ae3d18178f4f387c2eede23ec0c1ac2e6f2a9c661abbbe79e085dd092bb9ba72dbe93c4886bb4dc8c1afb855a617ecb2dcdb3f3d721d5d7b125e0fd43498f5a931fd6c1ca2e95c4ff551f30eb0e4be13550e48d5e8d3a6eca1312b7031e6d285f7f922f5abab28a415", 0xac}, {&(0x7f0000000500)="8230f8aeb1db3652a6a0eff4aef67ff5008a2e18464868dfd0b4881f39a89b47096de775d8124ddf8b570e83e62d27288d69217a09fc1a6023b19004b76c9414022c8a188a006761fbd106666a73dfbec19b2823d98a873e4871f530a6c77b5ecd40e1ea97427f2d8152a08ee2215a88f5c5b7d981829b1607b04aa098fed867b7d51d128450d9c733eb441f7fd01894d0d5fda28fcb9701b7ed6327a7f5eaa1c5ae7d847ad75a11d154115c0c59a5e371a6dc9c98a5ed6cdf1c41b9cea614d02387484c6a340e741cb1e18fa8753ecd8dde72916c5786e8f2c4995c2b6e71418ae6dd31f9d311b05201adcd1859383f4c65174fff01b4c17dda05546c11ac25aef2fdd120851d220b2e25d37c4dc43fe0d55be9a7d7c26b649be34185007b8fc45f267ef7b402b0a6f253233dcc9aa731754692a358efb15eb44d7f0470e823640f5af10ebb2f13f9afdd197c2f686f124fd9dd6800a9df6c7e163244c4b0a53868b87290cf70da44691beceef294bcedb6744544167f95d6c8ae7f1a4516f43dd974a850c5509e8c8318220aef42d2d33995a1c82dd9de18f95de548bde1ca3fd335429f359eec0f3b37122260a99786bfb8afdc827e2b3db2c8549dadf8c42bbffb0f29614dc536bfe051fdec70ba0ec37836b923d7326ca4d5570498d9bbdfc7952f34f416b0577b3b7c35bbb9b894bc5a8b6e11eaa1008b7ddbbbfb97f801f89486799c68cf7d3c53e6d94a1bd8df6864d9bb5dcea4dd59f6e68234a36b57cc8838c5e7143488c117f6a095d4af27ba09587b63d1a5990242497430db4a8bf0889ca1ec2ed88504a1efb12fe01909369451ea31b1dbbe2253f3be17f8eba00bfe8ab89e524f805b73c528c3bab12f6780febbf8af418fcc895594893a9e2ad42c4c5791f60bede44b94ac416ea45d5e537da56a25744f1d87cf8e9f0445fe5d5220a12f8fd4b01f5fc859287ca26668f70ecc2774e65d056bdeda9dbe76d868aa4ff15baf007ddd41ab76f835ed8ae3997c91c4775575815f7950d553288f2cd5fc8792ea0a1db0c355281c2da991dd6a24fbcbf5ce9ebba2e2711f5d7f671141d563c923bcf511e8893460de099ede952c2b670847ebbff5228cee1b3f6028b5cf0ec9d1ea56bfe89f5cc1023049c95df4904bcf07f8211e436511d65f9604eb022b8c1323a647d05ba2ac7027b0a33f889e55aeabb38b580e005e558f0c0608b5d70853bc09e4f6d0408356d8c0fcf4a5627a09b7eb649df9c5a4537f1155e578b2bda95633e3efc6222f316b137166cfa5474354bf3a6450059565d2b3b74f6138d57e1f232d3603fef70e1795d73aba204a0ffc52c651a38d0acdb50b1edb87de3d01b95079f15ad06f5aac2d4caeef6671f185c82c5c5cf08cec72c6fe8ce941e26204d98ea3696992a7276124ce9e2a607003047b960c1309e66d7dc71f095a9ab7050ad5cec5421ab7e33e1fc01e57e1f4606ebe6685362d250ac999edbe8e792c3f06cc11f20efca82902d85f6ff2e5fc3e8e2c17ed37367de1f8def991e8a7fc2782339d53fe1eca6b1cf0905914152d14af23228c563aa57220442ab92406242ce8077132581c3735f870e0c313a5ad311600ca7805e3eeaea54934ba8c77ae9278035a3d8e9a537a391aad61db84624359762c64f7fd79bd5b9b0d07bcd320c958612a1680e5af6e0948093a93e9b03d417720f41bf7e2af229362f358739a9057c68c7a6747bbfc1c8b1c96808e7e9085dace86e30b0d8580599906815c7cdf6a14c1099e5f3049d01a7c31546656b221605d32086ed8a584b3456fcdba3520236443ef348fac4dd674d5ec31ce81150a76b4a96301918f4ce96fb27a07e2723daf69dc7e6c1ab0ed62167f8306cfa2c1664561c862253855d8d5e601ddef19ee5281400965df0ebf6203f55cde759ae224150e735c9d327c5ec6f32237d1232597ac57ec35434450b57156202d4e10ebdd29fd20735b975dae40ee8de58f03f1ff9f273a07143878023ec5055c7ea7b39746bf4f65faea7f241cd8eeefa7088a29d1cf1068252a609b23ab5d6a7fd354b16f2a74d675bb7512fee042e7a6ba213748617871cfa3ab1738c46e622a86f4f4bf511ebbc6cc520203cf5429e4b27475a1f1b5157620f6e7293f4dc4b03c1acf64c69e0331e301207bb407d28679df58645c2917856d7dbf6d65baddb688e77508d0f90244b86bb1fbb4293387d18efcd08418bdadbfdcfad8d5236c8caa9e990b59696adee1af794c5861e60ba83065cfaff47089865d2376004772e0f395855e944af0d25cd5de6c5e8f14e47f70b1ea58292a3fdc523d7c1ed4179740e18b1de38412400cdd3d7400d04c6c55dcfccf37fac99d5e70bd1d32d389231d2f09ecd75db7e90c177194266c018400db51ea45de19d016da0f7d30ee1c03572cadb52809b5da456f8a5447b2829667dac5e3c847ac0b6d2c55d51185ef19bdbaecb04e44671f74ecdfd1c53c1df4a3894f314dec7235ffe7ff63df53b76d3d29a0d998ee2fd2d2bc04efe5126d8d099e44e5e5ac4e713b2c0b5a0f9eb810c7f1004c7f540bc6a800dfb3c6d8556d0e4e74ef6f18b5fe604388487c42a8c40dab5d82b48f26422d1876005931a04bf7bf60a2aab899b4affb2baba0bfb7982d098e97d81dcc160e39a29344bb7c930457d9759323f63da9d0abca9d2c1129eff5245a4d59bbba8cc5c1eff725b789d4f04b689c4f9fc32d6ff4bcf8069fee2ebb225e98991f01f23646a31f10c3a3126fb149f63c3dc6a86e1b67f105e19c6725f1605da17b4c4c74a103a068bf3f28efd805a25d4cf92afbe0e174740092814403c3043ba243691b6c4362f714f30bbd5913ea55599f98772ba4d722bac4a83acf0f80b3e65cb52303d852cefbbff767fa6fea001359326edfaf4c4f9241e2ba0d6f5abb2209e64d2aeb9df6457231ff3a61c5f124af71bf39a4212902db62020dc50e2bde81506347589ca6275b38834c4e37c90647391442b54e1ee2dc65c7242741adea7db5d077e0b373453178856debc0f0a23993cda7074e2271047b795faa6f9568aea95acc60f4d0b4e2b8ebc6a9720b067a97869e971263b262286efca4d1062e8172a7bb4c1ede12471f938bd2520823a65e16ad46eb91f0b73898ce4693e60f999b87da79f705ea610c1810498a88e1589e89f1bfd7b8ffff21b40cbc89b59e59d76770e1b1c1e1566f7e143bbeced801b426389e17ec1a322314a93071a23f65b7090b5111d8a7bb9ffa2515ed9a83fc37c5a134c66ed253eba51d2379a0db59c8bdc22762cfe6f91ba79dd6b607c78f353b223c718c10032c1eb088a62c11999b5190fee13e1ea565b1345bb28061dd6950c727ac54136584d85de53c669bd9033d0427c8bcaceb7aa9ac09d48f1e25a9c12a877f6b830d2278d2ed3fccb64b3a73816edfa4908052ef69cfc22493c9f231a348a29c94c28e156d7a38994e34930d87f7c9b2aea9218910a65d6bbbdd7d9d535c0bd5773f50ad2b63ef1f1e31e000aaf1016725f50f110d61698a24b86a465177a6082fd95730725da245436d1d6079e8e48f42d4ef6c1ca80b2978ccc8cc2468e750b0101192dcacd5decfcb38faca57aeda8f2da2d45ea06cae68e7d3d271fc57f2750ee1915a83b669e7d071d8c8429d86aefb42c4aac081c69a0554a99f379c6261683e1f6ba111594a30aba17f853386801bc086329bdeffcca910c6f668219b03c6e034c0b50e98dd16016c2819f5a8130bcc7f4848e650c0ce47e3ed50775afd8ea5881907c5f6980573d4acc87ec4deb50c5dda97de637b280a7318a297e17ff28360b577fba0a6e42c3a8a40efcaf8cc45db63a5443fe08748d6c2d515ab8f147046b0525348e871aef57e07d05007efc4be98ec539259b1fe8808f813736ca06e6fbb7df6d239cd1337a646485aeae7c41ddae568a9c0daf4bbf78b4b96f16b42eb11edaf39abeb7484184346f998d0a39c642fb5f8842ee2e541b5e99f91c8c5701af2877c47046fad4c680241548126f1dae50b97c1855a6297a0fa9c86cfaf4f8034761f20726dc48a50f97eb8d1e6525a296fea5aff57e44096724eb9a32f6ab7a33d1d6484b31c180741c857a3c10549ae50919514dca2a1ef87c7fbffb1eaa2c2e8c1a9888c090b4f1f5e541936435ecf0e8c85ce4196101e558ec80bd3bce581c4f0fc17799b72f9e1b587e5a4b7bb67f85c7e0f34f3613694022f7ca5a3c0a00be018e3c54cfe8b92c2970abe1d4f85e1716e9232d97cfd73545d2a6897abd8b90add932580f6e79da3f4bf8fd73e7da28a9b2cffb68049e2dc1d79fd3298137eb7dd54e77bb3c13efa4012f453926f586a172889c7e12418bd39e97dcf00534fd329652f8cd7431d0e95a0dad3d2847cab34b24bc025f270311babb2994f7d2a4e04dfe5d34b7c2f3d71763cccf88c5eeeebe93e922c72a1a98eca63c3ff2f083fb693fa223cef70027b5b788e0a2451a6053856241870fab6d639341b880017376206eda4e43e7536c23dc45baa248883c6fe312b41a7b281c69238a2e5702859bd316fc01b43a4d5a988910557c380909a0dde70039395e47c681a656dca00d5727f7c5d0d57dea80efcfceeeba7f1cbaf5fc7b29d75e590503c92d725157b7a76e167dea1fac251096a87432f8a3c3432e8073d238ec91d96771f454f391e486fc7678af76f14daa9635461d7dc525e3e262aaa51c96cce0fb158a5a5e5b741dcc51d07cfb17520adfea716bb54e6a98428ed3785ebb789ae030f9650c956b67947e9f2076d4d5b19dfc98c7fb826eb28f99add5f961320a8b3624dbaa8c509da5f6d57d5736b39793267c8f3b4288c6e98783bd7258f02cb41cb928091a099aa74e6a38d1bb24e37fd2a0f009497d9bdbc698544dfdbfc06728d45902043a8f534c3bc7c3a256a52ade592cb555b83591515af578e915d78d9f348a995e1e5144d29f777445cec883d6d6413be5b95ea4e211e4c951fdaa8bfe69fb0d4689b543c69d201bdd439a98780f1a634a10148b77777fdf6888a5cdd266cc4f37b384cac837936044350023a2fdbac47969c58a3bbc9c08b7144574e061501e3bd6a4203732835e48b03d8cdcea82a865626d40e9e9a044205d34a159553ef745fc33caaa8e31e228fab493edb4e13f253f2e378fe693cea4a6ad41612619ffe6f044010744e9e9d9153339c07f4bd1313dd3163274f7bee31a523f701671b428751f29d25507ff53424a2a5149e17fd3dd44cf5350c95fd4ccdfaea97798c2be39cb8a38fb401741c4c72423e85d1ef0f2e9134c6f02e1de4b335b670e4c2d49411165337519fc8900db8f067fe6cfb3be61e6b72426771fa3325bc59f6642bf5bd9cd7f3065dc2cbe2186c1b91c339572f9a8668aa79b43e9acce1296562cf8d5f32b77893baa1cb3212eee37e30458415462a1c870ccbe9c0b81c9f9ca5ac1d081bd500c8209f347f40543cf2bcf3ae6cca09b6109e1b74dc406ba4f4bda600cd073bed4094c6940f3dd158c4de2ba992ab43e7cb72e840252269832a88323bc2b94a02f5d850c4f3cd2977e93ef25cad2a6abac6170b6ba0058c42acd97554efa34f6af601f10edea3ca0ebdbc02eb0c7adfd5ab3b367fe327b23b65676eb3b61c35e73c79e25966adc3761731b3170c955280ee4b1495c400d490f82d97f8e98eff8c9b649a575ee69c7e6499eb6003aa8f8e0f762eca5b4e8483e78f0c94e55b040fff5d1ac0323150cc5a8afc04b37a065c38e538bed155a5b2abb207e24d635d42", 0x1000}, {&(0x7f0000000380)="1f9147b174f5babd53e6744767cf214cff440b06378c13112b9962702294cc69b871fe2680b35b014207573df34c5d4079dc3e27f3edc6258f03a834dbb8ce72551d63c15c4b285fa849857fb2ea361d50f1ec643e1db85964f53e2fbd1ed0b6394260514430721ece93667513c3814a941c41d33f79ccfb5d9fb19d93f0aaa20f446dd4356d32309b29fd42e96e3907c459f4391efd311bc528b623c3f4ce", 0x9f}], 0x8, &(0x7f0000001500)=[{0x40, 0x0, 0x2, "1b9f2326c44c2e7cbf251615a0b8571c0aa01f8cdd68c96107c84d0b40752a4db54f088a953f7a55e7039aa6213c53"}, {0xf8, 0x10d, 0x8001, "cde1e1db9010a4fdaae7ba1cc8ca59866d98bc5609bb5eac01853014932b839ac23573822a4e7001c9535448b89536c94fcf6a3aac980697b259b8347204a4874ff74904d5b28a05c79cde2e581ce4df51bfdede4a43500f2822924959b9b7261e55298910df546c0d0d21fe8c26be1bb6bfda00fd126d8b014f63dfcfe26e623c6eaa205bb7c9eaba76f25e00eeeadd8f27ea68673d3463b5cad5707ec5fc6c7b6827a867ae320b1e7e4faf12c8f31333fda364ea827e34cd16012a4cfdfc28dbad716c9eee35dc0ef00531a52d8981937d1be132117873ebb71a57f4a86408714ee2c2"}, {0xb8, 0x10e, 0x5, "b4a1c3602f187ab7ac50f99873e24563a4c09c922db732767b1a44848e7a1f3cc88a0a9884fe16c2cd8a875611947d93e0fc0c9d7a2e0fd6f8067241c68604a48c581b93acc4730ec6b20a592739f0c61c2e212a527af9c9bb0f35610da83cb85994b11c35524e14d410a4c5f9cd2ffbb2a7e1e30439e53a832989cdfa7737fb056bbe086bb887cbf5c4f48b9e55d27281e17c6e9d332268cd34ba8a455a69175cf67f8d"}, {0x28, 0x103, 0x40, "dfb34aeb20967f285cb49b74dd9109fd646b8c21fb7e115c"}, {0x20, 0x10f, 0x3, "5ef052bb7c822217d5b99c"}, {0xd0, 0x19f, 0x0, "eb1550505676d69fa75027e490f4f692c30808f9ed976d755f6511ff8056c87b5a393ceb428b11e6d15f8a2d5b6426e557bdf1671b6361d6dc62bbe4daf66a49e5274cb07d208b20446b2eb319b6e6f34ed4848e53a3a9f59dc4f49739b0f685e3db0a288ecdf2989990bdf979c216504749d37d20f460c3505e7df34ad8d7c0ba87ce0e0b5f543e6192fd10e35eb8d2bb8b7f1696f95438157a9f5a43a0982f2b0efd0e0b627fa02df47cede3d53bf78d47dfe60d68a94b304bd8d7e0bb6f"}], 0x308}}, {{&(0x7f0000001840)=@ipx={0x4, 0x325, 0x5, "4acf815bcd35", 0x2}, 0x80, &(0x7f0000003bc0)=[{&(0x7f00000018c0)="c3c4976fdb63b61b91aa762507223bd88b89b3823a6e37ca79a712967d80358560baebe89ed348d7ccf2c337f14858f3a7796207af504560b42fcf3b904bce2859478dde7877b393daf1c88db9672e88d39ad989ebfe0a7e251acf02ef18dee25bb36dbf1cb4195f89b289d32883c92c4657d52c7d55aba90db4c2860fe62b2f5adf05eedc82fc07b267eba7b76e0a68217d614960cc426fb5f9c9a938b125130fe8bb2c18e0c5b4fd567d15", 0xac}, {&(0x7f0000001980)="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", 0x1000}, {&(0x7f0000002980)="2679321e6690ad244f08dbdcf6c185451d9519ffbb9a27e42b295c319983016b6f80c7212e1829c5811a78d5b99f8edbba30a0a8d8c619970691c0e8c12c824a24f27eb533e2eb1e2b8ee37ea503cf538ff16693c137ea819a1761dd219d3db44c32f7662c0a834e14011992d8a91547d7c42677c611f46f8cbab5eec709882f1fbd5f61c1c25dcf30a7dfbd827e5dc63dfc702498", 0x95}, {&(0x7f0000002a40)="04f9e024d885d900a13302cb7141bacc98af39adce085b65899c244bc7761d4934009e67f9e1f6c8c6313bdbee78228d2bffe6d41648ea6097b9e8e95a2dcf406cf1b85ba21af49cee4aac233808a706b5e2d091db28922756927b1fbc10e75831ee195c33e5d28f9a0951f6f641e25400fa0c023246c8a8ac7542771a8fa921c8c2a80e7c9d8811fbdf086b98eb7240813d47899ea72ae26cef53b5d861b953b61f92c74f6ab11fd0bb051b63a236cecf4e986beaf65e089f453f87ca6a3e285bdc7110b7a37b5041383ee9e415881b606d77d0253eabb09cfb92245e9415dfcce421fb998e1467cafe3e994e", 0xed}, {&(0x7f0000002b40)="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", 0x1000}, {&(0x7f0000003b40)="ed7494d327280d2d54c8976e1ef50df9f852192e94380c4c09dbff60c09303b87d8ea348fbbd40176665fbfb6c8560cee0b4604d5d6281d07a9c5219f7b05c549cfca968937a68d632066a0f302379c788813e0e8609a29697f6d8baa1ef9155d3c38c49", 0x64}], 0x6, &(0x7f0000003c40)=[{0x40, 0x109, 0x9, "9a0069dbde4b881a39e927f94e6ff02c83707c0e4beb28dbe0396e69abe42581a03dc05077e0fdbb07416c15"}, {0xc8, 0x114, 0x2, "01e4240bdc03ca1d8e694cd8e0f0b9011041032b0710fea22223fb8e86acf1ad1f901670c891f56f7523c1a28c69e444b24d330bb82f39048fbbd4cfc18168403cae2c5bffcb2a4d8d6945dbc3b4b37d42bff199d030dd246dbcb247776c51c147f4a1ccad1a3631d165f1cf2c0faa5a78ea235a9436e05e85e6e5365169e7d4e7ff8b4b73b8ca7be4bf9283fb3feaa340590fc618fa720d4c86b99b7c68fea91c2825d42f01aaa501d4304d1ac41d1c883ff1d3f8417912"}, {0x70, 0x0, 0x5731, "2d4a581627ddcf6080cc1d4db8b965aab233e7e068b363d72b2a0a5710dd72100639a041e422a7d4e0dd93b9b0a463e7fb78f2acef48c20af1f4e2284b5a09f261413e1d6d1fb4fa73efce66bbad734d4f697901d47a632868f6f8"}, {0x100, 0x113, 0x5, "1df22117313bd5fa4f1edc8c82ac7b1d264516a1af9d752602c21a6499a69b90e0141bb92dbf94d82e263f2ce390dbcc058d6bf39c12f45fa1de3dee69412cb5ebf052b186f2f3d74c8096901111d6f77d2d865c94a64d292270190f48d8e3d99996a1a98733d7290f0553b114332ac1ba07d5cbfd6c7db08a85f5f44011c1eff5c7514f55fe5c5c824717f7257a66c2a4e2edeb452ab693ba6b67606f1f82e28c0dd8461a59b02ec581bcedde5bcea56b73a97c8a5e641e1f61a51eb848af4867c425888d8b278a7ac529fee9fc96801e513c7458fc90e3aacdf72c9c6c7377c9011877fe84bee250e1ac02"}], 0x278}}, {{&(0x7f0000003ec0)=@nl=@unspec, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f40)="512a5c0d0464db4e2f2e6f7bcd044642816af8626b682255ac3f485d9a006c025a16b534be878870a82d", 0x2a}, {&(0x7f0000003f80)="958e82ac597d686fd712a8f987a67b86f7d3ba11e49fb432f15dbb4dddb3adf6466d03de162067b2dddf118c3dba3c98e1ffd1170963a0dd76060635d37983e612ca0ee1d958e251aa1e9f03adb29b1afee2e6355f3228db2fa03e7e7905846ebb520dbc5e1681bb631a62fdc308676118139649a0280a9c7e48c88a6b35efb38c48632f4d1128f14cc5e55504b934f6f4ad2e19e5fca27d4b38d29ded52a0aa5d4cbde46d2b3619d4b36b3f014ac5d0c3cea5b5b1fcba7b70cf00be2de39ae26e59fd97ee64dbec4609b485a667227be366da236e403e7e2c051958ac42a2630e6003e20b90", 0xe6}, {&(0x7f0000004080)="4bbcb6e39146a6f70e9e525fdc0869a5086439cee71c3d789425b3fe799d30367a345ff0f0264cdb78b6ce06626fc9b1152f15183ba0ef75", 0x38}, {&(0x7f00000040c0)="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", 0x1000}, {&(0x7f00000050c0)="e466a2ccc76bd2b972a0df991e303d045ce420b5029e0a8c0364ce7cdef5c60a0ffa7f0389315ff181067ebdd45dd286a72530f03957d3c3f08fb102057f3cc010fbfa3988fe241c3e2e74e81bc59a652b6d0753bdb01a69f89cc4ff7d482a3ed35fb31ea1f78fc8ed9d2e723ccb021caed025836395a968d99c61b039efd3805baf43d3", 0x84}, {&(0x7f0000005180)="7ac4c6a46a74064d434dd5741726e3ee3860c4b284e074024b81b6b447a4aaf03a736595b4b1efdb367a36ae7cad92bd82bda67473a52595c14d065f0d0e370e93e92a392bc79735214e05db50321b0a5011cfe5a4a06bac525396c71c6321ff1768a061f376884875b9d9e4079b7e5f9226e330fde04706c2c9d309672012af5559e80a4b1ef053e99348ff602db4e01a91c218735fa8fc47e7", 0x9a}], 0x6, &(0x7f00000052c0)}}, {{0x0, 0x0, &(0x7f00000059c0)=[{&(0x7f0000005300)="9c23b34e38e6ebcd60518437f3a0aea8bf188fd64fc2d33b8e997c664712dad8a46439c8db13b12433db6274e60192abb3458a70ce038f0a8d2f2abcf83e5519f6291d3317e04c4d3b79f21c8c07", 0x4e}, {&(0x7f0000005380)}, {&(0x7f00000053c0)="847216be4cec20fb106bda9efbdac502c4f1f71c146070c85cd83e8d95544d64de01a81df387701e5c69d5427fbc730ae7a996b00f529f29ba3e1baa9de1aa57904a7f9d8d257b4f3c540adfb3cff7d895a7552c60affe045dc2a9f814afde1948ba19", 0x63}, {&(0x7f0000005440)="f7d4d4b1b970c244c6338a977c019ad25d9c660cf7cd531452ad7410d2025953b6e6d2ff83ed9665a1f3364f0e84147b8e3c1f16da12faa45111a0f00a82993219ad6fa66ee61c63d5a52407b63fcfe6c5a071e3cbb38511a6c9c2bfc39756e455173a94824246ea518666c5c563b355c94eacee25ec0b4a43404cbf7a53f1fb47342d59a27144d175c8752be7b0bf8fce3449fba32496d51ee33e27dbcc50c5ab510d0d0d480b92dc05ea2c9846ae8544f4be00fb8ba1005901c2d5ecf1559d5e94e49a06b376b01ae7c9096eb071b0378a8854069941fc059d49ba0949ceb0", 0xe0}, {&(0x7f0000005540)="a8db491ddaacac733f1ba420f1bb25b716f06c8fecbeca58f15799ffd041987f21894e6289b62c5c95908dcde4c3e50d34766cf4a2b8c87f0b4d31483f7c4ed7d9718d8205032de3ef47817e06e673698fa5f8603b8a37b484566e9222b39dcf0841143dc13b8732eff6e6d2cc4e23fe8076548bbccf81f7789d7d5c3208c5b7da842ca7fb9aee3f7b98a89ff163b5a96078b240273157483098cecad46778a406d72f382a3a962ae0087ab31eaf284fbf1bbbe5a47a71105caf93d382277c65234a40474a2457c929f43b1dd5fc9ff2bbb5cc619a682bc7bd6726e02aec8b0698d99ff0dac9351574f920cdb811459676", 0xf1}, {&(0x7f0000005640)="0021e9ea5913fbdf9b6d30c9de6efcc35e301d7e950744c3c1cdd536bbf699c8503d311f89fe689140eccc9191b4ec4754ee83bc500e6cfa70989d71bdaf1ea2b0ed942d05b383153d03204ee276f52867ada07215bc5c83e868378cf3840e6e2c5c9478638cd5a7fa5623c8746e59c7571420df0ab0b71d9027105f780155c41cda84424ca5b4c6c9a023d5b7f1389851ef59187479384fb9cf6ed1aea8d840f9a90eff117ef2fb55d835b42d4d0f17e11a67a756b4ad495810868e7f19d1d3893cdb863563a1adcdcc1fcebea6381fba499f79c79c7f7a9823996031d6cf52ee13e7168dc14a2073ec373375fefbb6b220cff18d201b7b", 0xf8}, {&(0x7f0000005740)="7a2c85e5e9331b16f48fc7eb1b14ed3f9e39e88a8c6ec99614d20ad38baed0b62c6c0205d2e2426f44596258096e13dae24304012ba556285db7d0adedd634abcc8c1d55eda056b158a942640959057d37787025cebd97b79e9cb624344cc78c75557cb8f22d05f65a7b5e8b0dcc175ae0673da2e81bd9d0d49308acc6621f0d39b9e0fe4685226d1236a4b0875e29a632e9c664df7b4837", 0x98}, {&(0x7f0000005800)="72998aafad584b24e5db511a6f6566a5c278cc07a748423b2add44278cfd4693fcf8e2c841c55a25ae4ba219cfebfdc446cffdf6df8fcf9357930f106eca7c1b356dfbf0caa0451231f4ee3c41171744f8b1825dda73e55d7ecbecdd5263af35603c83299697ac273e22e70968008a5beaf0e3211d9f515cbd1024ca45f7fc097b09ca3c3cffb9f4cd2e06e0d9f2c465dd56b32b36da77ac4a4ff6390c9938957f2d060e06959810659c94d01ee5c5ddb0d8d9623b44a62b0d30b7d56b2552c90f1c1b9e9cf47c326925efa68211b29895c0a27d916ae3513f16", 0xda}, {&(0x7f0000005900)="8c62c0224cdaa24d16d60106f3264cf859d3fc9aedb22eb09eeda627523508dfbe20a29e201ffc9b64e1076914cd0f763dcd56efb09daafe90cf414c4d88f18c8521c229aae004949acd50aa5639d99ff08a1b3af74f0591b534b4ed065fc3f8da9bb5e2d7f70d5558912558736e9353ba6f31e2ff0e1fc582917eab83e44755b69150", 0x83}], 0x9, &(0x7f0000005a80)=[{0x48, 0x13a, 0x44, "b514b9ddc4e5bb3f203d4fb0bfb437a543006aaf9cb8232f474cff517a5a9eb648d6ea0bfaa5f2138878a659a08e43e076"}, {0x60, 0x107, 0x2, "9a5a83b5f31a3d427b9494c717bc64c2ab06e159595172dc67c98b15414bcdcafaed3de424095a3cd5dc06bed7ef86ba551b8623449159aafd6de9242158928fdceebbc99160b485911ad82dab494eaa"}, {0x58, 0x1, 0x1f, "93c8a8e761880084acf7269d3313d506d526ac84ae12f3f28a3c782920530c87337a527f4c08e3add0f6c13be4fcd76f39c5300aae33f936e29d165c3f4a9532fa7329"}, {0x50, 0x100, 0xf5, "1ff505d3bca6ad2595e2cb6dafbc7711a67659fc9d53adbb5c53c861b9283970c5469be39e01f923f7dd9a147e567e38ea9406e2390d3aae84fb06a239e0"}, {0x50, 0x11f, 0xa92e, "a18a510dd7e602c4b9bd71e587f562d354bf71c52e11eb15b54000d0bbbf391cb0d5eea3d3b7af2125644c06f1d13c7a6e122ec3879c390b91"}, {0x70, 0x0, 0x8, "f6caa935c5b7c9787ebaf9ddd66fc73321aab7381a5b642bc8726ee9cf9f664a1da17f75c17c6733708dda58c3d25da2a268c9744a9e140cb4510fa1c795c291b0463e2cc5cd2f9561aa89b22db9099403a54c9d56c5d50baf"}, {0x78, 0x11f, 0x67deb008, "812f932495cbc7fa2df0bd852f7b088bf5d11d6c5c3d9d0221468809d2e332e37b7b84926818ad4c4652f3c3e2ee2ad8cf7e85fea9654ec206c16f9dd5bc3ef2833f31d5e91a100bb2ecd79b66a531e7d66366d3feb08f388aa5888325d3ab7639ff7990"}, {0xe0, 0x0, 0x5, "491a704fc17a38765302dddb2f63a686e6f21a21a20171d4f2fa74bba9e3f3f4fed1e41983ac35d2a62a0aca52f3cee8385c0b1e65bbb11e996c41ffe8de32ad6b116a07c29b6f5622fb2fe467a9f09bf8acfe864b2762030de1e1dfb1689731263e123a51e634aa36afc56c2e7d0abf18680efaf23633aa21d2986db704151b4b8784b0e7cecd4486630601ecc96ef6e955b2fa6a92975a5f1da06b942a88acadbcd88e02190446f3c704b67184852e16dd918b7a7e1593f970b0d8271bafb6569145d66d06c00a923800"}], 0x368}}, {{&(0x7f0000005e00)=@nfc_llcp={0x27, 0x1, 0x1, 0x4, 0x0, 0x6, "46595aa1e5e64ac4337a606622a0a7d59cf0ce5780aa5b3fcb81d00b1ccbe73fd64910cb9229b4f71ff7d6cca28adbf29e8d73a221cb474587e01612ff3c16", 0x3f}, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000005e80)="8069158a4e6eb2a0aa3ada093326a3022aa2ae716eebc023bd4ed6cfe0f76729824f8eb7fe42abe26cf4127995055139acce420b617fb4e2cf", 0x39}], 0x1, &(0x7f0000005f00)=[{0x28, 0x11f, 0x8, "48de89f4cab71550dc2f13633ae594f17bc86317eccacde4"}, {0xc8, 0x1ff, 0x3, "b825e4ca5b141d2468536136c0aa3a42eb09ec0413e12d65685bddd7a496696c7fe5cf24422392e39b1b45ab568a21f61653e17ce5ecf2f06020337a13263ca6a66adc34ec6de9fac376fa14cf35044878d95a47f643eca17fdeb69ab340874b5f6a16c6cdbe6f32838ffde5729e1215e0897c3e72aefc4c8faf33ffec228f63bf560ba221f8c65451a133404061933411bfa103847a635644d526300036231f36ea156a5fe90fe3cfe888fffeea2b4fc2"}, {0x50, 0x10e, 0x8, "8b40eae43f8c06309a2a11d87844cac72d514588be9c58b9007bf86c5b4ed0b3e05379299d7868a65d168a3ba40dc560f5c9d92313307cc2b2ef725cfb95"}, {0x58, 0x0, 0x4, "499a35de4eccc9da191bc8373b9dec5aa8c1dd765a9b684cca576f18a28aecab823b1243261b7e4c9d0513876a0397ea8aa4e88d511e8419cfc6677deff8d8fb2c6f"}], 0x198}}, {{0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f00000060c0)="2d64badd1a28296f1461c5899e68548c5ad05a3170a1997300850804ced2efbb8325aa62b7f7f8d0e5992da35e49eab09823f756237639319040d3cfb885695350b9c637ed7c5ce92e6c6ddd54b542a4cd61188a8bfb0a2f468c816ef6651d7812c06c8a5ad8090680af48e4c050328477be24f0cd42abfa1d9df988a22558f5037e6189fbb0d2b5bb28b921e7a41acea5baccdeb82be0689fff885c0f7e5b8be7a30bc5ac88ed282dd45f4f0aa4b99714cfa76a835eed39b0e856f29dff", 0xbe}, {&(0x7f0000006180)="0118a2bd8050802240025e609e5b80d85cc6aba430b066f0ae13162329de74ad490b51e7273c54c33b929dcd3f47a26f4c1e5c65f3f762a19ff5c4bd65", 0x3d}, {&(0x7f00000061c0)="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", 0xfe}, {&(0x7f00000062c0)="25416f9670b915911251c0523497177e64e95df6945960fbd8a2bdd48260ba2ca2ab114f278910315516760f109bff5da9338f585d0fdd7248", 0x39}, {&(0x7f0000006300)="80d850abe23543640e018288962c6fba5bb3cb5ec1687a5015b9fd3f118e5d9c6713ee41a7e8159d0337288becf8431bdbd289f812a0ef27477469929251974a526822d9102ba50a771c0d4aebdc503ea36ce578b3533a3c13b3754a2bc82def4205c1f03a580175479e952e3b9e672ae0c31d1a7086297d1c832b8a127967ddded5f11fa2fe1af2d23f87877cf3999272ec6045049bd541cc3ee8613f5c9687bd1e67f307e6aeb4ff42a9d46f397ff1", 0xb0}], 0x5, &(0x7f0000006440)=[{0x10, 0x186, 0x7fffffff}, {0xc8, 0x117, 0x7, "1029d073fa7219763ea3a89f5ccf20a26b83af506b5872983021216aae76b7996359394019555bbc81d746dbc1b517382348783f5483bee50aaf905acbac204b701016fe4d52f0246e0847283bc6b0a1774d5492f1795a17824106bb8a16dbb351301d37a43bcb7d5fb50ab4f6ec5715e56693bb14c3ca641afd7f537bcaa77a027cc485d294ebc3ed1add4f1ce71726e89b211e35449ab05efb2b6dc7ca26c09a0aee711379cacf8fddaeec233c0d00ee0a02eddfe37f"}, {0x28, 0x104, 0x6, "ae4f6d114bda0d8365ccb4a55266ef86048e"}, {0x1010, 0x117, 0x7, "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"}, {0x88, 0x113, 0xff, "f9a7d7630c214f3f7a89e3a92ffee04256ccb5ba3160c0b5850c7bf626e8f9577c184b26a9a34412e5ed1d817013bdd6dcaf81cbe6e487c0a2de39993de7f91050aa8d0f59a7985bad5a6f9c0ecaec6a0f5dc1ea41dfaf231af504ef0de1c6cf091ada2953771e4c0d67fadf7655ad0f7ef0"}, {0x100, 0x13f, 0x28000000000000, "bf17f992589b705aa1160be4592b2889418b91b134793dc9202d6e5c042c78506ea026f6a9af05035190ce35501c590f5a1514536a4826e47478d3e607d3c0e098de2bcf6025fc526010322d04161ddbea0f39f8ac840bc2bddaafc972af805b7d08effc9af1d67edfabb003e2b825a1affea9a12b63eddb1862bfc230ca7ff4cd54fbe1ed37a4824b174243e8ebab2809fdb1bad9e8f2ae2091331eca4f625b615e85cbb5303baf690481341c5494816bbc8754f62e1ed6e4710a5a8fe3968053f03dd4288e914dbf506e5cc26974bd5c44593ff8f266a103e3d5eb0f2142f7fffa8029e457b5ada7"}], 0x1298}}, {{0x0, 0x0, &(0x7f0000007840)=[{&(0x7f0000007700)="975cf856dd56b2dac0e492a4ffda949c23d7de09446adb6c6d106dc50cff78b9888d2f72e029d3307d36df25bcb18fa5950abc6fe98957945f6924ad6819a86b2a49e7cf02783384a98c5eca7c4e350a4be459d54f8abf46db981b2a1e96f975e4402f3f1318176a4e3bef7e1ebcbd0a1449e0295ad011bcfeea369a896bf1141b9209e43a0ab8ed762e65d31ec90c01a1897151472d7c2c2224948dd04a9700e01ad667af81a198d960bb9273915e7bbe0b40ba7c71ff9307e760706e03a2d03223966f315b95e53956733da749b18de7c25920473102858e7f916df4f8772220", 0xe1}, {&(0x7f0000007800)="4ca5f31304466627d169e4b9b337e6", 0xf}], 0x2, &(0x7f0000007880)=[{0x108, 0x113, 0x3ff, "7d0b75764fcc510d29bff52c0da52ef37c4916d84e6970b19c94146fe5bf1b5dc5b617a28251d47cbdbbfbd465a7101535e79f0feef3c09b8c93a00ffd913ec9afffc15ef66a1d646983ffd7bb90c6b738b1e2ae78cde193277cea7811a5cef0261686160434ff44d990a548f5d5e334fc39c198ae88720c6547d4d74ae4474c9fda925dd40ddbdc2b59939fb6e34183bcb9008de90fbc3f06fd9b243a221b5bb79ec5bc905361a19bf87b95a30b7898be46a6c7d47ef3f9ea93e99789af3965ce443866007cc150e29629e21d83fe4e3a12930a223213c5e406771f5f6f533ce66bfb4bab1fde9ef03f539ebe776bef757526fd844a755e"}, {0xb8, 0x102, 0x10001, "01eb62a5f33a2cee63de7fca435602d72ba68b7bbb12abf41280a12699b0049e0c066c405423a6eea3537c3f6f4d038a3f31149e94cd2b17be3ed9646d598f2797015495c37e617eb03140893ec43029a5b6ac17c40e6ee601c19d2722af8f8f3861538dc526cb7bc50daec8a6ce2f5bf1f271a110b19e9ca4c1ae5d70646e19eb6cdf06a8ec8a038567f07a51090ec41bb5696d4500d9c2ac47220e8b6b8bbb78"}, {0xc8, 0x3a, 0xc000, "8ced4f7bd72ef9bcc616118e19efb8c7fd59bedf3fcd2fe968b2a55493c38345f89f0878bd7bac877c2094d3319f91571f4c9ec310a9422bb824402b6111ddae38b328c8d74203327d109e35be5785c5dc24a89e1d24d51aaefc3b6f38d318026b6612007e6a8c53aa9af106afb1eedac63332c08cc4d22e4f523ec40d89e9f3d04bcf0f8bfbbfe5919be71a759db9b45d4f2f324418e5faf5fd81a2f78d9c538191978fd4fd8e9317f09b1f1339064939a6787208"}, {0x10, 0x10b, 0x2}, {0x50, 0x101, 0xffffffff00000001, "6184280b8e5ce6d2dd42c7ee5fcbad72024bd2c49258047e08de2c7a923c8d9a0117a6b92a50ca6dba86d2ced6c8ffb17d3c0dd9473c4d3a3345a2"}], 0x2e8}}, {{&(0x7f0000007b80)=@nfc={0x27, 0x0, 0x0, 0x6}, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c00)="f189960847514c3376be40fc8a9be0635dd75574155499a7051a1bd77815b45b4a57ac36ae7f50af3fc6dd5f6346bcc87b74f4437c2a78ddfbad12b4a9ad5716cc6ba3f92792160e69044585eaa99da25d3ad2668fc2cf4c237c8cb77505fdec006ed15664d352a9d8a66eb2ad184a7054ee1cf6eeee2aecff392f595f8664122fdb5ad37aa8a3346fa506ba95afb93e85f4827df934c737ba817acf1aea57900920654d04eec3cded78171b95ce8841a90ad36e4ae12628d149df8edec4975991e62503f1e15bbb8be36bb0dcb03f1d21809c7f5c74eff8f3bb3dcb41a0e47d5a796f24679d97dd44af00", 0xeb}, {&(0x7f0000007d00)="2f89d7cb859b87d36828ac414e563957ce03c4702d9563268bcda62606d0ba44e2b15a0b7402e74df938be7944a8ec04ecea7221f30bde83999a80c7c762f987a020e606cf6da467c7ee80b9b037a4d146725468c46f1bab2335a312bea1cd99661e1425", 0x64}, {&(0x7f0000007d80)="f4c100771ba99919ae2ce39afd434a230a6e56c8431160e91596550c4d0d94670d157d62fde79a13bef5f9a80816e5ce30f15c690fd86418b7", 0x39}], 0x3, &(0x7f0000007e00)=ANY=[@ANYBLOB="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"], 0x1240}}, {{&(0x7f0000009080)=@hci={0x1f, r2, 0x3}, 0x80, &(0x7f0000009200)=[{&(0x7f0000009100)="b16aac95844b4ec6fc6b27d1b7209fb806", 0x11}, {&(0x7f0000009140)="9c277b23c7b52c8e69af9b29935fe6febb49c750b0874160af911589ab6dd1a45a990c32206ace50a654ba39d7", 0x2d}, {&(0x7f0000009180)="eb353ef0e39b80ab3af91fcc614fe1c6a1cd9fbbc16546a77d116a4b27d703e87bcbfdf4fd5c3f148aab6ad71766f755c0fbb41e135827ad81cd77f57143dfd4fc379c1f11083ba9a8bfc3873b7b1a931728d596e9f9b27dcff4e9b0f539fc4c8a542a40db738dc1e818d418653a22", 0x6f}], 0x3, &(0x7f0000009240)=[{0x98, 0x115, 0x4, "12310f6bad6060b4e8316a3d7a6416af6218992e0275e7162154e29bf5d475e427bab3b977cf972a70921485bf600e440aeaf03e48f7ff1be87f2a1c5e240f470313b490573736adaf25f0366aec9de4f349fc68f6dcdef3d3291cac9fe3858c1763dfe4929967e572167c7e14c26d5dc1950b4e609c0902aef3e0fe4f4f02a6d263f10ad9"}], 0x98}}, {{&(0x7f0000009300)=@llc={0x1a, 0x320, 0x2, 0x7, 0x2, 0xfffffffffffff3f9}, 0x80, &(0x7f000000a680)=[{&(0x7f0000009380)="15f705902487da78474c75f375b7498d425644a8da6636517fbe4c70f2a8b4c5e58cef752fdd6759d0808ffb75e6553ce95e3910968f3260bbaa3887d02ff52e49381a362cc68461498b41ad1ee9056108c14c30479e03e06a7b8999b7de7816f28dd20358bd7eff9ca5445c6fc88489bcd8e0f5bd36269f3e7aa2d155634ff24cfff4adcfe0657dda382b167a85406b04c7", 0x92}, {&(0x7f0000009440)="a5646c6af6b845b315350bd339ad5786dd4b8f630ca60abbebbf4217cad9d83312c7bd42ef48240f00bfc208eb0172ae56885e41002f8a41b179ac4d32cc5e24b305daf4a0b3f15a1c40e31672f8102308751ee09426905077a11feedeac5746336bbbb18cbd28c78a959bf929a93fa640486629a6283cfccdac420e39bfbbbdb3f0891370dfd5d9747292549207ccea3a15c766096ab94297024ed218ac59447f84bc140958a111e5d28a7bda41d59042ca2c7f870c876897d0c3cd04fa7f7dd34495cc95b219b00765d15ffdbea86f5c29ae4a4293f0910c9e73ca10a02b2a063e4c769217873b44c4bc26dbe9e83066dee662", 0xf4}, {&(0x7f0000009540)="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", 0x1000}, {&(0x7f000000a540)="eaf199b0258e66adf41b932c0edbd031590529becee8e66eec11ed1342fb3bca311abf17bd90", 0x26}, {&(0x7f000000a580)="ac3fbe7888f9c2f2724111020ca84b66f3851bd749128584d23ec58a904b1b5060bfc91ebf11d77e531e7e52ab24323a83222311fe73b793f1988931dc247388e415d89972817a660c76e8f1da70251fd619d23018f729226a24fd683ee21f12c553781e8ced49cce6ee8f2503da58ada50638d7f96fa9c56a2bc2ae9031", 0x7e}, {&(0x7f000000a600)="20779b17bf4f569e5b78847365a0ac7bfc4c3cf6ad92ebb300cb5b0d29ba1333cd121127321401f9a34204141b05c652c32f9e55133213667f4721c0fa65a6f91bd3ec3ec000a757a532f71ba4d6", 0x4e}], 0x6}}], 0xa, 0x800) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="aef2614e40653d894f9ac599d06c965a0ba31c55ae19884e9429bdbf321e97ca7bb1b772ccb59ff8d2b580b0e97d2078468a98741ce6ac5c1880a51893fcf08e102725da7774ad6ede19e655a66f8b2c4f0e4d5fd880c0d4ee9349ed30df7392626c0e91c74d975c5aa3a46c58eb67d80ef479f9c3f49e301211117b68"]) 16:13:36 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:36 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:36 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:36 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 622.675580][T22907] overlayfs: unrecognized mount option "aN@e=OřlZ UN)2{r̵ҵ} xFt\'%wtnUo" or missing value 16:13:36 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:36 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:36 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:36 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:36 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:36 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:37 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:37 executing program 1: creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) 16:13:37 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:37 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:37 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:37 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 623.114106][T23044] overlayfs: unrecognized mount option "o" or missing value 16:13:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:37 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:37 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:37 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:37 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:37 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:37 executing program 1: creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="dacfdaeedd6bacf1ae22bdadb5b7b7a3"]) 16:13:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:37 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:37 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:37 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:37 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:37 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 623.583103][T23188] overlayfs: unrecognized mount option "k"" or missing value 16:13:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:37 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:37 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:37 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:37 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000002c0)=@gcm_256={{0xe5d2edfe88efb60f}, "44f8077ceb738299", "5a3b8c5b2c7c61647d276e6deb7edac16dd21af601bb6b42de4d321c36890828", "b234941a", "86de5a0cabb75823"}, 0x38) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80c0400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r2, 0x0, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, r0, 0x0, 0x1, &(0x7f0000000040)='\x00', 0xffffffffffffffff}, 0x30) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) 16:13:37 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:38 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:38 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:38 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:38 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:38 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 624.013720][T23323] overlayfs: unrecognized mount option "o" or missing value 16:13:38 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:38 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:38 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:38 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:38 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:38 executing program 1: socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000140)={0x3, 0x56, 0x1, 0x3, 0x100, 0x8}) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) 16:13:38 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:38 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:38 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:38 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:38 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:38 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:38 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:38 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:38 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:38 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:38 executing program 1: creat(&(0x7f00000000c0)='./bus\x00', 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) 16:13:38 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:38 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:38 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:38 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:38 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 624.836242][T23602] overlayfs: unrecognized mount option "o" or missing value 16:13:38 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:38 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:38 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:39 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:39 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:39 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:39 executing program 1: creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:13:39 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:39 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:39 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:39 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:39 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:39 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:39 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:39 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f0000000140)={0xb2, "b813cc78b6b0a184277ac4ec6ce95e3ee2e2a97da42d79d0f97cab3fd4a3d8030b182c5b4a39c66db2eead69169c1fae01d9150b462a421a398a7ebbe697d02729b733d8a6417d77218991ea749ffc79520acd40698bc6ff475cd96b289d9f32e84cc98e48a60d091a699a9235dd8c6a3bd7edea44d340df3a6349d0152fc52e2bc6e2c794e78db7273734b8261f01b4ad8e9e465c641b412457396aa1f1335e119ff166ea33eaa9d074f1d99bcc5cc99ba9"}) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000000)={0x81, 0x8}) 16:13:39 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:39 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:39 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:39 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 625.489449][T23759] overlayfs: unrecognized mount option "o" or missing value 16:13:39 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:39 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:39 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:39 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:39 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:39 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="6ee2169cbf6d7bf92faed0bfb2a9326ee5e85e3328fb2c2f995e9613f5998184e2c82116313e803aa8e62a69e3a65918280a1b590fd166616fc8f5a20e00810000000000000000"]) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x3, &(0x7f0000000040)=0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x204000, 0x0) 16:13:39 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:39 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:39 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:39 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:39 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 625.851768][T23890] overlayfs: unrecognized mount option "nm{/п2n^3(" or missing value 16:13:40 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:40 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:40 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:40 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:40 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:40 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:40 executing program 1: creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="ea1253e3477ba070b7f0bcad0216f7802f8f816a2b7ffc0a624b11839cd56f363bbc1dd93d9710f228be4776bf872c15afb91e81d1aa404093506dccdcfeb1e9ffac5c97fff2451e3288db21e33e63e106b5a7f0d4c7c04c6feb6c3e"]) 16:13:40 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:40 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:40 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:40 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:40 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:40 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 626.336550][T24033] overlayfs: unrecognized mount option "SG{p/j+ [ 626.336550][T24033] bKo6;=(Gv" or missing value 16:13:40 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:40 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:40 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:40 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:40 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x800003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="769a4fd26c878fbcb9983328b000"]) bind(r0, &(0x7f0000000040)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80) 16:13:40 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:40 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:40 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:40 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:40 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:40 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:40 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:40 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:40 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000040)="2dffcb00128837df1be43465d63f4f30d9de529a9a39512f8fc879ab3ac03ece58ff167b776cced59bdce9296a86f0d9b6bef302d353bceac9464f3a38da68697a686a4a8346731d7b290b893d470c9feebe") mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 16:13:41 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:41 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:41 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:41 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:41 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 627.058016][T24292] overlayfs: unrecognized mount option "o" or missing value 16:13:41 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:41 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:41 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:41 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:41 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:41 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:41 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x0, 0x2, 0x8, 0x7, r1}, &(0x7f0000000140)=0x10) 16:13:41 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:41 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:41 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:41 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:41 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 627.500877][T24430] overlayfs: unrecognized mount option "o" or missing value 16:13:41 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:41 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:41 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:41 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:41 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:41 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) 16:13:41 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:41 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:41 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 627.835773][T24560] overlayfs: unrecognized mount option "o" or missing value 16:13:41 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:42 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:42 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:42 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x85) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) utimes(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000040)={[{0x9, 0x9, 0x101, 0x1, 0x8, 0x1, 0x40, 0xffffffff, 0x6, 0x7a, 0x5c, 0x63ad, 0xf1c1}, {0x8000, 0x3ff, 0x0, 0x4a, 0x7fff, 0x5, 0x0, 0x2, 0xff, 0x2, 0x2, 0xff, 0x7}, {0x4, 0x8, 0x4, 0x1, 0x6, 0x275cb557, 0x8001, 0x1000, 0x0, 0xb9, 0x7ff, 0x4, 0x81}], 0x1}) r1 = msgget$private(0x0, 0x410) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000240)=""/183) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) 16:13:42 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:42 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:42 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:42 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:42 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 628.186258][T24692] overlayfs: unrecognized mount option "o" or missing value 16:13:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:42 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:42 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:42 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x4000000200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000000)) lseek(r0, 0x0, 0x3) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f00000001c0)={0x7, 0x4, 0x1000, 0x20, &(0x7f0000000500)=[{}, {}, {}, {}]}) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="4f39a39139ea6043ecc92574839c5b38f3c5b4124769c2020392dcb65ecb129ebc22f54c05cba1995819198cccffc294b79f72028f381dd95d10fc69a751a8481747383d56e027358bb27b357e9768a4370b616e0368727729426f841529f134bf7ccd2e5f9d7dfb5e983797db"]) 16:13:42 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:42 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:42 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:42 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:42 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:42 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:42 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:42 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:42 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:42 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:42 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x3, 0x4) syz_init_net_socket$llc(0x1a, 0x0, 0x0) 16:13:42 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:43 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:43 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:43 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 629.058722][T24964] overlayfs: unrecognized mount option "o" or missing value 16:13:43 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:43 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:43 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:43 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:43 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:43 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='numa_maps\x00') sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="e38ef68019a42fceed22", 0xa}], 0x1, &(0x7f0000000240)=[{0xf0, 0x103, 0x1f, "a788b67fe6daa685fe045d15c3009683ff22740f3d880a4aa49129c1b67065e377f047fc69faa88819776a7c8a5f4c60aa63e094736554b83627bd204dada1a765884aa3e346b656cca98539a5ee67806b90347b3f65bb1a0da09d4083b65407bf9903eac95ac8cd19d2af1bc86856eb8a90144df932322b804403a7bde9fc09f97d5e9c82fa413f88ccaf387376908115a7fa776806b2f6027eee479d4bc66caabe65fc681887be4e30896e2a71b77be2a418f40ef13d4bd53a0efb99c41a368d0f29a6c37d9b9a05d53f869823548bdd616a7755be3d55f17909b687bc"}, {0x30, 0x106, 0x7fff, "c3a58fc3fcc1dc68f12d321fa44dcf581cf59d408b06e0e8fbadf0e427"}], 0x120}, 0x50) creat(&(0x7f0000000040)='./bus/file0\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00']) 16:13:43 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:43 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:43 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:43 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:43 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:43 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:43 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:43 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:43 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) sendmsg$kcm(r0, &(0x7f0000002bc0)={&(0x7f00000001c0)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000240)="da003b3c8401cad9c21e6a387fb9e0ff2f2b6f3dc21d5287ec78560b5276b948956d6789ce6e3a7d09b2bd2711545eb5da609c37092f183b029fae1720eabfd1bb79b08351eb146cded1a1ba90755d3907b003dfc699f621d9589e9d6a218466c8ad96c15b5241982ba4140d416a577d6cb7ef39002db9b2636dc611dd810fffae17ffa3fcdf2f5a9da7f86ae165feb3cb661aa5c926cbea35c3707276b85fcbc23837cfbbb1b23a1983a83956ef238ea34fcefbc65b2a8564eeb2251d327d04d34cef3e5a8bdbc75198ab9b3e84eba098ce7629bb019ce04a82698ae2e3ae3a8b6d3b", 0xe3}, {&(0x7f0000000340)="69bd8315aac9afab5121787e3ea683020386d59bbcf4bd6f21022f1b584c1630ed19fec48cc23944e9b58a60ff409999c5ca70461d8dad8ff6690a7ad0006684d3c3ecd0ef46524fdfb3f11d87def44af89aca695d2107a6c7c4099297c4f52a7cc5dcaa043762c3cd0587114659088a9002d45e3c31ef0bb4c2f522bea47d071dac75e01838a055eadf2f96c66871761aaaef172ea5218e648ab09838", 0x9d}, {&(0x7f0000000400)="eba3ae6d66447079040940eea0cc523552a6ea1ebd9f6558ce0465c268999410c417b0a16d2fd772207752818767592adb24f195664d524afd14cbee25090ac2f4ef9f9a7bc14fc3f6fba06e51c57ee124ff1cdd750d06b5d9aadeeebff032728958794d5a9028eedf0574cc7287431443f98080d78631a0d983401ccc0efe9ff7a1c760a29cddb91c12e7564d49b7b0e44eb20a6f330d847b6f0132753661d00c99c770716e58", 0xa7}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="ef19ff3473aec4605428cee6c7d8100a73de1a67ff6c1c598469d757cf2fb061ea41b7f2ab36488b8042b4beaaa7a7230a60aac01028ebc4591ec31ad33e43715e257ba5fe9fe7e8b68697f66a1b294ee189954ef9074603373486a4dcfdd2762aeac0589133197baa77d98fd2079ed21efd200f20ee27f62a12134132ae09d147895b3ee82e84ffd94af65cd01c183b2c0bacf38bb1972b726616a3d92fe157c7d067b261b8403c088abc8ebf63873255b4be234f9d9332fe460ae8141cb114c71ec2a2eaf76503c47eaa8e66483476a19f33b5e325878be106d2bb958cfe7aa1ff79a55db65f68701f999d", 0xec}, {&(0x7f0000001600)="87711a413f3128ac62cf32e5295a98f181f8eedbd0e27dc72bc430dc74c52bbbab08e885420b6e01e24f25bd071c56a7697d7a34fe3656ee2a46bb9092737c57f12fb262eded2809002049a9249cfd3ecc428a5682b4b7c164a35178e9b6a8877f95cffffd85eb7a9947f2cb923961feaea746", 0x73}, {&(0x7f0000001680)="b5820e9dfb879871bf8aeee12b43eacef2b5b1fc47c6b22e3da3423054aa2acfe6e7506a8919e2fd6b954bcd0d7bfba69c18141486f7500a64e9bb30fc8c", 0x3e}, {&(0x7f00000016c0)="3cdf4ec1db0f01a88428a163e648d853d3252434dc3294644597c8a8c520900749943bc8a889fc8fea5b0c4b89b422595ff42ef7bf1ebbbbebaa5c031a6cf4453e970b9da25a99b63f1af8dc5466abe01000d4eb87a7859333a04f", 0x5b}, {&(0x7f0000001740)="bc2e9b5d8b7ebfe83972a8e32bc26750a98401d1ac5c32a1583faff51d0ef241735f571a95acec9e4ee919cf24e081e5dc720a24264b66ef46f26e7f648decb43c872326a8ec21257382", 0x4a}], 0x9, &(0x7f0000001880)=[{0xb0, 0x108, 0xffff, "55df947798940373ac494bcfc216d9936a496c718dc1ae634c5b0e0677745257c82221742f981def21167e36f3b105715ad660aea3da15ba53bbab406f2ea4ed2041ddf47048b37a9b8e85ce9bab7c626c34b3ca44c54b866c935f7414d566b80cd41faf1361bc787bf1ce7d9cfdc4ae3a32376394e8b7e50fb8fd73a64f0adb38066032e5688a71e2a659383f2454903ad3f718b509f7a51e8b70b1"}, {0x100, 0x0, 0x6, "608eb51feb1d198b9179470a0dc589540dd51fe8506099a39566d305ea867001ed6552480f88c64f57eb98e98db6509450c4d667fbeb38206767812a4d64bbcf9e86de9c3bda7b43bfe8bf0db97ae09aa5cc1edde8e9f3588e167cbe64037d30bf863af00687044c68357fc8108b9c5f1ed70ee1ae2c9af57f1ef5e911b3e9ecc2c0e4b93b8555c20807c6d42014502792860b182a179e809dd6a26e98a2a338f95dca72141f4e91e7175a95a7c072c3704638651628ccc1673eb6c36ae35a10a7a5893beea2fd6f9c6dd87796c200da564c8b6b31a2cac463b0f2ecdd7567b83f1387ccf60968fdc031"}, {0x1010, 0x115, 0x40, "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"}, {0x110, 0x10e, 0x1, "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"}, {0x50, 0x1ff, 0x8, "fec393f8ca76cdb1acb6d1f63dc703a3490e116f7b3a2ce78de9732bfb23fe5eab9340730e40645fa221ad331bd355e5ea17fda882686426bbf08547"}], 0x1320}, 0x10) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockname$packet(r0, &(0x7f0000002c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002c40)=0x14) connect$packet(r0, &(0x7f0000002c80)={0x11, 0xd, r1, 0x1, 0x7, 0x6, @local}, 0x14) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000040)='overlay\x00', 0x10000, &(0x7f0000000000)=ANY=[@ANYRESHEX=r0]) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() chown(&(0x7f0000000080)='./bus\x00', r2, r3) 16:13:43 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:43 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:43 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:43 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 629.712254][T25226] overlayfs: unrecognized mount option "0x0000000000000003" or missing value 16:13:43 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:43 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:43 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:43 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:43 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) clone(0x480000000003fffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="01"]) setxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000140)=@v2={0x3, 0x1, 0x8, 0x7, 0x67, "05a6296db2e9d2839acb2c1fd4e1c642397db21fbf9a08c9d8d91c3ce83e65693d11d5ad0a30a902e0fe12dddb75ae013d8d71c9ade6dc3360086f93ff3180173f0c18932a55137648cfd2d99ad59a5ce7656f3cca03cca25b2d7baaa4b1a5d57e576fc75af72c"}, 0x71, 0x1) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000240)=""/240) 16:13:43 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:44 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:44 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:44 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:44 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 630.084026][T25357] overlayfs: unrecognized mount option "" or missing value 16:13:44 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:44 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:44 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:44 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:44 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:44 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:44 executing program 1: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)={0x3, 0x0, [{0x0, 0x1000, &(0x7f0000000500)=""/4096}, {0x103000, 0xc1, &(0x7f0000000240)=""/193}, {0x6000, 0xc4, &(0x7f0000000340)=""/196}]}) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) 16:13:44 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:44 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:44 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:44 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:44 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:44 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 630.541164][T25491] overlayfs: unrecognized mount option "o" or missing value 16:13:44 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:44 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:44 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:44 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:44 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:44 executing program 1: creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) 16:13:44 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:44 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:44 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:45 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 630.951427][T25628] overlayfs: unrecognized mount option "o" or missing value 16:13:45 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:45 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:45 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:45 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:45 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:45 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, @broadcast}]}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) utime(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)={0x4, 0xffffffffffffa8cf}) 16:13:45 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:45 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:45 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:45 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:45 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 631.334247][T25761] overlayfs: unrecognized mount option "o" or missing value 16:13:45 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:45 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:45 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:45 executing program 1: symlink(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)='./bus\x00') prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0x1f) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x2200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="d9003ea394e30f1937e94ea9f7ceb6fd342b5ff078ecdd5ee578fc4ed511fe99feb516348586b0e0302f600bf4c89ef84d3e8f91347cd6f24d7f7e57428ec639fba4c0d1083de88f249fcbec762f57ee0e2f476efa6a30645f32adfa8f98a825edbe04eaad8b586fd527fc3e170343743ace02b706f0e830cf8ddf8c451bbf30eb17c066034b2e81f817ea39edfcee035a86cb564ee97ef2dd3f363a6dd91f27f82e1f4958f68100"/178]) chdir(&(0x7f0000000000)='./bus/file0\x00') ioctl$NBD_CLEAR_SOCK(r0, 0xab04) 16:13:45 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:45 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:45 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:45 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:45 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:45 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:45 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:45 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:45 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:45 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000000)='./bus\x00', 0x10) write$binfmt_misc(r0, &(0x7f0000000040)={'syz1', "127b38054f26cdf82e104e84bcacfa06"}, 0x14) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='m']) 16:13:46 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:46 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:46 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:46 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:46 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 632.084236][T26023] overlayfs: unrecognized mount option "m" or missing value 16:13:46 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:46 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:46 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:46 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:46 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000340)=""/245, &(0x7f0000000000)=0xfffffffffffffffd) creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) 16:13:46 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:46 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:46 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:46 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:46 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:46 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 632.481987][T26157] overlayfs: unrecognized mount option "o" or missing value 16:13:46 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:46 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:46 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)={{0x1ff, 0x4}, {0x80000001, 0x1}, 0x0, 0x2, 0x6}) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) 16:13:46 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:46 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:46 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:46 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:46 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:46 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:47 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:47 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:47 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:47 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:47 executing program 1: creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x80c000002, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) 16:13:47 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:47 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:47 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:47 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:47 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:47 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:47 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:47 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:47 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:47 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:47 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x800000000000000) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000080)=0x8) clone(0x25fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYPTR64=&(0x7f0000000500)=ANY=[@ANYRESHEX, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYPTR64, @ANYBLOB="e4f9507b81e3465c54d63f9e31871a4f25fdd871cb1c31216b70a969b7e45e8022880f6e127b0b994fb50f1b14695db747d8081d3bbae02666ded1bc7cc7673a50c61c21a44f46e4f2215d7cff5b58bf92a36ac9113285f006356b789c622501c6d66ef6b922aa6f1f2aa05c3e8f50927583f530c05d1c56663fe6d6a2c591b4450a4ad5618b8fd4815b17f47af90142a879884a5af30f", @ANYRESDEC=r0, @ANYRESDEC=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRES16=r0, @ANYRES16=r0, @ANYPTR], @ANYPTR64, @ANYRESOCT=r0, @ANYRESOCT, @ANYBLOB="210fcb32d857a805396912a478d9a24488f5ae24e337d232034cdc9cb52aaf3261b511384eeee8833ff24c36a9d7c8fafaf9238a918992bb0da1c6dffdd8d54dfb5ee6438ccc345ff1edcec8007c1c89daa8664c79bd5d9f06c90ca64af5737e51ae137d454731674c628c5b889dc94813599526e527456f2c6c0b07825b12e8ddbe1feeaa68b84b963b6a5237e22e62699753b456f0a06d954d6b639fdcd06c2ccc9891f6a0c6a6c0df0a47fe29f4d33c29e64b0e5133bceb572ff0820c877fa3c308b2dcba640aaf35de505864190afb55b0000390677cac77aa921c0a2b99b8a9ecc1830c6bb23569d086b4c33975ce38a75b34e2", @ANYPTR=&(0x7f0000000680)=ANY=[@ANYBLOB="78af0b87a41421001a06004fd3483d5295161a4601db316c69ca1cd7de148adf95cbc729566095043cae0e35c2329c2f71a051b64b825a7b58bf24014145624f85dd3efeacf146f0dd5c2332b908ecb5d1c03cd2bc2da56bc49cd60fc21f18523313df13c63cf3827f64673412071b5a8dd2f6127d98b795d4f6c6486551e9fba2c157867793abb1c1cd554c13b6addf9d4850ca272b339c42f54bee40faf614d079125bba12d5989c4cf543d5ec9deaba2cf66a04", @ANYRES32, @ANYRESHEX=r0, @ANYPTR, @ANYBLOB="5b4c98f8c619ea8271fa724459dfc3cf58abe0436cd4d47e1d706c4036aaea02e34a5c2590bce0", @ANYRESOCT=r0, @ANYRES16=r0, @ANYRES16=r0]]]) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000040)=""/5) 16:13:47 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:47 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:47 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 633.567270][T26552] overlayfs: missing 'lowerdir' 16:13:47 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:47 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:47 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:47 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:47 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:47 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:47 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:47 executing program 1: creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) 16:13:47 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:47 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:47 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:47 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:48 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:48 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:48 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:48 executing program 1: creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getitimer(0x2, &(0x7f0000000000)) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) 16:13:48 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:48 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:48 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:48 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:48 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 634.235612][T26812] overlayfs: unrecognized mount option "o" or missing value 16:13:48 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:48 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:48 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:48 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:48 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000000)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000080)='./bus\x00', 0x0, 0x8}, 0x10) 16:13:48 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:48 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:48 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:48 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 634.565038][T26940] overlayfs: unrecognized mount option "o" or missing value 16:13:48 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:48 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:48 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:48 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+'}, 0x28, 0x3) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f0000000040)='./bus\x00', &(0x7f0000000000)='overlay\x00', 0x4, &(0x7f0000000100)=ANY=[]) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000080)=0x4) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000140)={{0x3f, @multicast1, 0x80000001, 0x1, 'wlc\x00', 0x20, 0xffffffffffffffc1, 0x64}, {@loopback, 0x4e20, 0x2, 0x9, 0x0, 0x1}}, 0x44) 16:13:48 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:48 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:48 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:48 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:48 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:48 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 634.921320][T27072] overlayfs: unrecognized mount option "./file0" or missing value 16:13:49 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:49 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:49 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:49 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:49 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:49 executing program 1: creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='o']) modify_ldt$write2(0x11, &(0x7f0000000000)={0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x5, 0x2, 0x5, 0x7, 0x10001, 0x200}, 0x10) 16:13:49 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:49 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:49 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:49 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:49 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:49 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 635.318323][T27211] overlayfs: unrecognized mount option "o" or missing value 16:13:49 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:49 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:49 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:49 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:49 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) clone(0x21fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="6f7eae3e1b9b2502af08e5d023f8991c5f9626370b6a8d41e63c"]) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./bus\x00', 0x6, 0x2) 16:13:49 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:49 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:49 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:49 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:49 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:49 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:49 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:49 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:49 executing program 1: 16:13:49 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:49 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:49 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:49 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:50 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:50 executing program 1: 16:13:50 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:50 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:50 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:50 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:50 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:50 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:50 executing program 1: 16:13:50 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:50 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:50 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:50 executing program 1: socket$isdn_base(0x22, 0x3, 0x0) syz_open_dev$sndctrl(0x0, 0x40000000000001, 0x480006) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff6, &(0x7f0000000200)=0x10001) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:13:50 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:50 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:50 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:50 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:50 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:50 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:50 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:50 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:50 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:50 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:50 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 636.828028][T27516] IPVS: ftp: loaded support on port[0] = 21 16:13:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) 16:13:51 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:51 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:51 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:51 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:51 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:51 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:51 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:51 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:51 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:51 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:51 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 637.328965][ T26] audit: type=1326 audit(1562170431.363:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=27668 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c60a code=0xffff0000 [ 638.043483][ T26] audit: type=1326 audit(1562170432.083:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=27668 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c60a code=0xffff0000 16:13:52 executing program 1: setrlimit(0x7, &(0x7f0000a9cff8)) socket$inet_udplite(0x2, 0x2, 0x88) 16:13:52 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:52 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:52 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:52 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:52 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:52 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:52 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:52 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:52 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:52 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:52 executing program 1: 16:13:52 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:52 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:52 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:52 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:52 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:52 executing program 1: 16:13:52 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:52 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:52 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:52 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:52 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:52 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:52 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:52 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:53 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:53 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:53 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:53 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:53 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:53 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:53 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:53 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:53 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:53 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:53 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:53 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:53 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:53 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:53 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:53 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:53 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:53 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:53 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:53 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:53 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:53 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:53 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:53 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:53 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:53 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:53 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:54 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:54 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:54 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:54 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:54 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:54 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:54 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:54 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:13:54 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:54 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:54 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:54 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 640.392669][T27872] FAULT_INJECTION: forcing a failure. [ 640.392669][T27872] name failslab, interval 1, probability 0, space 0, times 0 [ 640.432811][T27872] CPU: 1 PID: 27872 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 640.440837][T27872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 640.440843][T27872] Call Trace: [ 640.440869][T27872] dump_stack+0x1d8/0x2f8 [ 640.440884][T27872] should_fail+0x608/0x860 [ 640.440903][T27872] ? setup_fault_attr+0x2b0/0x2b0 [ 640.468006][T27872] __should_failslab+0x11a/0x160 [ 640.473025][T27872] ? __se_sys_memfd_create+0x153/0x560 [ 640.478494][T27872] should_failslab+0x9/0x20 [ 640.478505][T27872] __kmalloc+0x7a/0x310 [ 640.478516][T27872] ? strnlen_user+0x1e0/0x260 [ 640.478529][T27872] __se_sys_memfd_create+0x153/0x560 [ 640.478543][T27872] ? __x64_sys_memfd_create+0x70/0x70 [ 640.502550][T27872] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 640.508216][T27872] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 640.513689][T27872] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 640.513703][T27872] ? do_syscall_64+0x1d/0x140 [ 640.513724][T27872] __x64_sys_memfd_create+0x5b/0x70 [ 640.529333][T27872] do_syscall_64+0xfe/0x140 [ 640.529352][T27872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 640.529364][T27872] RIP: 0033:0x4597c9 [ 640.529375][T27872] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 640.529386][T27872] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 640.571706][T27872] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597c9 [ 640.579690][T27872] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be6cc 16:13:54 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:54 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:54 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:54 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 640.588674][T27872] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 640.596664][T27872] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6e067e76d4 [ 640.604651][T27872] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:13:54 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:54 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:54 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:54 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:13:54 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:54 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:54 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:55 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:55 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:55 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:55 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:55 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 641.071545][T27919] FAULT_INJECTION: forcing a failure. [ 641.071545][T27919] name failslab, interval 1, probability 0, space 0, times 0 [ 641.154542][T27919] CPU: 0 PID: 27919 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 641.162565][T27919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 641.172621][T27919] Call Trace: [ 641.175923][T27919] dump_stack+0x1d8/0x2f8 [ 641.180264][T27919] should_fail+0x608/0x860 [ 641.184682][T27919] ? setup_fault_attr+0x2b0/0x2b0 [ 641.189733][T27919] __should_failslab+0x11a/0x160 [ 641.194676][T27919] ? shmem_alloc_inode+0x1b/0x40 [ 641.199622][T27919] should_failslab+0x9/0x20 [ 641.204135][T27919] kmem_cache_alloc+0x56/0x2b0 [ 641.208898][T27919] ? kasan_check_write+0x14/0x20 [ 641.213925][T27919] ? shmem_fallocate+0xcd0/0xcd0 [ 641.218855][T27919] shmem_alloc_inode+0x1b/0x40 [ 641.218865][T27919] ? shmem_fallocate+0xcd0/0xcd0 [ 641.218875][T27919] new_inode_pseudo+0x68/0x240 [ 641.218888][T27919] new_inode+0x28/0x1c0 [ 641.228593][T27919] ? kasan_check_read+0x11/0x20 [ 641.228676][T27919] shmem_get_inode+0x11b/0x700 [ 641.228697][T27919] ? __alloc_fd+0x523/0x5d0 [ 641.251652][T27919] __shmem_file_setup+0x129/0x280 [ 641.256684][T27919] shmem_file_setup+0x2f/0x40 [ 641.261371][T27919] __se_sys_memfd_create+0x32f/0x560 [ 641.266663][T27919] ? __x64_sys_memfd_create+0x70/0x70 [ 641.272049][T27919] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 641.277680][T27919] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 641.277699][T27919] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 641.277713][T27919] ? do_syscall_64+0x1d/0x140 [ 641.293555][T27919] __x64_sys_memfd_create+0x5b/0x70 [ 641.298758][T27919] do_syscall_64+0xfe/0x140 16:13:55 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:55 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:55 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 641.303266][T27919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 641.309160][T27919] RIP: 0033:0x4597c9 [ 641.313055][T27919] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 641.332657][T27919] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 641.341069][T27919] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597c9 16:13:55 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:13:55 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:55 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:55 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:55 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 641.341076][T27919] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be6cc [ 641.341082][T27919] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 641.341088][T27919] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6e067e76d4 [ 641.341094][T27919] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:13:55 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:55 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:55 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 641.581118][T27955] FAULT_INJECTION: forcing a failure. [ 641.581118][T27955] name failslab, interval 1, probability 0, space 0, times 0 16:13:55 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 641.659255][T27955] CPU: 1 PID: 27955 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 641.667280][T27955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 641.677653][T27955] Call Trace: [ 641.680950][T27955] dump_stack+0x1d8/0x2f8 [ 641.685295][T27955] should_fail+0x608/0x860 [ 641.689726][T27955] ? setup_fault_attr+0x2b0/0x2b0 [ 641.694766][T27955] __should_failslab+0x11a/0x160 [ 641.699712][T27955] ? security_inode_alloc+0x36/0x1e0 [ 641.705002][T27955] should_failslab+0x9/0x20 16:13:55 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 641.709504][T27955] kmem_cache_alloc+0x56/0x2b0 [ 641.714272][T27955] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 641.719994][T27955] security_inode_alloc+0x36/0x1e0 [ 641.725113][T27955] inode_init_always+0x3b5/0x8d0 [ 641.730058][T27955] ? shmem_fallocate+0xcd0/0xcd0 [ 641.735000][T27955] new_inode_pseudo+0x7f/0x240 [ 641.739769][T27955] new_inode+0x28/0x1c0 [ 641.744019][T27955] ? kasan_check_read+0x11/0x20 [ 641.748882][T27955] shmem_get_inode+0x11b/0x700 [ 641.753653][T27955] ? __alloc_fd+0x523/0x5d0 16:13:55 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:55 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 641.758158][T27955] __shmem_file_setup+0x129/0x280 [ 641.763204][T27955] shmem_file_setup+0x2f/0x40 [ 641.767890][T27955] __se_sys_memfd_create+0x32f/0x560 [ 641.773182][T27955] ? __x64_sys_memfd_create+0x70/0x70 [ 641.778564][T27955] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 641.784207][T27955] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 641.789667][T27955] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 641.795392][T27955] ? do_syscall_64+0x1d/0x140 [ 641.800088][T27955] __x64_sys_memfd_create+0x5b/0x70 [ 641.805306][T27955] do_syscall_64+0xfe/0x140 [ 641.809823][T27955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 641.815730][T27955] RIP: 0033:0x4597c9 [ 641.819627][T27955] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 641.839240][T27955] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 641.847691][T27955] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597c9 16:13:55 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:13:55 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:55 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:55 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:55 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:55 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 641.847701][T27955] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be6cc [ 641.847707][T27955] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 641.847712][T27955] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6e067e76d4 [ 641.847718][T27955] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:13:56 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:56 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:56 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:56 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:56 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 641.996507][T27982] FAULT_INJECTION: forcing a failure. [ 641.996507][T27982] name failslab, interval 1, probability 0, space 0, times 0 [ 642.095537][T27982] CPU: 1 PID: 27982 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 642.103595][T27982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 642.113664][T27982] Call Trace: [ 642.116971][T27982] dump_stack+0x1d8/0x2f8 [ 642.121319][T27982] should_fail+0x608/0x860 [ 642.125748][T27982] ? setup_fault_attr+0x2b0/0x2b0 [ 642.130790][T27982] __should_failslab+0x11a/0x160 [ 642.135733][T27982] ? __d_alloc+0x2d/0x6e0 [ 642.140065][T27982] should_failslab+0x9/0x20 16:13:56 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 642.144566][T27982] kmem_cache_alloc+0x56/0x2b0 [ 642.149341][T27982] __d_alloc+0x2d/0x6e0 [ 642.153502][T27982] ? ktime_get_coarse_real_ts64+0xaf/0xc0 [ 642.159227][T27982] d_alloc_pseudo+0x1d/0x70 [ 642.163734][T27982] alloc_file_pseudo+0x128/0x310 [ 642.168679][T27982] ? lockdep_init_map+0x2a/0x680 [ 642.173619][T27982] ? alloc_empty_file_noaccount+0x80/0x80 [ 642.173631][T27982] ? lockdep_annotate_inode_mutex_key+0xc2/0x130 [ 642.173647][T27982] ? kasan_check_write+0x14/0x20 [ 642.173655][T27982] ? clear_nlink+0x87/0xe0 [ 642.173672][T27982] __shmem_file_setup+0x1a2/0x280 [ 642.185708][T27982] shmem_file_setup+0x2f/0x40 [ 642.185720][T27982] __se_sys_memfd_create+0x32f/0x560 [ 642.185732][T27982] ? __x64_sys_memfd_create+0x70/0x70 [ 642.185740][T27982] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 642.185752][T27982] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 642.185762][T27982] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 642.185776][T27982] ? do_syscall_64+0x1d/0x140 [ 642.236861][T27982] __x64_sys_memfd_create+0x5b/0x70 [ 642.242070][T27982] do_syscall_64+0xfe/0x140 [ 642.246592][T27982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 642.252489][T27982] RIP: 0033:0x4597c9 [ 642.256385][T27982] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 642.276074][T27982] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 642.276085][T27982] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597c9 16:13:56 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:13:56 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:56 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:56 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:56 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:56 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 642.276091][T27982] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be6cc [ 642.276096][T27982] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 642.276102][T27982] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6e067e76d4 [ 642.276107][T27982] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:13:56 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 642.469722][T28021] FAULT_INJECTION: forcing a failure. [ 642.469722][T28021] name failslab, interval 1, probability 0, space 0, times 0 [ 642.528808][T28021] CPU: 1 PID: 28021 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 642.543438][T28021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 642.553512][T28021] Call Trace: [ 642.556816][T28021] dump_stack+0x1d8/0x2f8 [ 642.561163][T28021] should_fail+0x608/0x860 [ 642.565597][T28021] ? setup_fault_attr+0x2b0/0x2b0 [ 642.570643][T28021] __should_failslab+0x11a/0x160 [ 642.575583][T28021] ? __d_alloc+0x2d/0x6e0 [ 642.579924][T28021] should_failslab+0x9/0x20 [ 642.584430][T28021] kmem_cache_alloc+0x56/0x2b0 [ 642.589713][T28021] __d_alloc+0x2d/0x6e0 [ 642.593878][T28021] ? ktime_get_coarse_real_ts64+0xaf/0xc0 [ 642.599603][T28021] d_alloc_pseudo+0x1d/0x70 [ 642.604112][T28021] alloc_file_pseudo+0x128/0x310 [ 642.609053][T28021] ? lockdep_init_map+0x2a/0x680 [ 642.613994][T28021] ? alloc_empty_file_noaccount+0x80/0x80 [ 642.619721][T28021] ? lockdep_annotate_inode_mutex_key+0xc2/0x130 16:13:56 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 642.626065][T28021] ? kasan_check_write+0x14/0x20 [ 642.631013][T28021] ? clear_nlink+0x87/0xe0 [ 642.635441][T28021] __shmem_file_setup+0x1a2/0x280 [ 642.640483][T28021] shmem_file_setup+0x2f/0x40 [ 642.645178][T28021] __se_sys_memfd_create+0x32f/0x560 [ 642.650488][T28021] ? __x64_sys_memfd_create+0x70/0x70 [ 642.655900][T28021] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 642.661359][T28021] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 642.667068][T28021] ? do_syscall_64+0x1d/0x140 [ 642.671757][T28021] __x64_sys_memfd_create+0x5b/0x70 [ 642.676947][T28021] do_syscall_64+0xfe/0x140 [ 642.681439][T28021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 642.687312][T28021] RIP: 0033:0x4597c9 [ 642.691187][T28021] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 642.710788][T28021] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 642.719214][T28021] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597c9 16:13:56 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:56 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:56 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:56 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 642.727207][T28021] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be6cc [ 642.735205][T28021] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 642.743218][T28021] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6e067e76d4 [ 642.751228][T28021] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:13:56 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:13:56 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:56 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:57 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:57 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:57 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:57 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:57 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:57 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:57 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:57 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 643.163318][T28048] FAULT_INJECTION: forcing a failure. [ 643.163318][T28048] name failslab, interval 1, probability 0, space 0, times 0 [ 643.210064][T28048] CPU: 0 PID: 28048 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 643.218095][T28048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.228159][T28048] Call Trace: [ 643.231456][T28048] dump_stack+0x1d8/0x2f8 [ 643.235794][T28048] should_fail+0x608/0x860 [ 643.240218][T28048] ? setup_fault_attr+0x2b0/0x2b0 [ 643.245259][T28048] __should_failslab+0x11a/0x160 [ 643.250204][T28048] ? security_file_alloc+0x36/0x200 [ 643.255432][T28048] should_failslab+0x9/0x20 [ 643.259964][T28048] kmem_cache_alloc+0x56/0x2b0 [ 643.264739][T28048] security_file_alloc+0x36/0x200 [ 643.269853][T28048] __alloc_file+0xb1/0x350 [ 643.274270][T28048] alloc_empty_file+0xac/0x1b0 [ 643.279030][T28048] alloc_file+0x60/0x4c0 [ 643.283275][T28048] alloc_file_pseudo+0x25b/0x310 [ 643.288217][T28048] ? alloc_empty_file_noaccount+0x80/0x80 [ 643.293931][T28048] ? lockdep_annotate_inode_mutex_key+0xc2/0x130 [ 643.300256][T28048] ? kasan_check_write+0x14/0x20 [ 643.305187][T28048] ? clear_nlink+0x87/0xe0 16:13:57 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 643.309602][T28048] __shmem_file_setup+0x1a2/0x280 [ 643.314639][T28048] shmem_file_setup+0x2f/0x40 [ 643.319408][T28048] __se_sys_memfd_create+0x32f/0x560 [ 643.324709][T28048] ? __x64_sys_memfd_create+0x70/0x70 [ 643.330117][T28048] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 643.335751][T28048] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 643.335762][T28048] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 643.335771][T28048] ? do_syscall_64+0x1d/0x140 [ 643.335784][T28048] __x64_sys_memfd_create+0x5b/0x70 [ 643.335795][T28048] do_syscall_64+0xfe/0x140 [ 643.335812][T28048] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.335822][T28048] RIP: 0033:0x4597c9 [ 643.335832][T28048] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 643.335837][T28048] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 643.335846][T28048] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597c9 16:13:57 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:13:57 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:57 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:57 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:57 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 643.335852][T28048] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be6cc [ 643.335857][T28048] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 643.335863][T28048] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6e067e76d4 [ 643.335868][T28048] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:13:57 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:57 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:57 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 643.543489][T28088] FAULT_INJECTION: forcing a failure. [ 643.543489][T28088] name failslab, interval 1, probability 0, space 0, times 0 [ 643.566012][T28088] CPU: 1 PID: 28088 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 643.574020][T28088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.584097][T28088] Call Trace: [ 643.587423][T28088] dump_stack+0x1d8/0x2f8 [ 643.591765][T28088] should_fail+0x608/0x860 [ 643.596207][T28088] ? setup_fault_attr+0x2b0/0x2b0 [ 643.601249][T28088] __should_failslab+0x11a/0x160 [ 643.606196][T28088] ? security_file_alloc+0x36/0x200 [ 643.611400][T28088] should_failslab+0x9/0x20 [ 643.615900][T28088] kmem_cache_alloc+0x56/0x2b0 [ 643.620672][T28088] security_file_alloc+0x36/0x200 [ 643.625698][T28088] __alloc_file+0xb1/0x350 [ 643.625712][T28088] alloc_empty_file+0xac/0x1b0 [ 643.625724][T28088] alloc_file+0x60/0x4c0 [ 643.625738][T28088] alloc_file_pseudo+0x25b/0x310 [ 643.625753][T28088] ? alloc_empty_file_noaccount+0x80/0x80 [ 643.639243][T28088] ? lockdep_annotate_inode_mutex_key+0xc2/0x130 [ 643.649888][T28088] ? kasan_check_write+0x14/0x20 [ 643.649898][T28088] ? clear_nlink+0x87/0xe0 [ 643.649912][T28088] __shmem_file_setup+0x1a2/0x280 [ 643.649925][T28088] shmem_file_setup+0x2f/0x40 [ 643.649940][T28088] __se_sys_memfd_create+0x32f/0x560 [ 643.670743][T28088] ? __x64_sys_memfd_create+0x70/0x70 [ 643.670755][T28088] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 643.670767][T28088] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 643.670778][T28088] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 643.670793][T28088] ? do_syscall_64+0x1d/0x140 [ 643.680731][T28088] __x64_sys_memfd_create+0x5b/0x70 [ 643.680745][T28088] do_syscall_64+0xfe/0x140 [ 643.680761][T28088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.680772][T28088] RIP: 0033:0x4597c9 [ 643.680785][T28088] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 643.691761][T28088] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 643.691772][T28088] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597c9 [ 643.691777][T28088] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be6cc [ 643.691782][T28088] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 643.691788][T28088] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6e067e76d4 16:13:57 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:57 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:57 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:57 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:57 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:13:57 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:57 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 643.691793][T28088] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:13:57 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:57 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 643.900232][T28110] FAULT_INJECTION: forcing a failure. [ 643.900232][T28110] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 643.913681][T28110] CPU: 0 PID: 28110 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 643.921662][T28110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.931838][T28110] Call Trace: [ 643.935141][T28110] dump_stack+0x1d8/0x2f8 [ 643.939481][T28110] should_fail+0x608/0x860 [ 643.944336][T28110] ? setup_fault_attr+0x2b0/0x2b0 [ 643.949391][T28110] ? __bfs+0x550/0x550 [ 643.953463][T28110] should_fail_alloc_page+0x55/0x60 [ 643.958660][T28110] prepare_alloc_pages+0x283/0x460 [ 643.964123][T28110] __alloc_pages_nodemask+0x11c/0x790 [ 643.964150][T28110] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 643.964162][T28110] ? __lock_acquire+0xcf7/0x1a40 [ 643.964186][T28110] kmem_getpages+0x46/0x480 [ 643.964197][T28110] cache_grow_begin+0x7e/0x2c0 [ 643.964210][T28110] cache_alloc_refill+0x311/0x3f0 [ 643.964223][T28110] ? check_preemption_disabled+0xb7/0x280 16:13:57 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:58 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 643.964237][T28110] __kmalloc+0x2e5/0x310 [ 643.964247][T28110] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 643.964260][T28110] tomoyo_realpath_from_path+0xdc/0x7c0 [ 643.964278][T28110] tomoyo_path_perm+0x218/0x8b0 [ 643.964293][T28110] ? tomoyo_check_open_permission+0x9e0/0x9e0 [ 643.964308][T28110] ? trace_lock_acquire+0x190/0x190 [ 643.964343][T28110] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 643.984644][T28110] tomoyo_path_truncate+0x1c/0x20 [ 643.984657][T28110] security_path_truncate+0xd5/0x150 16:13:58 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:58 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 643.984672][T28110] do_sys_ftruncate+0x3b1/0x6b0 [ 643.984687][T28110] ? __x32_compat_sys_truncate+0x1b0/0x1b0 [ 643.984711][T28110] ? debug_smp_processor_id+0x1c/0x20 [ 643.994500][T28110] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 643.994516][T28110] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 643.994526][T28110] ? __x64_sys_memfd_create+0x70/0x70 [ 643.994536][T28110] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 643.994546][T28110] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 643.994557][T28110] ? trace_irq_disable_rcuidle+0x23/0x1c0 16:13:58 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:58 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:58 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 643.994567][T28110] ? do_syscall_64+0x1d/0x140 [ 643.994580][T28110] __x64_sys_ftruncate+0x60/0x70 [ 643.994592][T28110] do_syscall_64+0xfe/0x140 [ 643.994608][T28110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.994623][T28110] RIP: 0033:0x459797 [ 644.020613][T28110] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 644.020619][T28110] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 644.020630][T28110] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459797 [ 644.020637][T28110] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 644.020643][T28110] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 644.020650][T28110] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 644.020656][T28110] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:13:58 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:13:58 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:58 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:58 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:58 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:58 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:58 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:58 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:58 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:58 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 644.596099][T28153] FAULT_INJECTION: forcing a failure. [ 644.596099][T28153] name failslab, interval 1, probability 0, space 0, times 0 16:13:58 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 644.687236][T28153] CPU: 1 PID: 28153 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 644.695269][T28153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 644.705333][T28153] Call Trace: [ 644.708635][T28153] dump_stack+0x1d8/0x2f8 [ 644.713049][T28153] should_fail+0x608/0x860 [ 644.713064][T28153] ? setup_fault_attr+0x2b0/0x2b0 [ 644.713077][T28153] ? tomoyo_encode2+0x273/0x5a0 [ 644.713103][T28153] __should_failslab+0x11a/0x160 [ 644.732707][T28153] ? tomoyo_encode2+0x273/0x5a0 [ 644.737562][T28153] should_failslab+0x9/0x20 [ 644.742066][T28153] __kmalloc+0x7a/0x310 [ 644.746234][T28153] tomoyo_encode2+0x273/0x5a0 [ 644.750915][T28153] ? dynamic_dname+0x1a0/0x1a0 [ 644.755864][T28153] tomoyo_realpath_from_path+0x769/0x7c0 [ 644.761506][T28153] tomoyo_path_perm+0x218/0x8b0 [ 644.766360][T28153] ? tomoyo_check_open_permission+0x9e0/0x9e0 [ 644.772433][T28153] ? trace_lock_acquire+0x190/0x190 [ 644.777663][T28153] ? rcu_read_lock_sched_held+0x127/0x1c0 16:13:58 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 644.783394][T28153] tomoyo_path_truncate+0x1c/0x20 [ 644.788449][T28153] security_path_truncate+0xd5/0x150 [ 644.793740][T28153] do_sys_ftruncate+0x3b1/0x6b0 [ 644.798593][T28153] ? __x32_compat_sys_truncate+0x1b0/0x1b0 [ 644.804405][T28153] ? debug_smp_processor_id+0x1c/0x20 [ 644.809778][T28153] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 644.815851][T28153] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 644.821598][T28153] ? __x64_sys_memfd_create+0x70/0x70 [ 644.827143][T28153] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 644.832782][T28153] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 644.838238][T28153] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 644.838249][T28153] ? do_syscall_64+0x1d/0x140 [ 644.838263][T28153] __x64_sys_ftruncate+0x60/0x70 [ 644.838276][T28153] do_syscall_64+0xfe/0x140 [ 644.853664][T28153] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 644.853675][T28153] RIP: 0033:0x459797 [ 644.853686][T28153] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 644.853691][T28153] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 644.853701][T28153] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459797 [ 644.853707][T28153] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 644.853714][T28153] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 644.853719][T28153] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 644.853725][T28153] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 644.909052][T28153] ERROR: Out of memory at tomoyo_realpath_from_path. 16:13:59 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:13:59 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:59 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:13:59 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:59 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:59 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:59 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:59 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:59 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:59 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 645.207799][T28195] FAULT_INJECTION: forcing a failure. [ 645.207799][T28195] name fail_page_alloc, interval 1, probability 0, space 0, times 0 16:13:59 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 645.319465][T28195] CPU: 1 PID: 28195 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 645.327533][T28195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 645.337688][T28195] Call Trace: [ 645.341798][T28195] dump_stack+0x1d8/0x2f8 [ 645.346145][T28195] should_fail+0x608/0x860 [ 645.350575][T28195] ? setup_fault_attr+0x2b0/0x2b0 [ 645.355613][T28195] should_fail_alloc_page+0x55/0x60 [ 645.360900][T28195] prepare_alloc_pages+0x283/0x460 16:13:59 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 645.366019][T28195] __alloc_pages_nodemask+0x11c/0x790 [ 645.371396][T28195] ? __lock_acquire+0xcf7/0x1a40 [ 645.376342][T28195] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 645.381902][T28195] ? percpu_counter_add_batch+0x169/0x190 [ 645.387718][T28195] alloc_pages_vma+0x4f7/0xc50 [ 645.392484][T28195] shmem_alloc_and_acct_page+0x6f0/0xd80 [ 645.398120][T28195] ? shmem_add_to_page_cache+0x1370/0x1370 [ 645.404013][T28195] ? rcu_lock_release+0x26/0x30 [ 645.408868][T28195] ? find_get_entry+0x6fa/0x7d0 [ 645.413755][T28195] ? page_cache_prev_miss+0x4a0/0x4a0 [ 645.419307][T28195] ? arch_stack_walk+0x98/0xe0 [ 645.424074][T28195] ? find_lock_entry+0x36/0x540 [ 645.428933][T28195] shmem_getpage_gfp+0x2098/0x2dd0 [ 645.434053][T28195] ? __bfs+0x550/0x550 [ 645.438145][T28195] ? shmem_getpage+0xa0/0xa0 [ 645.442745][T28195] ? trace_hardirqs_on+0x74/0x80 [ 645.447740][T28195] ? iov_iter_fault_in_readable+0x2ba/0x5c0 [ 645.453658][T28195] shmem_write_begin+0xcb/0x1b0 [ 645.458524][T28195] generic_perform_write+0x2ac/0x550 [ 645.463828][T28195] ? grab_cache_page_write_begin+0xa0/0xa0 [ 645.469639][T28195] ? file_remove_privs+0x600/0x600 [ 645.474755][T28195] ? lock_acquire+0x158/0x250 [ 645.479440][T28195] __generic_file_write_iter+0x24b/0x520 [ 645.485083][T28195] generic_file_write_iter+0x41d/0x5a0 [ 645.490555][T28195] __vfs_write+0x617/0x7d0 [ 645.494982][T28195] ? __kernel_write+0x330/0x330 [ 645.499845][T28195] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 645.505572][T28195] ? __sb_start_write+0x199/0x360 [ 645.510607][T28195] vfs_write+0x227/0x510 [ 645.514863][T28195] __x64_sys_pwrite64+0x1af/0x240 [ 645.519892][T28195] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 645.525615][T28195] ? ksys_pwrite64+0x1d0/0x1d0 [ 645.525638][T28195] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 645.525650][T28195] ? do_syscall_64+0x1d/0x140 [ 645.525665][T28195] do_syscall_64+0xfe/0x140 [ 645.525681][T28195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 645.525696][T28195] RIP: 0033:0x413717 [ 645.536159][T28195] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 645.536165][T28195] RSP: 002b:00007f6e067e6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 645.536176][T28195] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000413717 [ 645.536182][T28195] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 645.536195][T28195] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 645.536201][T28195] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 645.536207][T28195] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:13:59 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:13:59 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:59 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:13:59 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:13:59 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:13:59 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 645.770852][T28231] FAULT_INJECTION: forcing a failure. [ 645.770852][T28231] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 645.798614][T28231] CPU: 0 PID: 28231 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 645.806623][T28231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 645.816676][T28231] Call Trace: 16:13:59 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 645.819976][T28231] dump_stack+0x1d8/0x2f8 [ 645.824315][T28231] should_fail+0x608/0x860 [ 645.828739][T28231] ? setup_fault_attr+0x2b0/0x2b0 [ 645.833773][T28231] should_fail_alloc_page+0x55/0x60 [ 645.833784][T28231] prepare_alloc_pages+0x283/0x460 [ 645.833798][T28231] __alloc_pages_nodemask+0x11c/0x790 [ 645.833812][T28231] ? __lock_acquire+0xcf7/0x1a40 [ 645.833821][T28231] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 645.833838][T28231] ? percpu_counter_add_batch+0x169/0x190 [ 645.833854][T28231] alloc_pages_vma+0x4f7/0xc50 16:13:59 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 645.833870][T28231] shmem_alloc_and_acct_page+0x6f0/0xd80 [ 645.833884][T28231] ? shmem_add_to_page_cache+0x1370/0x1370 [ 645.833916][T28231] ? rcu_lock_release+0x26/0x30 [ 645.833924][T28231] ? find_get_entry+0x6fa/0x7d0 [ 645.833938][T28231] ? page_cache_prev_miss+0x4a0/0x4a0 [ 645.833954][T28231] ? arch_stack_walk+0x98/0xe0 [ 645.833968][T28231] ? find_lock_entry+0x36/0x540 [ 645.833983][T28231] shmem_getpage_gfp+0x2098/0x2dd0 [ 645.833992][T28231] ? __bfs+0x550/0x550 [ 645.834021][T28231] ? shmem_getpage+0xa0/0xa0 16:14:00 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 645.844298][T28231] ? trace_hardirqs_on+0x74/0x80 [ 645.844310][T28231] ? iov_iter_fault_in_readable+0x2ba/0x5c0 [ 645.844326][T28231] shmem_write_begin+0xcb/0x1b0 [ 645.936019][T28231] generic_perform_write+0x2ac/0x550 [ 645.941322][T28231] ? grab_cache_page_write_begin+0xa0/0xa0 [ 645.947137][T28231] ? file_remove_privs+0x600/0x600 [ 645.952270][T28231] ? lock_acquire+0x158/0x250 [ 645.956953][T28231] __generic_file_write_iter+0x24b/0x520 [ 645.962599][T28231] generic_file_write_iter+0x41d/0x5a0 [ 645.968074][T28231] __vfs_write+0x617/0x7d0 [ 645.972493][T28231] ? __kernel_write+0x330/0x330 [ 645.972516][T28231] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 645.972529][T28231] ? __sb_start_write+0x199/0x360 [ 645.972541][T28231] vfs_write+0x227/0x510 [ 645.972557][T28231] __x64_sys_pwrite64+0x1af/0x240 [ 645.972570][T28231] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 645.972581][T28231] ? ksys_pwrite64+0x1d0/0x1d0 [ 645.972591][T28231] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 645.972600][T28231] ? do_syscall_64+0x1d/0x140 16:14:00 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:00 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:00 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 645.972613][T28231] do_syscall_64+0xfe/0x140 [ 645.972634][T28231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 645.983187][T28231] RIP: 0033:0x413717 [ 645.983199][T28231] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 645.983204][T28231] RSP: 002b:00007f6e067e6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 645.983213][T28231] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000413717 [ 645.983219][T28231] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 645.983224][T28231] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 645.983229][T28231] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 645.983234][T28231] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:00 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:00 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:00 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:00 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:00 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:00 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:00 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:00 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:00 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:00 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 646.379560][T28267] FAULT_INJECTION: forcing a failure. [ 646.379560][T28267] name failslab, interval 1, probability 0, space 0, times 0 [ 646.392544][T28267] CPU: 1 PID: 28267 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 646.400526][T28267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 646.410583][T28267] Call Trace: [ 646.413971][T28267] dump_stack+0x1d8/0x2f8 [ 646.418314][T28267] should_fail+0x608/0x860 [ 646.422753][T28267] ? setup_fault_attr+0x2b0/0x2b0 16:14:00 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 646.427779][T28267] ? __lock_acquire+0xcf7/0x1a40 [ 646.432734][T28267] __should_failslab+0x11a/0x160 [ 646.437692][T28267] ? xas_create+0x11a7/0x1920 [ 646.442385][T28267] should_failslab+0x9/0x20 [ 646.446894][T28267] kmem_cache_alloc+0x56/0x2b0 [ 646.451669][T28267] xas_create+0x11a7/0x1920 [ 646.456199][T28267] xas_create_range+0x142/0x700 [ 646.461062][T28267] shmem_add_to_page_cache+0x96d/0x1370 [ 646.466618][T28267] ? count_memcg_event_mm+0x2f0/0x2f0 [ 646.466632][T28267] ? rcu_lock_release+0x26/0x30 16:14:00 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 646.466642][T28267] ? mem_cgroup_throttle_swaprate+0x373/0x4d0 [ 646.466654][T28267] ? mem_cgroup_try_charge_delay+0x78/0xa0 [ 646.466667][T28267] shmem_getpage_gfp+0x10a3/0x2dd0 [ 646.466677][T28267] ? __bfs+0x550/0x550 [ 646.466704][T28267] ? shmem_getpage+0xa0/0xa0 [ 646.466716][T28267] ? trace_hardirqs_on+0x74/0x80 [ 646.466726][T28267] ? iov_iter_fault_in_readable+0x2ba/0x5c0 [ 646.466739][T28267] shmem_write_begin+0xcb/0x1b0 [ 646.466754][T28267] generic_perform_write+0x2ac/0x550 [ 646.466773][T28267] ? grab_cache_page_write_begin+0xa0/0xa0 [ 646.507478][T28267] ? file_remove_privs+0x600/0x600 [ 646.507495][T28267] ? lock_acquire+0x158/0x250 [ 646.507512][T28267] __generic_file_write_iter+0x24b/0x520 [ 646.507529][T28267] generic_file_write_iter+0x41d/0x5a0 [ 646.507550][T28267] __vfs_write+0x617/0x7d0 [ 646.545445][T28267] ? __kernel_write+0x330/0x330 [ 646.545470][T28267] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 646.545484][T28267] ? __sb_start_write+0x199/0x360 [ 646.545498][T28267] vfs_write+0x227/0x510 [ 646.545516][T28267] __x64_sys_pwrite64+0x1af/0x240 [ 646.545527][T28267] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 646.545542][T28267] ? ksys_pwrite64+0x1d0/0x1d0 [ 646.576570][T28267] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 646.576584][T28267] ? do_syscall_64+0x1d/0x140 [ 646.576601][T28267] do_syscall_64+0xfe/0x140 [ 646.576618][T28267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 646.576628][T28267] RIP: 0033:0x413717 [ 646.576638][T28267] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 646.576643][T28267] RSP: 002b:00007f6e067e6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 646.576652][T28267] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000413717 [ 646.576658][T28267] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 646.576663][T28267] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 646.576669][T28267] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 646.576680][T28267] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:00 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:00 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:00 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:00 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:00 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:00 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 646.965925][T28304] FAULT_INJECTION: forcing a failure. [ 646.965925][T28304] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 646.979172][T28304] CPU: 0 PID: 28304 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 646.987151][T28304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 646.997210][T28304] Call Trace: [ 646.997234][T28304] dump_stack+0x1d8/0x2f8 [ 646.997249][T28304] should_fail+0x608/0x860 [ 646.997262][T28304] ? setup_fault_attr+0x2b0/0x2b0 [ 646.997282][T28304] should_fail_alloc_page+0x55/0x60 [ 646.997292][T28304] prepare_alloc_pages+0x283/0x460 [ 646.997312][T28304] __alloc_pages_nodemask+0x11c/0x790 [ 647.019509][T28304] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 647.035518][T28304] kmem_getpages+0x46/0x480 [ 647.040028][T28304] cache_grow_begin+0x7e/0x2c0 [ 647.044800][T28304] cache_alloc_refill+0x311/0x3f0 [ 647.049833][T28304] ? check_preemption_disabled+0xb7/0x280 [ 647.055555][T28304] kmem_cache_alloc+0x288/0x2b0 [ 647.060486][T28304] ? getname_flags+0xba/0x640 [ 647.065161][T28304] getname_flags+0xba/0x640 [ 647.069669][T28304] getname+0x19/0x20 [ 647.073575][T28304] do_sys_open+0x2fc/0x620 [ 647.077996][T28304] ? file_open_root+0x440/0x440 [ 647.082846][T28304] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 647.088914][T28304] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 647.094633][T28304] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 647.100090][T28304] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 647.105807][T28304] ? do_syscall_64+0x1d/0x140 [ 647.110487][T28304] __x64_sys_open+0x87/0x90 [ 647.114992][T28304] do_syscall_64+0xfe/0x140 [ 647.119503][T28304] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 647.125391][T28304] RIP: 0033:0x4136b1 [ 647.129282][T28304] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 647.148979][T28304] RSP: 002b:00007f6e067e6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 647.157403][T28304] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004136b1 16:14:01 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:01 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:01 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:01 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:01 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:01 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 647.165377][T28304] RDX: 00007f6e067e6b0a RSI: 0000000000000002 RDI: 00007f6e067e6b00 [ 647.173354][T28304] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 647.181325][T28304] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 647.189300][T28304] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:01 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:01 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:01 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:01 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:01 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:01 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:01 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:01 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:01 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:01 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:01 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 647.538013][T28343] FAULT_INJECTION: forcing a failure. [ 647.538013][T28343] name failslab, interval 1, probability 0, space 0, times 0 16:14:01 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 647.668180][T28343] CPU: 0 PID: 28343 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 647.676206][T28343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 647.686269][T28343] Call Trace: [ 647.689571][T28343] dump_stack+0x1d8/0x2f8 [ 647.693917][T28343] should_fail+0x608/0x860 [ 647.698534][T28343] ? setup_fault_attr+0x2b0/0x2b0 [ 647.703601][T28343] __should_failslab+0x11a/0x160 [ 647.708546][T28343] ? __alloc_file+0x29/0x350 [ 647.713150][T28343] should_failslab+0x9/0x20 [ 647.713161][T28343] kmem_cache_alloc+0x56/0x2b0 [ 647.713171][T28343] ? stack_trace_save+0x1e0/0x1e0 [ 647.713182][T28343] __alloc_file+0x29/0x350 [ 647.713189][T28343] ? alloc_empty_file+0x4c/0x1b0 [ 647.713200][T28343] alloc_empty_file+0xac/0x1b0 [ 647.713210][T28343] path_openat+0x12b/0x4400 [ 647.713221][T28343] ? arch_stack_walk+0x98/0xe0 [ 647.713234][T28343] ? __bfs+0x550/0x550 [ 647.713253][T28343] ? stack_trace_save+0x111/0x1e0 [ 647.759914][T28343] ? __lock_acquire+0xcf7/0x1a40 [ 647.764854][T28343] ? check_preemption_disabled+0x47/0x280 [ 647.764872][T28343] ? do_filp_open+0x430/0x430 [ 647.764880][T28343] ? __lock_acquire+0xcf7/0x1a40 [ 647.764892][T28343] ? kmem_cache_alloc+0x1dd/0x2b0 [ 647.764916][T28343] ? expand_files+0x511/0xa90 [ 647.764927][T28343] do_filp_open+0x1f7/0x430 [ 647.764938][T28343] ? vfs_tmpfile+0x230/0x230 [ 647.764953][T28343] ? kasan_check_read+0x11/0x20 [ 647.764962][T28343] ? do_raw_spin_unlock+0x49/0x260 [ 647.764982][T28343] ? _raw_spin_unlock+0x2c/0x50 [ 647.775405][T28343] ? get_unused_fd_flags+0x97/0xb0 [ 647.775418][T28343] do_sys_open+0x343/0x620 [ 647.775429][T28343] ? file_open_root+0x440/0x440 [ 647.775438][T28343] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 647.775452][T28343] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 647.775461][T28343] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 647.775472][T28343] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 647.775481][T28343] ? do_syscall_64+0x1d/0x140 [ 647.775494][T28343] __x64_sys_open+0x87/0x90 [ 647.834620][T28343] do_syscall_64+0xfe/0x140 [ 647.834637][T28343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 647.834646][T28343] RIP: 0033:0x4136b1 [ 647.834656][T28343] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 647.834662][T28343] RSP: 002b:00007f6e067e6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 647.851533][T28343] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004136b1 [ 647.851541][T28343] RDX: 00007f6e067e6b0a RSI: 0000000000000002 RDI: 00007f6e067e6b00 16:14:01 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:01 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:01 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:01 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:01 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:01 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 647.851547][T28343] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 647.851552][T28343] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 647.851558][T28343] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 647.982082][T28372] FAULT_INJECTION: forcing a failure. [ 647.982082][T28372] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 647.995327][T28372] CPU: 0 PID: 28372 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 647.995337][T28372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 647.995342][T28372] Call Trace: [ 647.995365][T28372] dump_stack+0x1d8/0x2f8 [ 647.995383][T28372] should_fail+0x608/0x860 [ 647.995395][T28372] ? setup_fault_attr+0x2b0/0x2b0 [ 647.995414][T28372] should_fail_alloc_page+0x55/0x60 [ 647.995427][T28372] prepare_alloc_pages+0x283/0x460 [ 647.995442][T28372] __alloc_pages_nodemask+0x11c/0x790 [ 647.995459][T28372] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 647.995484][T28372] kmem_getpages+0x46/0x480 [ 648.035750][T28372] cache_grow_begin+0x7e/0x2c0 [ 648.035766][T28372] cache_alloc_refill+0x311/0x3f0 [ 648.035779][T28372] ? check_preemption_disabled+0xb7/0x280 [ 648.035794][T28372] kmem_cache_alloc+0x288/0x2b0 [ 648.035802][T28372] ? getname_flags+0xba/0x640 [ 648.035813][T28372] getname_flags+0xba/0x640 [ 648.035824][T28372] getname+0x19/0x20 [ 648.035834][T28372] do_sys_open+0x2fc/0x620 [ 648.035845][T28372] ? file_open_root+0x440/0x440 [ 648.035855][T28372] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 648.035871][T28372] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 648.046349][T28372] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 648.046361][T28372] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 648.046371][T28372] ? do_syscall_64+0x1d/0x140 [ 648.046384][T28372] __x64_sys_open+0x87/0x90 [ 648.046396][T28372] do_syscall_64+0xfe/0x140 [ 648.046412][T28372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 648.046422][T28372] RIP: 0033:0x4136b1 [ 648.046432][T28372] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 648.046438][T28372] RSP: 002b:00007f6e067e6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 648.046447][T28372] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004136b1 16:14:02 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:02 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:02 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:02 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:02 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:02 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 648.046452][T28372] RDX: 00007f6e067e6b0a RSI: 0000000000000002 RDI: 00007f6e067e6b00 [ 648.046457][T28372] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 648.046463][T28372] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 648.046468][T28372] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:02 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:02 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:02 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:02 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:02 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:02 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:02 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 648.506704][T28410] FAULT_INJECTION: forcing a failure. [ 648.506704][T28410] name failslab, interval 1, probability 0, space 0, times 0 16:14:02 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 648.603439][T28410] CPU: 1 PID: 28410 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 648.611474][T28410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 648.621579][T28410] Call Trace: [ 648.624895][T28410] dump_stack+0x1d8/0x2f8 [ 648.629249][T28410] should_fail+0x608/0x860 [ 648.633868][T28410] ? setup_fault_attr+0x2b0/0x2b0 [ 648.638906][T28410] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 648.644645][T28410] __should_failslab+0x11a/0x160 [ 648.644660][T28410] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 648.644668][T28410] should_failslab+0x9/0x20 [ 648.644675][T28410] __kmalloc+0x7a/0x310 [ 648.644684][T28410] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 648.644695][T28410] tomoyo_realpath_from_path+0xdc/0x7c0 [ 648.644711][T28410] tomoyo_check_open_permission+0x1f2/0x9e0 [ 648.644729][T28410] ? tomoyo_check_path_number_acl+0x240/0x240 [ 648.695261][T28410] ? smk_access+0x4f0/0x4f0 16:14:02 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:02 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 648.699809][T28410] tomoyo_file_open+0x141/0x190 [ 648.704677][T28410] security_file_open+0x65/0x2f0 [ 648.709633][T28410] do_dentry_open+0x397/0x1060 [ 648.714422][T28410] ? finish_open+0xe0/0xe0 [ 648.719333][T28410] ? inode_permission+0xe3/0x580 [ 648.724290][T28410] vfs_open+0x73/0x80 [ 648.728277][T28410] path_openat+0x136d/0x4400 [ 648.732874][T28410] ? arch_stack_walk+0x98/0xe0 [ 648.737655][T28410] ? stack_trace_save+0x111/0x1e0 [ 648.742692][T28410] ? check_preemption_disabled+0x47/0x280 [ 648.748428][T28410] ? do_filp_open+0x430/0x430 16:14:02 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 648.753111][T28410] ? __lock_acquire+0xcf7/0x1a40 [ 648.758083][T28410] ? kmem_cache_alloc+0x1dd/0x2b0 [ 648.763131][T28410] ? expand_files+0x511/0xa90 [ 648.767830][T28410] do_filp_open+0x1f7/0x430 [ 648.772378][T28410] ? vfs_tmpfile+0x230/0x230 [ 648.776988][T28410] ? kasan_check_read+0x11/0x20 [ 648.781849][T28410] ? do_raw_spin_unlock+0x49/0x260 [ 648.786969][T28410] ? _raw_spin_unlock+0x2c/0x50 [ 648.791837][T28410] ? get_unused_fd_flags+0x97/0xb0 [ 648.796961][T28410] do_sys_open+0x343/0x620 16:14:02 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 648.801396][T28410] ? file_open_root+0x440/0x440 [ 648.806269][T28410] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 648.812363][T28410] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 648.818398][T28410] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 648.823876][T28410] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 648.829611][T28410] ? do_syscall_64+0x1d/0x140 [ 648.834302][T28410] __x64_sys_open+0x87/0x90 [ 648.838820][T28410] do_syscall_64+0xfe/0x140 [ 648.843341][T28410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 648.849251][T28410] RIP: 0033:0x4136b1 [ 648.853151][T28410] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 648.872770][T28410] RSP: 002b:00007f6e067e6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 648.881204][T28410] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004136b1 [ 648.889196][T28410] RDX: 00007f6e067e6b0a RSI: 0000000000000002 RDI: 00007f6e067e6b00 [ 648.897182][T28410] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 648.905178][T28410] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 648.913167][T28410] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 648.930050][T28410] ERROR: Out of memory at tomoyo_realpath_from_path. 16:14:03 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:03 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:03 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:03 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:03 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:03 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:03 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:03 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 649.120546][T28448] FAULT_INJECTION: forcing a failure. [ 649.120546][T28448] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 649.133802][T28448] CPU: 0 PID: 28448 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 649.141808][T28448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 649.151937][T28448] Call Trace: [ 649.155328][T28448] dump_stack+0x1d8/0x2f8 [ 649.159759][T28448] should_fail+0x608/0x860 [ 649.164263][T28448] ? setup_fault_attr+0x2b0/0x2b0 [ 649.169319][T28448] ? __bfs+0x550/0x550 [ 649.173396][T28448] should_fail_alloc_page+0x55/0x60 [ 649.178601][T28448] prepare_alloc_pages+0x283/0x460 [ 649.183739][T28448] __alloc_pages_nodemask+0x11c/0x790 [ 649.189137][T28448] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 649.194706][T28448] ? __lock_acquire+0xcf7/0x1a40 [ 649.199662][T28448] kmem_getpages+0x46/0x480 [ 649.204177][T28448] cache_grow_begin+0x7e/0x2c0 [ 649.204190][T28448] cache_alloc_refill+0x311/0x3f0 [ 649.204202][T28448] ? check_preemption_disabled+0xb7/0x280 [ 649.204213][T28448] __kmalloc+0x2e5/0x310 [ 649.204222][T28448] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 649.204233][T28448] tomoyo_realpath_from_path+0xdc/0x7c0 [ 649.204249][T28448] tomoyo_check_open_permission+0x1f2/0x9e0 [ 649.204265][T28448] ? tomoyo_check_path_number_acl+0x240/0x240 [ 649.247216][T28448] ? smk_access+0x4f0/0x4f0 [ 649.251769][T28448] tomoyo_file_open+0x141/0x190 [ 649.256642][T28448] security_file_open+0x65/0x2f0 [ 649.261581][T28448] do_dentry_open+0x397/0x1060 [ 649.261602][T28448] ? finish_open+0xe0/0xe0 16:14:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 649.261615][T28448] ? inode_permission+0xe3/0x580 [ 649.275733][T28448] vfs_open+0x73/0x80 [ 649.279729][T28448] path_openat+0x136d/0x4400 [ 649.284321][T28448] ? arch_stack_walk+0x98/0xe0 [ 649.289093][T28448] ? stack_trace_save+0x111/0x1e0 [ 649.294129][T28448] ? check_preemption_disabled+0x47/0x280 [ 649.299854][T28448] ? do_filp_open+0x430/0x430 [ 649.304530][T28448] ? __lock_acquire+0xcf7/0x1a40 [ 649.309466][T28448] ? kmem_cache_alloc+0x1dd/0x2b0 [ 649.309494][T28448] ? expand_files+0x511/0xa90 [ 649.309507][T28448] do_filp_open+0x1f7/0x430 [ 649.323782][T28448] ? vfs_tmpfile+0x230/0x230 [ 649.328404][T28448] ? kasan_check_read+0x11/0x20 [ 649.333253][T28448] ? do_raw_spin_unlock+0x49/0x260 [ 649.338382][T28448] ? _raw_spin_unlock+0x2c/0x50 [ 649.343249][T28448] ? get_unused_fd_flags+0x97/0xb0 [ 649.348363][T28448] do_sys_open+0x343/0x620 [ 649.352784][T28448] ? file_open_root+0x440/0x440 [ 649.357631][T28448] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 649.357647][T28448] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 649.357664][T28448] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 649.374884][T28448] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 649.380606][T28448] ? do_syscall_64+0x1d/0x140 [ 649.385287][T28448] __x64_sys_open+0x87/0x90 [ 649.389790][T28448] do_syscall_64+0xfe/0x140 [ 649.394301][T28448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 649.400196][T28448] RIP: 0033:0x4136b1 16:14:03 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:03 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 649.404087][T28448] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 649.423702][T28448] RSP: 002b:00007f6e067e6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 649.432124][T28448] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004136b1 [ 649.440110][T28448] RDX: 00007f6e067e6b0a RSI: 0000000000000002 RDI: 00007f6e067e6b00 [ 649.448091][T28448] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 649.456075][T28448] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 649.464056][T28448] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:03 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:03 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:03 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:03 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:03 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:03 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:03 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:03 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 649.823747][T28486] FAULT_INJECTION: forcing a failure. [ 649.823747][T28486] name failslab, interval 1, probability 0, space 0, times 0 16:14:03 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 649.920992][T28486] CPU: 1 PID: 28486 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 649.929024][T28486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 649.939090][T28486] Call Trace: [ 649.942393][T28486] dump_stack+0x1d8/0x2f8 [ 649.946736][T28486] should_fail+0x608/0x860 [ 649.951164][T28486] ? setup_fault_attr+0x2b0/0x2b0 [ 649.956205][T28486] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 649.961933][T28486] __should_failslab+0x11a/0x160 [ 649.966872][T28486] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 649.972591][T28486] should_failslab+0x9/0x20 [ 649.977106][T28486] __kmalloc+0x7a/0x310 [ 649.981261][T28486] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 649.986981][T28486] tomoyo_realpath_from_path+0xdc/0x7c0 [ 649.992537][T28486] tomoyo_path_number_perm+0x1e0/0x740 [ 649.997996][T28486] ? trace_lock_acquire+0x190/0x190 [ 650.003204][T28486] ? tomoyo_check_path_acl+0x180/0x180 [ 650.008701][T28486] ? fget_many+0x30/0x30 [ 650.012986][T28486] ? debug_smp_processor_id+0x1c/0x20 [ 650.018364][T28486] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 650.024449][T28486] tomoyo_file_ioctl+0x23/0x30 [ 650.029219][T28486] security_file_ioctl+0x6d/0xd0 [ 650.034166][T28486] __x64_sys_ioctl+0xa3/0x120 [ 650.038866][T28486] do_syscall_64+0xfe/0x140 [ 650.043375][T28486] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.049280][T28486] RIP: 0033:0x459637 16:14:04 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 650.053182][T28486] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 650.072798][T28486] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 650.081227][T28486] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 650.089210][T28486] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 650.089217][T28486] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 650.089222][T28486] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 650.089227][T28486] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 650.114045][T28486] ERROR: Out of memory at tomoyo_realpath_from_path. 16:14:04 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:04 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:04 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:04 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:04 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:04 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:04 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:04 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 650.350572][T28522] FAULT_INJECTION: forcing a failure. [ 650.350572][T28522] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 650.363840][T28522] CPU: 0 PID: 28522 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 650.363849][T28522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 650.363854][T28522] Call Trace: [ 650.363875][T28522] dump_stack+0x1d8/0x2f8 [ 650.363892][T28522] should_fail+0x608/0x860 [ 650.363908][T28522] ? setup_fault_attr+0x2b0/0x2b0 16:14:04 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 650.363922][T28522] ? __bfs+0x550/0x550 [ 650.363993][T28522] ? unwind_next_frame+0x415/0x870 [ 650.364013][T28522] should_fail_alloc_page+0x55/0x60 [ 650.382053][T28522] prepare_alloc_pages+0x283/0x460 [ 650.382067][T28522] __alloc_pages_nodemask+0x11c/0x790 [ 650.382081][T28522] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 650.382092][T28522] ? __lock_acquire+0xcf7/0x1a40 [ 650.382113][T28522] kmem_getpages+0x46/0x480 [ 650.382124][T28522] cache_grow_begin+0x7e/0x2c0 [ 650.382136][T28522] cache_alloc_refill+0x311/0x3f0 [ 650.382153][T28522] ? check_preemption_disabled+0xb7/0x280 [ 650.418559][T28522] __kmalloc+0x2e5/0x310 [ 650.418572][T28522] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 650.418586][T28522] tomoyo_realpath_from_path+0xdc/0x7c0 [ 650.418603][T28522] tomoyo_path_number_perm+0x1e0/0x740 [ 650.438905][T28522] ? trace_lock_acquire+0x190/0x190 [ 650.438924][T28522] ? tomoyo_check_path_acl+0x180/0x180 [ 650.438964][T28522] ? fget_many+0x30/0x30 [ 650.464351][T28522] ? debug_smp_processor_id+0x1c/0x20 [ 650.464365][T28522] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 650.464379][T28522] tomoyo_file_ioctl+0x23/0x30 [ 650.464394][T28522] security_file_ioctl+0x6d/0xd0 [ 650.475381][T28522] __x64_sys_ioctl+0xa3/0x120 [ 650.475397][T28522] do_syscall_64+0xfe/0x140 [ 650.475413][T28522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.475424][T28522] RIP: 0033:0x459637 [ 650.475434][T28522] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:14:04 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:04 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:04 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 650.475439][T28522] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 650.475449][T28522] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 650.475455][T28522] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 650.475466][T28522] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 650.574258][T28522] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 650.574265][T28522] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:04 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:04 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:04 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:04 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:04 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:04 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:04 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 650.868880][T28558] FAULT_INJECTION: forcing a failure. [ 650.868880][T28558] name failslab, interval 1, probability 0, space 0, times 0 [ 650.904934][T28558] CPU: 0 PID: 28558 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 16:14:04 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:04 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 650.912967][T28558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 650.912973][T28558] Call Trace: [ 650.912995][T28558] dump_stack+0x1d8/0x2f8 [ 650.913008][T28558] should_fail+0x608/0x860 [ 650.913020][T28558] ? setup_fault_attr+0x2b0/0x2b0 [ 650.913032][T28558] ? tomoyo_encode2+0x273/0x5a0 [ 650.913050][T28558] __should_failslab+0x11a/0x160 [ 650.913063][T28558] ? tomoyo_encode2+0x273/0x5a0 [ 650.913073][T28558] should_failslab+0x9/0x20 [ 650.913083][T28558] __kmalloc+0x7a/0x310 [ 650.913096][T28558] tomoyo_encode2+0x273/0x5a0 [ 650.913116][T28558] tomoyo_realpath_from_path+0x769/0x7c0 [ 650.973724][T28558] tomoyo_path_number_perm+0x1e0/0x740 [ 650.979190][T28558] ? trace_lock_acquire+0x190/0x190 [ 650.984401][T28558] ? tomoyo_check_path_acl+0x180/0x180 [ 650.989891][T28558] ? fget_many+0x30/0x30 [ 650.994134][T28558] ? debug_smp_processor_id+0x1c/0x20 [ 650.999508][T28558] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 651.005584][T28558] tomoyo_file_ioctl+0x23/0x30 [ 651.010350][T28558] security_file_ioctl+0x6d/0xd0 [ 651.010366][T28558] __x64_sys_ioctl+0xa3/0x120 [ 651.010381][T28558] do_syscall_64+0xfe/0x140 [ 651.010398][T28558] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 651.030369][T28558] RIP: 0033:0x459637 [ 651.030381][T28558] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 651.030387][T28558] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 16:14:05 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:05 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:05 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 651.062304][T28558] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 651.062311][T28558] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 651.062316][T28558] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 651.062322][T28558] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 651.062328][T28558] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 651.097619][T28558] ERROR: Out of memory at tomoyo_realpath_from_path. 16:14:05 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:05 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:05 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:05 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:05 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:05 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 651.379165][T28595] FAULT_INJECTION: forcing a failure. [ 651.379165][T28595] name failslab, interval 1, probability 0, space 0, times 0 [ 651.405422][T28595] CPU: 0 PID: 28595 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 651.413432][T28595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 651.423484][T28595] Call Trace: 16:14:05 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:05 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 651.426791][T28595] dump_stack+0x1d8/0x2f8 [ 651.431125][T28595] should_fail+0x608/0x860 [ 651.435545][T28595] ? setup_fault_attr+0x2b0/0x2b0 [ 651.440578][T28595] __should_failslab+0x11a/0x160 [ 651.445523][T28595] should_failslab+0x9/0x20 [ 651.450028][T28595] kmem_cache_alloc_trace+0x5d/0x2c0 [ 651.455372][T28595] ? __kthread_create_on_node+0x101/0x420 [ 651.461126][T28595] ? loop_set_fd+0x1130/0x1130 [ 651.465895][T28595] __kthread_create_on_node+0x101/0x420 [ 651.471428][T28595] ? kthread_create_on_node+0x130/0x130 [ 651.476968][T28595] ? lockdep_unregister_key+0x660/0x660 [ 651.482505][T28595] ? blkdev_get+0x863/0x9d0 [ 651.487020][T28595] ? loop_set_fd+0xad/0x1130 [ 651.491619][T28595] ? loop_set_fd+0x1130/0x1130 [ 651.496383][T28595] kthread_create_on_node+0xcc/0x130 [ 651.501648][T28595] ? tsk_fork_get_node+0x70/0x70 [ 651.506569][T28595] ? lockdep_init_map+0x2a/0x680 [ 651.511496][T28595] loop_set_fd+0x67d/0x1130 [ 651.515986][T28595] ? match_held_lock+0x280/0x280 [ 651.520907][T28595] lo_ioctl+0x17a/0x2400 [ 651.525147][T28595] ? match_held_lock+0x280/0x280 [ 651.530123][T28595] ? kobj_lookup+0xc2/0x450 [ 651.534675][T28595] ? lo_release+0x1f0/0x1f0 [ 651.545898][T28595] ? match_held_lock+0x280/0x280 [ 651.550837][T28595] ? __bfs+0x550/0x550 [ 651.554893][T28595] ? __bfs+0x550/0x550 [ 651.558952][T28595] ? __bfs+0x550/0x550 [ 651.563007][T28595] ? match_held_lock+0x280/0x280 [ 651.567933][T28595] ? __lock_acquire+0xcf7/0x1a40 [ 651.572855][T28595] ? __bfs+0x550/0x550 [ 651.576916][T28595] ? __lock_acquire+0xcf7/0x1a40 [ 651.581832][T28595] ? __lock_acquire+0xcf7/0x1a40 [ 651.586753][T28595] ? trace_lock_acquire+0x190/0x190 [ 651.591937][T28595] ? __read_once_size_nocheck+0x10/0x10 [ 651.597740][T28595] ? unwind_next_frame+0x415/0x870 [ 651.602856][T28595] ? rcu_lock_release+0x9/0x30 [ 651.607609][T28595] ? stack_trace_save+0x1e0/0x1e0 [ 651.612617][T28595] ? rcu_lock_release+0x26/0x30 [ 651.617452][T28595] ? is_bpf_text_address+0x398/0x3b0 [ 651.622729][T28595] ? stack_trace_save+0x1e0/0x1e0 [ 651.627755][T28595] ? __kernel_text_address+0x9a/0x110 [ 651.633114][T28595] ? unwind_get_return_address+0x4c/0x90 [ 651.638731][T28595] ? arch_stack_walk+0x98/0xe0 [ 651.643492][T28595] ? stack_trace_save+0x111/0x1e0 [ 651.648505][T28595] ? lo_release+0x1f0/0x1f0 [ 651.653050][T28595] blkdev_ioctl+0x917/0x2c10 [ 651.657645][T28595] ? tomoyo_path_number_perm+0x587/0x740 [ 651.663301][T28595] ? trace_hardirqs_off+0x74/0x80 [ 651.668316][T28595] ? quarantine_put+0xb7/0x1f0 [ 651.673065][T28595] ? tomoyo_path_number_perm+0x587/0x740 [ 651.678686][T28595] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 651.683961][T28595] ? __kasan_slab_free+0x19d/0x1e0 [ 651.689084][T28595] ? __kasan_slab_free+0x12a/0x1e0 [ 651.694184][T28595] ? kasan_slab_free+0xe/0x10 [ 651.698853][T28595] ? kfree+0xae/0x120 [ 651.702825][T28595] ? tomoyo_path_number_perm+0x587/0x740 [ 651.708444][T28595] ? tomoyo_file_ioctl+0x23/0x30 [ 651.713367][T28595] ? security_file_ioctl+0x6d/0xd0 [ 651.718466][T28595] ? __x64_sys_ioctl+0xa3/0x120 [ 651.723304][T28595] ? do_syscall_64+0xfe/0x140 [ 651.727972][T28595] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 651.734030][T28595] ? kasan_check_write+0x14/0x20 [ 651.738952][T28595] ? do_raw_spin_lock+0x143/0x3a0 [ 651.743979][T28595] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 651.749778][T28595] ? rcu_lock_release+0x9/0x30 [ 651.754537][T28595] ? tomoyo_path_number_perm+0x5f0/0x740 [ 651.760154][T28595] ? trace_lock_acquire+0x190/0x190 [ 651.765332][T28595] ? tomoyo_check_path_acl+0x180/0x180 [ 651.770768][T28595] block_ioctl+0xbd/0x100 [ 651.775102][T28595] ? blkdev_iopoll+0x100/0x100 [ 651.779850][T28595] do_vfs_ioctl+0x7d4/0x1890 [ 651.784433][T28595] ? ioctl_preallocate+0x240/0x240 [ 651.789541][T28595] ? fget_many+0x30/0x30 [ 651.793771][T28595] ? file_open_root+0x440/0x440 [ 651.798636][T28595] ? tomoyo_file_ioctl+0x23/0x30 [ 651.803577][T28595] ? security_file_ioctl+0xa1/0xd0 [ 651.808677][T28595] __x64_sys_ioctl+0xe3/0x120 [ 651.813350][T28595] do_syscall_64+0xfe/0x140 [ 651.817849][T28595] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 651.823733][T28595] RIP: 0033:0x459637 [ 651.827615][T28595] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 651.847231][T28595] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 651.855644][T28595] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 651.863599][T28595] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 651.871575][T28595] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 16:14:05 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:05 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:05 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 651.879531][T28595] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 651.887505][T28595] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:06 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:06 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:06 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:06 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:06 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:06 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 652.076160][T28612] FAULT_INJECTION: forcing a failure. [ 652.076160][T28612] name failslab, interval 1, probability 0, space 0, times 0 [ 652.108049][T28612] CPU: 0 PID: 28612 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 652.116060][T28612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 652.126125][T28612] Call Trace: [ 652.129437][T28612] dump_stack+0x1d8/0x2f8 [ 652.133771][T28612] should_fail+0x608/0x860 [ 652.138174][T28612] ? setup_fault_attr+0x2b0/0x2b0 [ 652.143201][T28612] __should_failslab+0x11a/0x160 [ 652.148132][T28612] should_failslab+0x9/0x20 [ 652.152616][T28612] kmem_cache_alloc_trace+0x5d/0x2c0 [ 652.157887][T28612] ? __kthread_create_on_node+0x101/0x420 [ 652.163591][T28612] ? loop_set_fd+0x1130/0x1130 [ 652.168364][T28612] __kthread_create_on_node+0x101/0x420 [ 652.173891][T28612] ? kthread_create_on_node+0x130/0x130 [ 652.179417][T28612] ? lockdep_unregister_key+0x660/0x660 [ 652.184951][T28612] ? blkdev_get+0x863/0x9d0 [ 652.189439][T28612] ? loop_set_fd+0xad/0x1130 [ 652.194013][T28612] ? loop_set_fd+0x1130/0x1130 [ 652.198755][T28612] kthread_create_on_node+0xcc/0x130 [ 652.204032][T28612] ? tsk_fork_get_node+0x70/0x70 [ 652.208968][T28612] ? lockdep_init_map+0x2a/0x680 [ 652.213886][T28612] loop_set_fd+0x67d/0x1130 [ 652.218369][T28612] ? match_held_lock+0x280/0x280 [ 652.223297][T28612] lo_ioctl+0x17a/0x2400 [ 652.227529][T28612] ? match_held_lock+0x280/0x280 [ 652.232440][T28612] ? kobj_lookup+0xc2/0x450 [ 652.236929][T28612] ? lo_release+0x1f0/0x1f0 [ 652.241408][T28612] ? match_held_lock+0x280/0x280 [ 652.246409][T28612] ? __bfs+0x550/0x550 [ 652.250453][T28612] ? __bfs+0x550/0x550 [ 652.254499][T28612] ? __bfs+0x550/0x550 [ 652.258540][T28612] ? match_held_lock+0x280/0x280 [ 652.263467][T28612] ? __lock_acquire+0xcf7/0x1a40 [ 652.268411][T28612] ? __bfs+0x550/0x550 [ 652.272986][T28612] ? __lock_acquire+0xcf7/0x1a40 [ 652.277919][T28612] ? __lock_acquire+0xcf7/0x1a40 [ 652.282854][T28612] ? trace_lock_acquire+0x190/0x190 [ 652.288050][T28612] ? __read_once_size_nocheck+0x10/0x10 [ 652.293594][T28612] ? unwind_next_frame+0x415/0x870 [ 652.298799][T28612] ? rcu_lock_release+0x9/0x30 [ 652.303553][T28612] ? stack_trace_save+0x1e0/0x1e0 [ 652.308563][T28612] ? rcu_lock_release+0x26/0x30 [ 652.313388][T28612] ? is_bpf_text_address+0x398/0x3b0 [ 652.318649][T28612] ? stack_trace_save+0x1e0/0x1e0 [ 652.323657][T28612] ? __kernel_text_address+0x9a/0x110 [ 652.329018][T28612] ? unwind_get_return_address+0x4c/0x90 [ 652.334630][T28612] ? arch_stack_walk+0x98/0xe0 [ 652.339375][T28612] ? stack_trace_save+0x111/0x1e0 [ 652.344387][T28612] ? lo_release+0x1f0/0x1f0 [ 652.348877][T28612] blkdev_ioctl+0x917/0x2c10 [ 652.353446][T28612] ? tomoyo_path_number_perm+0x587/0x740 [ 652.359058][T28612] ? trace_hardirqs_off+0x74/0x80 [ 652.364068][T28612] ? quarantine_put+0xb7/0x1f0 [ 652.368819][T28612] ? tomoyo_path_number_perm+0x587/0x740 [ 652.374426][T28612] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 652.379685][T28612] ? __kasan_slab_free+0x19d/0x1e0 [ 652.384784][T28612] ? __kasan_slab_free+0x12a/0x1e0 [ 652.389879][T28612] ? kasan_slab_free+0xe/0x10 [ 652.394534][T28612] ? kfree+0xae/0x120 [ 652.398493][T28612] ? tomoyo_path_number_perm+0x587/0x740 [ 652.404113][T28612] ? tomoyo_file_ioctl+0x23/0x30 [ 652.409054][T28612] ? security_file_ioctl+0x6d/0xd0 [ 652.414146][T28612] ? __x64_sys_ioctl+0xa3/0x120 [ 652.418992][T28612] ? do_syscall_64+0xfe/0x140 [ 652.423673][T28612] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 652.429734][T28612] ? kasan_check_write+0x14/0x20 [ 652.434650][T28612] ? do_raw_spin_lock+0x143/0x3a0 [ 652.439663][T28612] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 652.445540][T28612] ? rcu_lock_release+0x9/0x30 [ 652.450282][T28612] ? tomoyo_path_number_perm+0x5f0/0x740 [ 652.455909][T28612] ? trace_lock_acquire+0x190/0x190 [ 652.461098][T28612] ? tomoyo_check_path_acl+0x180/0x180 [ 652.466537][T28612] block_ioctl+0xbd/0x100 [ 652.470841][T28612] ? blkdev_iopoll+0x100/0x100 [ 652.475584][T28612] do_vfs_ioctl+0x7d4/0x1890 [ 652.480152][T28612] ? ioctl_preallocate+0x240/0x240 [ 652.485246][T28612] ? fget_many+0x30/0x30 [ 652.489465][T28612] ? file_open_root+0x440/0x440 [ 652.494310][T28612] ? tomoyo_file_ioctl+0x23/0x30 [ 652.499225][T28612] ? security_file_ioctl+0xa1/0xd0 [ 652.504323][T28612] __x64_sys_ioctl+0xe3/0x120 [ 652.508989][T28612] do_syscall_64+0xfe/0x140 [ 652.513475][T28612] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 652.519342][T28612] RIP: 0033:0x459637 [ 652.523221][T28612] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 652.549434][T28612] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 652.557846][T28612] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 652.565800][T28612] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 652.573750][T28612] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 652.581731][T28612] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 652.589694][T28612] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:06 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:06 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:06 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:06 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:06 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:06 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:06 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:06 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 652.888023][T28638] FAULT_INJECTION: forcing a failure. [ 652.888023][T28638] name failslab, interval 1, probability 0, space 0, times 0 16:14:07 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 652.958625][T28638] CPU: 1 PID: 28638 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 652.966656][T28638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 652.976718][T28638] Call Trace: [ 652.980023][T28638] dump_stack+0x1d8/0x2f8 [ 652.984366][T28638] should_fail+0x608/0x860 [ 652.988791][T28638] ? setup_fault_attr+0x2b0/0x2b0 [ 652.993830][T28638] ? tomoyo_encode2+0x273/0x5a0 [ 652.998702][T28638] __should_failslab+0x11a/0x160 [ 653.003657][T28638] ? tomoyo_encode2+0x273/0x5a0 [ 653.008510][T28638] should_failslab+0x9/0x20 [ 653.013012][T28638] __kmalloc+0x7a/0x310 [ 653.017178][T28638] tomoyo_encode2+0x273/0x5a0 [ 653.021870][T28638] tomoyo_realpath_from_path+0x769/0x7c0 [ 653.027514][T28638] tomoyo_path_number_perm+0x1e0/0x740 [ 653.032976][T28638] ? trace_lock_acquire+0x190/0x190 [ 653.038324][T28638] ? tomoyo_check_path_acl+0x180/0x180 [ 653.043824][T28638] ? fget_many+0x30/0x30 [ 653.048254][T28638] ? debug_smp_processor_id+0x1c/0x20 [ 653.053629][T28638] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 653.059699][T28638] tomoyo_file_ioctl+0x23/0x30 [ 653.064470][T28638] security_file_ioctl+0x6d/0xd0 [ 653.069414][T28638] __x64_sys_ioctl+0xa3/0x120 [ 653.074098][T28638] do_syscall_64+0xfe/0x140 [ 653.078616][T28638] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 653.084508][T28638] RIP: 0033:0x459637 [ 653.088403][T28638] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:14:07 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:07 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:07 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:07 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 653.108019][T28638] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 653.116447][T28638] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 653.124429][T28638] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 653.132398][T28638] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 653.140367][T28638] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 653.148341][T28638] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 653.163204][T28638] ERROR: Out of memory at tomoyo_realpath_from_path. 16:14:07 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:07 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:07 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:07 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:07 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:07 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:07 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:07 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:07 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:07 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:07 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 653.571316][T28691] FAULT_INJECTION: forcing a failure. [ 653.571316][T28691] name failslab, interval 1, probability 0, space 0, times 0 [ 653.598491][T28691] CPU: 1 PID: 28691 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 653.606523][T28691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 653.616605][T28691] Call Trace: [ 653.619904][T28691] dump_stack+0x1d8/0x2f8 [ 653.624253][T28691] should_fail+0x608/0x860 [ 653.628671][T28691] ? setup_fault_attr+0x2b0/0x2b0 [ 653.633706][T28691] __should_failslab+0x11a/0x160 [ 653.638713][T28691] ? __kernfs_new_node+0xd9/0x6e0 [ 653.643746][T28691] should_failslab+0x9/0x20 [ 653.648261][T28691] kmem_cache_alloc+0x56/0x2b0 [ 653.653041][T28691] __kernfs_new_node+0xd9/0x6e0 [ 653.657902][T28691] ? kasan_check_write+0x14/0x20 [ 653.662845][T28691] ? __mutex_unlock_slowpath+0x18c/0x630 16:14:07 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 653.668484][T28691] ? mutex_unlock+0x10/0x10 [ 653.673002][T28691] ? kernfs_new_node+0x170/0x170 [ 653.677960][T28691] ? mutex_unlock+0xd/0x10 [ 653.682390][T28691] ? kernfs_activate+0x4c7/0x4e0 [ 653.687333][T28691] kernfs_new_node+0x97/0x170 [ 653.692004][T28691] __kernfs_create_file+0x4a/0x2f0 [ 653.697144][T28691] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 653.702516][T28691] internal_create_group+0x511/0xde0 [ 653.707794][T28691] ? sysfs_create_group+0x30/0x30 [ 653.712799][T28691] ? up_write+0xb0/0x1b0 [ 653.717020][T28691] sysfs_create_group+0x1f/0x30 [ 653.721849][T28691] loop_set_fd+0xc7c/0x1130 [ 653.726349][T28691] lo_ioctl+0x17a/0x2400 [ 653.730571][T28691] ? match_held_lock+0x280/0x280 [ 653.735485][T28691] ? kobj_lookup+0xc2/0x450 [ 653.739967][T28691] ? lo_release+0x1f0/0x1f0 [ 653.744449][T28691] ? match_held_lock+0x280/0x280 [ 653.749362][T28691] ? __bfs+0x550/0x550 [ 653.753403][T28691] ? __lock_acquire+0xcf7/0x1a40 [ 653.758319][T28691] ? __bfs+0x550/0x550 [ 653.762364][T28691] ? match_held_lock+0x280/0x280 [ 653.767280][T28691] ? __lock_acquire+0xcf7/0x1a40 [ 653.772198][T28691] ? __bfs+0x550/0x550 [ 653.776248][T28691] ? __lock_acquire+0xcf7/0x1a40 [ 653.781217][T28691] ? __lock_acquire+0xcf7/0x1a40 [ 653.786137][T28691] ? trace_lock_acquire+0x190/0x190 [ 653.791340][T28691] ? __read_once_size_nocheck+0x10/0x10 [ 653.796865][T28691] ? unwind_next_frame+0x415/0x870 [ 653.801959][T28691] ? rcu_lock_release+0x9/0x30 [ 653.806727][T28691] ? stack_trace_save+0x1e0/0x1e0 [ 653.811729][T28691] ? rcu_lock_release+0x26/0x30 [ 653.816556][T28691] ? is_bpf_text_address+0x398/0x3b0 [ 653.821824][T28691] ? stack_trace_save+0x1e0/0x1e0 [ 653.826827][T28691] ? __kernel_text_address+0x9a/0x110 [ 653.832174][T28691] ? unwind_get_return_address+0x4c/0x90 [ 653.837785][T28691] ? arch_stack_walk+0x98/0xe0 [ 653.842545][T28691] ? stack_trace_save+0x111/0x1e0 [ 653.847545][T28691] ? lo_release+0x1f0/0x1f0 [ 653.852044][T28691] blkdev_ioctl+0x917/0x2c10 [ 653.856617][T28691] ? tomoyo_path_number_perm+0x587/0x740 [ 653.862227][T28691] ? trace_hardirqs_off+0x74/0x80 [ 653.867228][T28691] ? quarantine_put+0xb7/0x1f0 [ 653.871994][T28691] ? tomoyo_path_number_perm+0x587/0x740 [ 653.877605][T28691] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 653.882867][T28691] ? __kasan_slab_free+0x19d/0x1e0 [ 653.887950][T28691] ? __kasan_slab_free+0x12a/0x1e0 [ 653.893070][T28691] ? kasan_slab_free+0xe/0x10 [ 653.897723][T28691] ? kfree+0xae/0x120 [ 653.901678][T28691] ? tomoyo_path_number_perm+0x587/0x740 [ 653.907306][T28691] ? tomoyo_file_ioctl+0x23/0x30 [ 653.912243][T28691] ? security_file_ioctl+0x6d/0xd0 [ 653.917333][T28691] ? __x64_sys_ioctl+0xa3/0x120 [ 653.922160][T28691] ? do_syscall_64+0xfe/0x140 [ 653.926817][T28691] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 653.932865][T28691] ? kasan_check_write+0x14/0x20 [ 653.937800][T28691] ? do_raw_spin_lock+0x143/0x3a0 [ 653.942815][T28691] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 653.948618][T28691] ? rcu_lock_release+0x9/0x30 [ 653.953364][T28691] ? tomoyo_path_number_perm+0x5f0/0x740 [ 653.958995][T28691] ? trace_lock_acquire+0x190/0x190 [ 653.964182][T28691] ? tomoyo_check_path_acl+0x180/0x180 [ 653.969637][T28691] block_ioctl+0xbd/0x100 [ 653.973967][T28691] ? blkdev_iopoll+0x100/0x100 [ 653.978724][T28691] do_vfs_ioctl+0x7d4/0x1890 [ 653.983328][T28691] ? ioctl_preallocate+0x240/0x240 [ 653.988448][T28691] ? fget_many+0x30/0x30 [ 653.992670][T28691] ? debug_smp_processor_id+0x1c/0x20 [ 653.998019][T28691] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 654.004063][T28691] ? tomoyo_file_ioctl+0x23/0x30 [ 654.008976][T28691] ? security_file_ioctl+0xa1/0xd0 [ 654.014066][T28691] __x64_sys_ioctl+0xe3/0x120 [ 654.018742][T28691] do_syscall_64+0xfe/0x140 [ 654.023247][T28691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 654.029127][T28691] RIP: 0033:0x459637 [ 654.033001][T28691] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 654.052685][T28691] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 654.061084][T28691] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 654.069041][T28691] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 654.076998][T28691] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 654.084980][T28691] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 654.092937][T28691] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:08 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:08 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:08 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:08 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:08 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:08 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:08 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:08 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:08 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 654.322993][T28718] FAULT_INJECTION: forcing a failure. [ 654.322993][T28718] name failslab, interval 1, probability 0, space 0, times 0 [ 654.342690][T28718] CPU: 1 PID: 28718 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 654.350691][T28718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 654.360746][T28718] Call Trace: [ 654.364037][T28718] dump_stack+0x1d8/0x2f8 [ 654.368369][T28718] should_fail+0x608/0x860 16:14:08 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 654.372786][T28718] ? setup_fault_attr+0x2b0/0x2b0 [ 654.377825][T28718] __should_failslab+0x11a/0x160 [ 654.382775][T28718] ? __kernfs_new_node+0xd9/0x6e0 [ 654.387796][T28718] should_failslab+0x9/0x20 [ 654.392301][T28718] kmem_cache_alloc+0x56/0x2b0 [ 654.397060][T28718] __kernfs_new_node+0xd9/0x6e0 [ 654.401903][T28718] ? kasan_check_write+0x14/0x20 [ 654.406831][T28718] ? __mutex_unlock_slowpath+0x18c/0x630 [ 654.412451][T28718] ? mutex_unlock+0x10/0x10 [ 654.416951][T28718] ? kernfs_new_node+0x170/0x170 [ 654.421882][T28718] ? mutex_unlock+0xd/0x10 [ 654.426295][T28718] ? kernfs_activate+0x4c7/0x4e0 [ 654.431230][T28718] kernfs_new_node+0x97/0x170 [ 654.435920][T28718] __kernfs_create_file+0x4a/0x2f0 [ 654.441044][T28718] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 654.446419][T28718] internal_create_group+0x511/0xde0 [ 654.451704][T28718] ? sysfs_create_group+0x30/0x30 [ 654.456725][T28718] ? up_write+0xb0/0x1b0 [ 654.460962][T28718] sysfs_create_group+0x1f/0x30 [ 654.465806][T28718] loop_set_fd+0xc7c/0x1130 16:14:08 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 654.470308][T28718] lo_ioctl+0x17a/0x2400 [ 654.474543][T28718] ? match_held_lock+0x280/0x280 [ 654.479467][T28718] ? kobj_lookup+0xc2/0x450 [ 654.483993][T28718] ? lo_release+0x1f0/0x1f0 [ 654.488496][T28718] ? match_held_lock+0x280/0x280 [ 654.493435][T28718] ? __bfs+0x550/0x550 [ 654.497497][T28718] ? __lock_acquire+0xcf7/0x1a40 [ 654.502431][T28718] ? __bfs+0x550/0x550 [ 654.506491][T28718] ? match_held_lock+0x280/0x280 [ 654.511431][T28718] ? __lock_acquire+0xcf7/0x1a40 [ 654.516347][T28718] ? __bfs+0x550/0x550 [ 654.520392][T28718] ? __lock_acquire+0xcf7/0x1a40 [ 654.525311][T28718] ? __lock_acquire+0xcf7/0x1a40 [ 654.532017][T28718] ? trace_lock_acquire+0x190/0x190 [ 654.539555][T28718] ? __read_once_size_nocheck+0x10/0x10 [ 654.545106][T28718] ? unwind_next_frame+0x415/0x870 [ 654.550249][T28718] ? rcu_lock_release+0x9/0x30 [ 654.555026][T28718] ? stack_trace_save+0x1e0/0x1e0 [ 654.560039][T28718] ? rcu_lock_release+0x26/0x30 [ 654.564874][T28718] ? is_bpf_text_address+0x398/0x3b0 [ 654.570166][T28718] ? stack_trace_save+0x1e0/0x1e0 [ 654.575180][T28718] ? __kernel_text_address+0x9a/0x110 [ 654.580554][T28718] ? unwind_get_return_address+0x4c/0x90 [ 654.586674][T28718] ? arch_stack_walk+0x98/0xe0 [ 654.591427][T28718] ? stack_trace_save+0x111/0x1e0 [ 654.596435][T28718] ? lo_release+0x1f0/0x1f0 [ 654.600941][T28718] blkdev_ioctl+0x917/0x2c10 [ 654.605515][T28718] ? tomoyo_path_number_perm+0x587/0x740 [ 654.611123][T28718] ? trace_hardirqs_off+0x74/0x80 [ 654.616139][T28718] ? quarantine_put+0xb7/0x1f0 [ 654.620878][T28718] ? tomoyo_path_number_perm+0x587/0x740 [ 654.626488][T28718] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 654.631752][T28718] ? __kasan_slab_free+0x19d/0x1e0 [ 654.636838][T28718] ? __kasan_slab_free+0x12a/0x1e0 [ 654.641919][T28718] ? kasan_slab_free+0xe/0x10 [ 654.646567][T28718] ? kfree+0xae/0x120 [ 654.650524][T28718] ? tomoyo_path_number_perm+0x587/0x740 [ 654.656132][T28718] ? tomoyo_file_ioctl+0x23/0x30 [ 654.661046][T28718] ? security_file_ioctl+0x6d/0xd0 [ 654.666155][T28718] ? __x64_sys_ioctl+0xa3/0x120 [ 654.670981][T28718] ? do_syscall_64+0xfe/0x140 [ 654.675653][T28718] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 654.681718][T28718] ? kasan_check_write+0x14/0x20 [ 654.686632][T28718] ? do_raw_spin_lock+0x143/0x3a0 [ 654.691639][T28718] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 654.697426][T28718] ? rcu_lock_release+0x9/0x30 [ 654.702169][T28718] ? tomoyo_path_number_perm+0x5f0/0x740 [ 654.707781][T28718] ? trace_lock_acquire+0x190/0x190 [ 654.712960][T28718] ? tomoyo_check_path_acl+0x180/0x180 [ 654.718397][T28718] block_ioctl+0xbd/0x100 [ 654.722707][T28718] ? blkdev_iopoll+0x100/0x100 [ 654.728063][T28718] do_vfs_ioctl+0x7d4/0x1890 [ 654.732635][T28718] ? ioctl_preallocate+0x240/0x240 [ 654.737728][T28718] ? fget_many+0x30/0x30 [ 654.741960][T28718] ? file_open_root+0x440/0x440 [ 654.746790][T28718] ? tomoyo_file_ioctl+0x23/0x30 [ 654.751721][T28718] ? security_file_ioctl+0xa1/0xd0 [ 654.756810][T28718] __x64_sys_ioctl+0xe3/0x120 [ 654.761463][T28718] do_syscall_64+0xfe/0x140 [ 654.766572][T28718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 654.772461][T28718] RIP: 0033:0x459637 [ 654.776346][T28718] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 654.795952][T28718] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 654.804349][T28718] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 654.812303][T28718] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 654.820261][T28718] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 654.828213][T28718] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 654.836179][T28718] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:09 executing program 1 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:09 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:09 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:09 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:09 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:09 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 655.074903][T28739] FAULT_INJECTION: forcing a failure. [ 655.074903][T28739] name failslab, interval 1, probability 0, space 0, times 0 [ 655.087921][T28739] CPU: 1 PID: 28739 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 655.095918][T28739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 655.105985][T28739] Call Trace: [ 655.109281][T28739] dump_stack+0x1d8/0x2f8 [ 655.113618][T28739] should_fail+0x608/0x860 [ 655.118045][T28739] ? setup_fault_attr+0x2b0/0x2b0 16:14:09 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 655.123076][T28739] __should_failslab+0x11a/0x160 [ 655.128020][T28739] ? radix_tree_node_alloc+0x1a1/0x370 [ 655.133479][T28739] should_failslab+0x9/0x20 [ 655.137985][T28739] kmem_cache_alloc+0x56/0x2b0 [ 655.142748][T28739] ? radix_tree_node_alloc+0x1a1/0x370 [ 655.148236][T28739] radix_tree_node_alloc+0x1a1/0x370 [ 655.153555][T28739] ? __lock_acquire+0xcf7/0x1a40 [ 655.158486][T28739] ? loop_set_fd+0xc7c/0x1130 [ 655.163154][T28739] idr_get_free+0x2a8/0x850 [ 655.167656][T28739] idr_alloc_cyclic+0x1ff/0x600 [ 655.172501][T28739] ? idr_alloc+0x300/0x300 [ 655.176904][T28739] ? __rwlock_init+0x130/0x130 [ 655.181685][T28739] __kernfs_new_node+0x159/0x6e0 [ 655.186613][T28739] ? kernfs_new_node+0x170/0x170 [ 655.191557][T28739] ? trace_lock_acquire+0x190/0x190 [ 655.196758][T28739] kernfs_create_dir_ns+0x9b/0x230 [ 655.201865][T28739] internal_create_group+0x234/0xde0 [ 655.207150][T28739] ? bd_set_size+0x97/0xb0 [ 655.211546][T28739] ? sysfs_create_group+0x30/0x30 [ 655.216550][T28739] ? up_write+0xb0/0x1b0 [ 655.220783][T28739] sysfs_create_group+0x1f/0x30 [ 655.225637][T28739] loop_set_fd+0xc7c/0x1130 [ 655.230134][T28739] lo_ioctl+0x17a/0x2400 [ 655.234366][T28739] ? match_held_lock+0x280/0x280 [ 655.239299][T28739] ? kobj_lookup+0xc2/0x450 [ 655.243785][T28739] ? lo_release+0x1f0/0x1f0 [ 655.248274][T28739] ? match_held_lock+0x280/0x280 [ 655.253219][T28739] ? __bfs+0x550/0x550 [ 655.257286][T28739] ? __bfs+0x550/0x550 [ 655.261345][T28739] ? __bfs+0x550/0x550 [ 655.265399][T28739] ? match_held_lock+0x280/0x280 [ 655.270320][T28739] ? __lock_acquire+0xcf7/0x1a40 [ 655.275244][T28739] ? __bfs+0x550/0x550 [ 655.279294][T28739] ? __lock_acquire+0xcf7/0x1a40 [ 655.284219][T28739] ? __lock_acquire+0xcf7/0x1a40 [ 655.289152][T28739] ? trace_lock_acquire+0x190/0x190 [ 655.294352][T28739] ? __read_once_size_nocheck+0x10/0x10 [ 655.299886][T28739] ? unwind_next_frame+0x415/0x870 [ 655.305010][T28739] ? rcu_lock_release+0x9/0x30 [ 655.309753][T28739] ? stack_trace_save+0x1e0/0x1e0 [ 655.314771][T28739] ? rcu_lock_release+0x26/0x30 [ 655.319599][T28739] ? is_bpf_text_address+0x398/0x3b0 [ 655.324863][T28739] ? stack_trace_save+0x1e0/0x1e0 [ 655.329873][T28739] ? __kernel_text_address+0x9a/0x110 [ 655.335262][T28739] ? unwind_get_return_address+0x4c/0x90 [ 655.340876][T28739] ? arch_stack_walk+0x98/0xe0 [ 655.345625][T28739] ? stack_trace_save+0x111/0x1e0 [ 655.350657][T28739] ? lo_release+0x1f0/0x1f0 [ 655.355146][T28739] blkdev_ioctl+0x917/0x2c10 [ 655.359722][T28739] ? tomoyo_path_number_perm+0x587/0x740 [ 655.365339][T28739] ? trace_hardirqs_off+0x74/0x80 [ 655.370363][T28739] ? quarantine_put+0xb7/0x1f0 [ 655.375114][T28739] ? tomoyo_path_number_perm+0x587/0x740 [ 655.380764][T28739] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 655.386038][T28739] ? __kasan_slab_free+0x19d/0x1e0 [ 655.391147][T28739] ? __kasan_slab_free+0x12a/0x1e0 [ 655.396257][T28739] ? kasan_slab_free+0xe/0x10 [ 655.400925][T28739] ? kfree+0xae/0x120 [ 655.404897][T28739] ? tomoyo_path_number_perm+0x587/0x740 [ 655.410520][T28739] ? tomoyo_file_ioctl+0x23/0x30 [ 655.415454][T28739] ? security_file_ioctl+0x6d/0xd0 [ 655.420559][T28739] ? __x64_sys_ioctl+0xa3/0x120 [ 655.425404][T28739] ? do_syscall_64+0xfe/0x140 [ 655.430090][T28739] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 655.436197][T28739] ? kasan_check_write+0x14/0x20 [ 655.441130][T28739] ? do_raw_spin_lock+0x143/0x3a0 [ 655.446160][T28739] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 655.452005][T28739] ? rcu_lock_release+0x9/0x30 [ 655.456769][T28739] ? tomoyo_path_number_perm+0x5f0/0x740 [ 655.462421][T28739] ? trace_lock_acquire+0x190/0x190 [ 655.467621][T28739] ? tomoyo_check_path_acl+0x180/0x180 [ 655.473076][T28739] block_ioctl+0xbd/0x100 [ 655.477397][T28739] ? blkdev_iopoll+0x100/0x100 [ 655.482156][T28739] do_vfs_ioctl+0x7d4/0x1890 [ 655.486746][T28739] ? ioctl_preallocate+0x240/0x240 [ 655.491860][T28739] ? fget_many+0x30/0x30 [ 655.496114][T28739] ? debug_smp_processor_id+0x1c/0x20 [ 655.501497][T28739] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 655.507560][T28739] ? tomoyo_file_ioctl+0x23/0x30 [ 655.512505][T28739] ? security_file_ioctl+0xa1/0xd0 [ 655.517642][T28739] __x64_sys_ioctl+0xe3/0x120 [ 655.522333][T28739] do_syscall_64+0xfe/0x140 [ 655.526833][T28739] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 655.532726][T28739] RIP: 0033:0x459637 [ 655.536606][T28739] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 655.556200][T28739] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 655.564619][T28739] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 655.572597][T28739] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 655.580555][T28739] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 655.588602][T28739] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 655.596564][T28739] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:09 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:09 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:09 executing program 1 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:09 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:09 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:09 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:09 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:10 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 655.941107][T28774] FAULT_INJECTION: forcing a failure. [ 655.941107][T28774] name failslab, interval 1, probability 0, space 0, times 0 [ 655.978055][T28774] CPU: 1 PID: 28774 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 16:14:10 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:10 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 655.986098][T28774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 655.996216][T28774] Call Trace: [ 655.999518][T28774] dump_stack+0x1d8/0x2f8 [ 656.003858][T28774] should_fail+0x608/0x860 [ 656.008291][T28774] ? setup_fault_attr+0x2b0/0x2b0 [ 656.013365][T28774] __should_failslab+0x11a/0x160 [ 656.018303][T28774] ? __kernfs_new_node+0xd9/0x6e0 [ 656.023330][T28774] should_failslab+0x9/0x20 [ 656.027830][T28774] kmem_cache_alloc+0x56/0x2b0 [ 656.032620][T28774] __kernfs_new_node+0xd9/0x6e0 [ 656.037470][T28774] ? kasan_check_write+0x14/0x20 [ 656.042402][T28774] ? __mutex_unlock_slowpath+0x18c/0x630 [ 656.048028][T28774] ? mutex_unlock+0x10/0x10 [ 656.052527][T28774] ? kernfs_new_node+0x170/0x170 [ 656.057462][T28774] ? mutex_unlock+0xd/0x10 [ 656.061877][T28774] ? kernfs_activate+0x4c7/0x4e0 [ 656.066842][T28774] kernfs_new_node+0x97/0x170 [ 656.071540][T28774] __kernfs_create_file+0x4a/0x2f0 [ 656.076662][T28774] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 656.082044][T28774] internal_create_group+0x511/0xde0 [ 656.087327][T28774] ? sysfs_create_group+0x30/0x30 [ 656.092341][T28774] ? up_write+0xb0/0x1b0 [ 656.096576][T28774] sysfs_create_group+0x1f/0x30 [ 656.101421][T28774] loop_set_fd+0xc7c/0x1130 [ 656.105967][T28774] lo_ioctl+0x17a/0x2400 [ 656.110209][T28774] ? match_held_lock+0x280/0x280 [ 656.115158][T28774] ? kobj_lookup+0xc2/0x450 [ 656.119673][T28774] ? lo_release+0x1f0/0x1f0 [ 656.124175][T28774] ? match_held_lock+0x280/0x280 [ 656.129134][T28774] ? __bfs+0x550/0x550 [ 656.133199][T28774] ? __bfs+0x550/0x550 [ 656.137271][T28774] ? __mutex_lock_common+0x56b/0x2fc0 [ 656.142638][T28774] ? __bfs+0x550/0x550 [ 656.146700][T28774] ? match_held_lock+0x280/0x280 [ 656.151663][T28774] ? __lock_acquire+0xcf7/0x1a40 [ 656.156602][T28774] ? __bfs+0x550/0x550 [ 656.160663][T28774] ? __lock_acquire+0xcf7/0x1a40 [ 656.165594][T28774] ? __lock_acquire+0xcf7/0x1a40 [ 656.170527][T28774] ? trace_lock_acquire+0x190/0x190 [ 656.175727][T28774] ? __read_once_size_nocheck+0x10/0x10 [ 656.181283][T28774] ? unwind_next_frame+0x415/0x870 [ 656.186391][T28774] ? rcu_lock_release+0x9/0x30 [ 656.191143][T28774] ? stack_trace_save+0x1e0/0x1e0 [ 656.196184][T28774] ? rcu_lock_release+0x26/0x30 [ 656.201363][T28774] ? is_bpf_text_address+0x398/0x3b0 [ 656.206637][T28774] ? stack_trace_save+0x1e0/0x1e0 [ 656.211648][T28774] ? __kernel_text_address+0x9a/0x110 [ 656.217184][T28774] ? unwind_get_return_address+0x4c/0x90 [ 656.222918][T28774] ? arch_stack_walk+0x98/0xe0 [ 656.227675][T28774] ? stack_trace_save+0x111/0x1e0 [ 656.232688][T28774] ? lo_release+0x1f0/0x1f0 [ 656.237180][T28774] blkdev_ioctl+0x917/0x2c10 [ 656.241758][T28774] ? tomoyo_path_number_perm+0x587/0x740 [ 656.247489][T28774] ? trace_hardirqs_off+0x74/0x80 [ 656.252521][T28774] ? quarantine_put+0xb7/0x1f0 [ 656.257268][T28774] ? tomoyo_path_number_perm+0x587/0x740 [ 656.262887][T28774] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 656.268181][T28774] ? __kasan_slab_free+0x19d/0x1e0 [ 656.273297][T28774] ? __kasan_slab_free+0x12a/0x1e0 [ 656.278390][T28774] ? kasan_slab_free+0xe/0x10 [ 656.283052][T28774] ? kfree+0xae/0x120 [ 656.287018][T28774] ? tomoyo_path_number_perm+0x587/0x740 [ 656.292629][T28774] ? tomoyo_file_ioctl+0x23/0x30 [ 656.297552][T28774] ? security_file_ioctl+0x6d/0xd0 [ 656.302654][T28774] ? __x64_sys_ioctl+0xa3/0x120 [ 656.307484][T28774] ? do_syscall_64+0xfe/0x140 [ 656.312139][T28774] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 656.318211][T28774] ? kasan_check_write+0x14/0x20 [ 656.323130][T28774] ? do_raw_spin_lock+0x143/0x3a0 [ 656.328145][T28774] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 656.333969][T28774] ? rcu_lock_release+0x9/0x30 [ 656.338810][T28774] ? tomoyo_path_number_perm+0x5f0/0x740 [ 656.344453][T28774] ? trace_lock_acquire+0x190/0x190 [ 656.349655][T28774] ? tomoyo_check_path_acl+0x180/0x180 [ 656.355363][T28774] block_ioctl+0xbd/0x100 [ 656.359686][T28774] ? blkdev_iopoll+0x100/0x100 [ 656.364441][T28774] do_vfs_ioctl+0x7d4/0x1890 [ 656.369023][T28774] ? ioctl_preallocate+0x240/0x240 [ 656.374144][T28774] ? fget_many+0x30/0x30 [ 656.378415][T28774] ? debug_smp_processor_id+0x1c/0x20 [ 656.383797][T28774] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 656.389880][T28774] ? tomoyo_file_ioctl+0x23/0x30 [ 656.394816][T28774] ? security_file_ioctl+0xa1/0xd0 [ 656.399909][T28774] __x64_sys_ioctl+0xe3/0x120 [ 656.404574][T28774] do_syscall_64+0xfe/0x140 [ 656.409075][T28774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 656.414953][T28774] RIP: 0033:0x459637 [ 656.418998][T28774] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:14:10 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 656.438608][T28774] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 656.447009][T28774] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 656.454968][T28774] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 656.463017][T28774] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 656.471000][T28774] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 656.478959][T28774] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:10 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:10 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:10 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:10 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:10 executing program 1 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:10 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:10 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:10 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 656.830076][T28810] FAULT_INJECTION: forcing a failure. [ 656.830076][T28810] name failslab, interval 1, probability 0, space 0, times 0 [ 656.850774][T28810] CPU: 1 PID: 28810 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 656.858796][T28810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 656.868850][T28810] Call Trace: [ 656.872145][T28810] dump_stack+0x1d8/0x2f8 16:14:10 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:10 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 656.876482][T28810] should_fail+0x608/0x860 [ 656.880901][T28810] ? setup_fault_attr+0x2b0/0x2b0 [ 656.885936][T28810] __should_failslab+0x11a/0x160 [ 656.890889][T28810] ? __kernfs_new_node+0xd9/0x6e0 [ 656.895910][T28810] should_failslab+0x9/0x20 [ 656.900420][T28810] kmem_cache_alloc+0x56/0x2b0 [ 656.905176][T28810] __kernfs_new_node+0xd9/0x6e0 [ 656.910018][T28810] ? kasan_check_write+0x14/0x20 [ 656.914934][T28810] ? __mutex_unlock_slowpath+0x18c/0x630 [ 656.920585][T28810] ? mutex_unlock+0x10/0x10 [ 656.925113][T28810] ? kernfs_new_node+0x170/0x170 [ 656.930042][T28810] ? mutex_unlock+0xd/0x10 [ 656.934441][T28810] ? kernfs_activate+0x4c7/0x4e0 [ 656.939360][T28810] kernfs_new_node+0x97/0x170 [ 656.944044][T28810] __kernfs_create_file+0x4a/0x2f0 [ 656.949154][T28810] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 656.954529][T28810] internal_create_group+0x511/0xde0 [ 656.959803][T28810] ? sysfs_create_group+0x30/0x30 [ 656.964810][T28810] ? up_write+0xb0/0x1b0 [ 656.969036][T28810] sysfs_create_group+0x1f/0x30 [ 656.973867][T28810] loop_set_fd+0xc7c/0x1130 [ 656.978360][T28810] lo_ioctl+0x17a/0x2400 [ 656.982594][T28810] ? match_held_lock+0x280/0x280 [ 656.987538][T28810] ? kobj_lookup+0xc2/0x450 [ 656.992063][T28810] ? lo_release+0x1f0/0x1f0 [ 656.996550][T28810] ? match_held_lock+0x280/0x280 [ 657.001576][T28810] ? __bfs+0x550/0x550 [ 657.005629][T28810] ? __bfs+0x550/0x550 [ 657.009688][T28810] ? __bfs+0x550/0x550 [ 657.013748][T28810] ? match_held_lock+0x280/0x280 [ 657.018696][T28810] ? __bfs+0x550/0x550 [ 657.022745][T28810] ? __bfs+0x550/0x550 [ 657.026793][T28810] ? __bfs+0x550/0x550 [ 657.030842][T28810] ? __lock_acquire+0xcf7/0x1a40 [ 657.035788][T28810] ? __lock_acquire+0xcf7/0x1a40 [ 657.040705][T28810] ? __lock_acquire+0xcf7/0x1a40 [ 657.045628][T28810] ? trace_lock_acquire+0x190/0x190 [ 657.050814][T28810] ? __read_once_size_nocheck+0x10/0x10 [ 657.056357][T28810] ? unwind_next_frame+0x415/0x870 [ 657.061457][T28810] ? rcu_lock_release+0x9/0x30 [ 657.066208][T28810] ? stack_trace_save+0x1e0/0x1e0 [ 657.071225][T28810] ? rcu_lock_release+0x26/0x30 [ 657.076079][T28810] ? is_bpf_text_address+0x398/0x3b0 [ 657.081343][T28810] ? stack_trace_save+0x1e0/0x1e0 [ 657.086345][T28810] ? __kernel_text_address+0x9a/0x110 [ 657.091699][T28810] ? unwind_get_return_address+0x4c/0x90 [ 657.097310][T28810] ? arch_stack_walk+0x98/0xe0 [ 657.102159][T28810] ? stack_trace_save+0x111/0x1e0 [ 657.107229][T28810] ? lo_release+0x1f0/0x1f0 [ 657.111715][T28810] blkdev_ioctl+0x917/0x2c10 [ 657.116301][T28810] ? tomoyo_path_number_perm+0x587/0x740 [ 657.121914][T28810] ? trace_hardirqs_off+0x74/0x80 [ 657.126922][T28810] ? quarantine_put+0xb7/0x1f0 [ 657.131663][T28810] ? tomoyo_path_number_perm+0x587/0x740 [ 657.137275][T28810] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 657.142538][T28810] ? __kasan_slab_free+0x19d/0x1e0 [ 657.147628][T28810] ? __kasan_slab_free+0x12a/0x1e0 [ 657.152720][T28810] ? kasan_slab_free+0xe/0x10 [ 657.157382][T28810] ? kfree+0xae/0x120 [ 657.161370][T28810] ? tomoyo_path_number_perm+0x587/0x740 [ 657.167094][T28810] ? tomoyo_file_ioctl+0x23/0x30 [ 657.172110][T28810] ? security_file_ioctl+0x6d/0xd0 [ 657.177205][T28810] ? __x64_sys_ioctl+0xa3/0x120 [ 657.182034][T28810] ? do_syscall_64+0xfe/0x140 [ 657.186685][T28810] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 657.192735][T28810] ? kasan_check_write+0x14/0x20 [ 657.197651][T28810] ? do_raw_spin_lock+0x143/0x3a0 [ 657.202660][T28810] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 657.208451][T28810] ? rcu_lock_release+0x9/0x30 [ 657.213254][T28810] ? tomoyo_path_number_perm+0x5f0/0x740 [ 657.218896][T28810] ? trace_lock_acquire+0x190/0x190 [ 657.224090][T28810] ? tomoyo_check_path_acl+0x180/0x180 [ 657.229526][T28810] block_ioctl+0xbd/0x100 [ 657.233832][T28810] ? blkdev_iopoll+0x100/0x100 [ 657.238580][T28810] do_vfs_ioctl+0x7d4/0x1890 [ 657.243187][T28810] ? ioctl_preallocate+0x240/0x240 [ 657.248560][T28810] ? fget_many+0x30/0x30 [ 657.252783][T28810] ? debug_smp_processor_id+0x1c/0x20 [ 657.258132][T28810] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 657.264175][T28810] ? tomoyo_file_ioctl+0x23/0x30 [ 657.269099][T28810] ? security_file_ioctl+0xa1/0xd0 [ 657.274204][T28810] __x64_sys_ioctl+0xe3/0x120 [ 657.278867][T28810] do_syscall_64+0xfe/0x140 [ 657.283351][T28810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 657.289224][T28810] RIP: 0033:0x459637 [ 657.293109][T28810] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 657.312696][T28810] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 657.321442][T28810] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 16:14:11 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 657.329403][T28810] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 657.337347][T28810] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 657.345314][T28810] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 657.353262][T28810] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:11 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:11 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:11 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:11 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:11 executing program 1 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:11 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:11 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:11 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:11 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:11 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:11 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:11 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:11 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:11 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:11 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 657.889326][T28859] FAULT_INJECTION: forcing a failure. [ 657.889326][T28859] name failslab, interval 1, probability 0, space 0, times 0 [ 657.903251][T28859] CPU: 1 PID: 28859 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 657.911254][T28859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 657.921318][T28859] Call Trace: [ 657.924618][T28859] dump_stack+0x1d8/0x2f8 [ 657.928955][T28859] should_fail+0x608/0x860 [ 657.933384][T28859] ? setup_fault_attr+0x2b0/0x2b0 [ 657.938419][T28859] __should_failslab+0x11a/0x160 [ 657.943348][T28859] ? __kernfs_new_node+0xd9/0x6e0 [ 657.948351][T28859] should_failslab+0x9/0x20 [ 657.952829][T28859] kmem_cache_alloc+0x56/0x2b0 [ 657.957573][T28859] __kernfs_new_node+0xd9/0x6e0 [ 657.962401][T28859] ? kasan_check_write+0x14/0x20 [ 657.967318][T28859] ? __mutex_unlock_slowpath+0x18c/0x630 [ 657.972953][T28859] ? mutex_unlock+0x10/0x10 [ 657.977444][T28859] ? kernfs_new_node+0x170/0x170 [ 657.982357][T28859] ? mutex_unlock+0xd/0x10 [ 657.986748][T28859] ? kernfs_activate+0x4c7/0x4e0 [ 657.991670][T28859] kernfs_new_node+0x97/0x170 [ 657.996339][T28859] __kernfs_create_file+0x4a/0x2f0 [ 658.001428][T28859] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 658.006784][T28859] internal_create_group+0x511/0xde0 [ 658.012052][T28859] ? sysfs_create_group+0x30/0x30 [ 658.017064][T28859] ? up_write+0xb0/0x1b0 [ 658.021293][T28859] sysfs_create_group+0x1f/0x30 [ 658.026126][T28859] loop_set_fd+0xc7c/0x1130 [ 658.030876][T28859] lo_ioctl+0x17a/0x2400 [ 658.035193][T28859] ? match_held_lock+0x280/0x280 [ 658.040113][T28859] ? kobj_lookup+0xc2/0x450 [ 658.044604][T28859] ? lo_release+0x1f0/0x1f0 [ 658.049112][T28859] ? match_held_lock+0x280/0x280 [ 658.054035][T28859] ? __bfs+0x550/0x550 [ 658.058082][T28859] ? __bfs+0x550/0x550 [ 658.062128][T28859] ? __bfs+0x550/0x550 [ 658.066171][T28859] ? match_held_lock+0x280/0x280 [ 658.071112][T28859] ? __lock_acquire+0xcf7/0x1a40 [ 658.076038][T28859] ? __bfs+0x550/0x550 [ 658.080090][T28859] ? __lock_acquire+0xcf7/0x1a40 [ 658.085007][T28859] ? __lock_acquire+0xcf7/0x1a40 [ 658.089928][T28859] ? trace_lock_acquire+0x190/0x190 [ 658.095138][T28859] ? __read_once_size_nocheck+0x10/0x10 [ 658.100697][T28859] ? unwind_next_frame+0x415/0x870 [ 658.105814][T28859] ? rcu_lock_release+0x9/0x30 [ 658.110562][T28859] ? stack_trace_save+0x1e0/0x1e0 [ 658.115566][T28859] ? rcu_lock_release+0x26/0x30 [ 658.120391][T28859] ? is_bpf_text_address+0x398/0x3b0 [ 658.125673][T28859] ? stack_trace_save+0x1e0/0x1e0 [ 658.130690][T28859] ? __kernel_text_address+0x9a/0x110 [ 658.136052][T28859] ? unwind_get_return_address+0x4c/0x90 [ 658.141665][T28859] ? arch_stack_walk+0x98/0xe0 [ 658.146422][T28859] ? stack_trace_save+0x111/0x1e0 [ 658.151426][T28859] ? lo_release+0x1f0/0x1f0 [ 658.155906][T28859] blkdev_ioctl+0x917/0x2c10 [ 658.160484][T28859] ? tomoyo_path_number_perm+0x587/0x740 [ 658.166110][T28859] ? trace_hardirqs_off+0x74/0x80 [ 658.171115][T28859] ? quarantine_put+0xb7/0x1f0 [ 658.175857][T28859] ? tomoyo_path_number_perm+0x587/0x740 [ 658.181482][T28859] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 658.186748][T28859] ? __kasan_slab_free+0x19d/0x1e0 [ 658.191845][T28859] ? __kasan_slab_free+0x12a/0x1e0 [ 658.196943][T28859] ? kasan_slab_free+0xe/0x10 [ 658.201601][T28859] ? kfree+0xae/0x120 [ 658.205564][T28859] ? tomoyo_path_number_perm+0x587/0x740 [ 658.211226][T28859] ? tomoyo_file_ioctl+0x23/0x30 [ 658.216165][T28859] ? security_file_ioctl+0x6d/0xd0 [ 658.221277][T28859] ? __x64_sys_ioctl+0xa3/0x120 [ 658.226110][T28859] ? do_syscall_64+0xfe/0x140 [ 658.230798][T28859] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 658.236854][T28859] ? kasan_check_write+0x14/0x20 [ 658.241783][T28859] ? do_raw_spin_lock+0x143/0x3a0 [ 658.246807][T28859] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 658.252608][T28859] ? rcu_lock_release+0x9/0x30 [ 658.257478][T28859] ? tomoyo_path_number_perm+0x5f0/0x740 [ 658.263112][T28859] ? trace_lock_acquire+0x190/0x190 [ 658.268408][T28859] ? tomoyo_check_path_acl+0x180/0x180 [ 658.273862][T28859] block_ioctl+0xbd/0x100 [ 658.278212][T28859] ? blkdev_iopoll+0x100/0x100 [ 658.282968][T28859] do_vfs_ioctl+0x7d4/0x1890 [ 658.287577][T28859] ? ioctl_preallocate+0x240/0x240 [ 658.292700][T28859] ? fget_many+0x30/0x30 [ 658.296950][T28859] ? debug_smp_processor_id+0x1c/0x20 [ 658.302308][T28859] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 658.308366][T28859] ? tomoyo_file_ioctl+0x23/0x30 [ 658.313330][T28859] ? security_file_ioctl+0xa1/0xd0 [ 658.318437][T28859] __x64_sys_ioctl+0xe3/0x120 [ 658.323126][T28859] do_syscall_64+0xfe/0x140 [ 658.327626][T28859] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 658.333508][T28859] RIP: 0033:0x459637 [ 658.337389][T28859] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 658.357090][T28859] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 658.365577][T28859] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 658.373561][T28859] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 658.381553][T28859] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 16:14:12 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 658.389515][T28859] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 658.397498][T28859] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:12 executing program 1 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:12 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:12 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:12 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:12 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:12 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 658.716434][T28889] FAULT_INJECTION: forcing a failure. [ 658.716434][T28889] name failslab, interval 1, probability 0, space 0, times 0 16:14:12 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:12 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:12 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 658.760108][T28889] CPU: 0 PID: 28889 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 658.768143][T28889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 658.778205][T28889] Call Trace: [ 658.781509][T28889] dump_stack+0x1d8/0x2f8 [ 658.785860][T28889] should_fail+0x608/0x860 [ 658.790299][T28889] ? setup_fault_attr+0x2b0/0x2b0 [ 658.795343][T28889] __should_failslab+0x11a/0x160 [ 658.800287][T28889] ? kzalloc+0x26/0x40 [ 658.804363][T28889] should_failslab+0x9/0x20 [ 658.808865][T28889] __kmalloc+0x7a/0x310 [ 658.813017][T28889] kzalloc+0x26/0x40 [ 658.816958][T28889] kobject_get_path+0xa7/0x1d0 [ 658.821737][T28889] kobject_uevent_env+0x2f2/0x1260 [ 658.826837][T28889] ? sysfs_create_group+0x30/0x30 [ 658.831880][T28889] kobject_uevent+0x1f/0x30 [ 658.836370][T28889] loop_set_fd+0xce7/0x1130 [ 658.840864][T28889] lo_ioctl+0x17a/0x2400 [ 658.845099][T28889] ? match_held_lock+0x280/0x280 [ 658.850021][T28889] ? kobj_lookup+0xc2/0x450 [ 658.854515][T28889] ? lo_release+0x1f0/0x1f0 [ 658.859005][T28889] ? match_held_lock+0x280/0x280 [ 658.863963][T28889] ? __bfs+0x550/0x550 [ 658.868015][T28889] ? __lock_acquire+0xcf7/0x1a40 [ 658.872936][T28889] ? __bfs+0x550/0x550 [ 658.876987][T28889] ? match_held_lock+0x280/0x280 [ 658.881924][T28889] ? __lock_acquire+0xcf7/0x1a40 [ 658.886860][T28889] ? __bfs+0x550/0x550 [ 658.890916][T28889] ? __lock_acquire+0xcf7/0x1a40 [ 658.895865][T28889] ? __lock_acquire+0xcf7/0x1a40 [ 658.900797][T28889] ? trace_lock_acquire+0x190/0x190 [ 658.905991][T28889] ? __read_once_size_nocheck+0x10/0x10 [ 658.911517][T28889] ? unwind_next_frame+0x415/0x870 [ 658.916624][T28889] ? rcu_lock_release+0x9/0x30 [ 658.921394][T28889] ? stack_trace_save+0x1e0/0x1e0 [ 658.926598][T28889] ? rcu_lock_release+0x26/0x30 [ 658.931438][T28889] ? is_bpf_text_address+0x398/0x3b0 [ 658.937507][T28889] ? stack_trace_save+0x1e0/0x1e0 [ 658.942549][T28889] ? __kernel_text_address+0x9a/0x110 [ 658.947925][T28889] ? unwind_get_return_address+0x4c/0x90 [ 658.953545][T28889] ? arch_stack_walk+0x98/0xe0 [ 658.958403][T28889] ? stack_trace_save+0x111/0x1e0 [ 658.963421][T28889] ? lo_release+0x1f0/0x1f0 [ 658.967906][T28889] blkdev_ioctl+0x917/0x2c10 [ 658.972507][T28889] ? tomoyo_path_number_perm+0x587/0x740 [ 658.978310][T28889] ? trace_hardirqs_off+0x74/0x80 [ 658.983317][T28889] ? quarantine_put+0xb7/0x1f0 [ 658.988056][T28889] ? tomoyo_path_number_perm+0x587/0x740 [ 658.993667][T28889] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 658.998949][T28889] ? __kasan_slab_free+0x19d/0x1e0 [ 659.004043][T28889] ? __kasan_slab_free+0x12a/0x1e0 [ 659.009156][T28889] ? kasan_slab_free+0xe/0x10 [ 659.013819][T28889] ? kfree+0xae/0x120 [ 659.017783][T28889] ? tomoyo_path_number_perm+0x587/0x740 [ 659.023417][T28889] ? tomoyo_file_ioctl+0x23/0x30 [ 659.028341][T28889] ? security_file_ioctl+0x6d/0xd0 [ 659.033438][T28889] ? __x64_sys_ioctl+0xa3/0x120 [ 659.038291][T28889] ? do_syscall_64+0xfe/0x140 [ 659.042950][T28889] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 659.049001][T28889] ? kasan_check_write+0x14/0x20 [ 659.053942][T28889] ? do_raw_spin_lock+0x143/0x3a0 [ 659.058967][T28889] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 659.064766][T28889] ? rcu_lock_release+0x9/0x30 [ 659.069536][T28889] ? tomoyo_path_number_perm+0x5f0/0x740 [ 659.075154][T28889] ? trace_lock_acquire+0x190/0x190 [ 659.080343][T28889] ? tomoyo_check_path_acl+0x180/0x180 [ 659.085790][T28889] block_ioctl+0xbd/0x100 [ 659.090104][T28889] ? blkdev_iopoll+0x100/0x100 [ 659.094850][T28889] do_vfs_ioctl+0x7d4/0x1890 [ 659.099437][T28889] ? ioctl_preallocate+0x240/0x240 [ 659.104560][T28889] ? fget_many+0x30/0x30 [ 659.108787][T28889] ? debug_smp_processor_id+0x1c/0x20 [ 659.114143][T28889] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 659.120204][T28889] ? tomoyo_file_ioctl+0x23/0x30 [ 659.125299][T28889] ? security_file_ioctl+0xa1/0xd0 [ 659.130397][T28889] __x64_sys_ioctl+0xe3/0x120 [ 659.135086][T28889] do_syscall_64+0xfe/0x140 [ 659.139592][T28889] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 659.145468][T28889] RIP: 0033:0x459637 [ 659.149340][T28889] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 659.168931][T28889] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 659.177328][T28889] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 659.185289][T28889] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 659.193245][T28889] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 659.201197][T28889] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 16:14:13 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 659.209156][T28889] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:13 executing program 1 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:13 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:13 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:13 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:13 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:13 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 659.473204][T28920] FAULT_INJECTION: forcing a failure. [ 659.473204][T28920] name failslab, interval 1, probability 0, space 0, times 0 16:14:13 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:13 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 659.521509][T28920] CPU: 0 PID: 28920 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 659.529530][T28920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 659.539594][T28920] Call Trace: [ 659.542895][T28920] dump_stack+0x1d8/0x2f8 [ 659.547232][T28920] should_fail+0x608/0x860 [ 659.551657][T28920] ? setup_fault_attr+0x2b0/0x2b0 [ 659.556739][T28920] __should_failslab+0x11a/0x160 [ 659.561694][T28920] ? __kernfs_new_node+0xd9/0x6e0 [ 659.566730][T28920] should_failslab+0x9/0x20 16:14:13 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 659.571241][T28920] kmem_cache_alloc+0x56/0x2b0 [ 659.576015][T28920] __kernfs_new_node+0xd9/0x6e0 [ 659.580873][T28920] ? kasan_check_write+0x14/0x20 [ 659.585907][T28920] ? __mutex_unlock_slowpath+0x18c/0x630 [ 659.591558][T28920] ? mutex_unlock+0x10/0x10 [ 659.596077][T28920] ? kernfs_new_node+0x170/0x170 [ 659.601029][T28920] ? mutex_unlock+0xd/0x10 [ 659.605459][T28920] ? kernfs_activate+0x4c7/0x4e0 [ 659.610411][T28920] kernfs_new_node+0x97/0x170 [ 659.615102][T28920] __kernfs_create_file+0x4a/0x2f0 16:14:13 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 659.620231][T28920] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 659.625618][T28920] internal_create_group+0x511/0xde0 [ 659.630911][T28920] ? sysfs_create_group+0x30/0x30 [ 659.635946][T28920] ? up_write+0xb0/0x1b0 [ 659.640220][T28920] sysfs_create_group+0x1f/0x30 [ 659.645067][T28920] loop_set_fd+0xc7c/0x1130 [ 659.649558][T28920] lo_ioctl+0x17a/0x2400 [ 659.653795][T28920] ? match_held_lock+0x280/0x280 [ 659.658724][T28920] ? lo_release+0x1f0/0x1f0 [ 659.663223][T28920] ? match_held_lock+0x280/0x280 [ 659.668186][T28920] ? __bfs+0x550/0x550 [ 659.672240][T28920] ? __bfs+0x550/0x550 [ 659.676298][T28920] ? __bfs+0x550/0x550 [ 659.680444][T28920] ? match_held_lock+0x280/0x280 [ 659.685367][T28920] ? __lock_acquire+0xcf7/0x1a40 [ 659.690292][T28920] ? __bfs+0x550/0x550 [ 659.694356][T28920] ? __lock_acquire+0xcf7/0x1a40 [ 659.699294][T28920] ? __lock_acquire+0xcf7/0x1a40 [ 659.704223][T28920] ? trace_lock_acquire+0x190/0x190 [ 659.709413][T28920] ? __read_once_size_nocheck+0x10/0x10 [ 659.714948][T28920] ? unwind_next_frame+0x415/0x870 [ 659.720066][T28920] ? rcu_lock_release+0x9/0x30 [ 659.724821][T28920] ? stack_trace_save+0x1e0/0x1e0 [ 659.729831][T28920] ? rcu_lock_release+0x26/0x30 [ 659.734662][T28920] ? is_bpf_text_address+0x398/0x3b0 [ 659.739944][T28920] ? stack_trace_save+0x1e0/0x1e0 [ 659.744948][T28920] ? __kernel_text_address+0x9a/0x110 [ 659.750296][T28920] ? unwind_get_return_address+0x4c/0x90 [ 659.755919][T28920] ? arch_stack_walk+0x98/0xe0 [ 659.760781][T28920] ? stack_trace_save+0x111/0x1e0 [ 659.765789][T28920] ? lo_release+0x1f0/0x1f0 [ 659.770284][T28920] blkdev_ioctl+0x917/0x2c10 [ 659.774865][T28920] ? tomoyo_path_number_perm+0x587/0x740 [ 659.780571][T28920] ? trace_hardirqs_off+0x74/0x80 [ 659.785577][T28920] ? quarantine_put+0xb7/0x1f0 [ 659.790597][T28920] ? tomoyo_path_number_perm+0x587/0x740 [ 659.796219][T28920] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 659.801488][T28920] ? __kasan_slab_free+0x19d/0x1e0 [ 659.806577][T28920] ? __kasan_slab_free+0x12a/0x1e0 [ 659.811667][T28920] ? kasan_slab_free+0xe/0x10 [ 659.816346][T28920] ? kfree+0xae/0x120 [ 659.820320][T28920] ? tomoyo_path_number_perm+0x587/0x740 [ 659.825931][T28920] ? tomoyo_file_ioctl+0x23/0x30 [ 659.830846][T28920] ? security_file_ioctl+0x6d/0xd0 [ 659.835942][T28920] ? __x64_sys_ioctl+0xa3/0x120 [ 659.840784][T28920] ? do_syscall_64+0xfe/0x140 [ 659.845451][T28920] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 659.851515][T28920] ? kasan_check_write+0x14/0x20 [ 659.856437][T28920] ? do_raw_spin_lock+0x143/0x3a0 [ 659.861455][T28920] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 659.867241][T28920] ? rcu_lock_release+0x9/0x30 [ 659.871986][T28920] ? tomoyo_path_number_perm+0x5f0/0x740 [ 659.877611][T28920] ? trace_lock_acquire+0x190/0x190 [ 659.882813][T28920] ? tomoyo_check_path_acl+0x180/0x180 [ 659.888260][T28920] block_ioctl+0xbd/0x100 [ 659.892574][T28920] ? blkdev_iopoll+0x100/0x100 [ 659.897324][T28920] do_vfs_ioctl+0x7d4/0x1890 [ 659.901909][T28920] ? ioctl_preallocate+0x240/0x240 [ 659.907029][T28920] ? fget_many+0x30/0x30 [ 659.911273][T28920] ? file_open_root+0x440/0x440 [ 659.916126][T28920] ? tomoyo_file_ioctl+0x23/0x30 [ 659.921052][T28920] ? security_file_ioctl+0xa1/0xd0 [ 659.926168][T28920] __x64_sys_ioctl+0xe3/0x120 [ 659.930845][T28920] do_syscall_64+0xfe/0x140 [ 659.935354][T28920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 659.941239][T28920] RIP: 0033:0x459637 [ 659.945130][T28920] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:14:14 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 659.964723][T28920] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 659.973913][T28920] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 659.981879][T28920] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 659.989830][T28920] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 659.997782][T28920] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 660.005756][T28920] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:14 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:14 executing program 1 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:14 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:14 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:14 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:14 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:14 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 660.212795][T28948] FAULT_INJECTION: forcing a failure. [ 660.212795][T28948] name failslab, interval 1, probability 0, space 0, times 0 [ 660.226799][T28948] CPU: 0 PID: 28948 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 660.234794][T28948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 660.244848][T28948] Call Trace: [ 660.248140][T28948] dump_stack+0x1d8/0x2f8 [ 660.252464][T28948] should_fail+0x608/0x860 [ 660.256877][T28948] ? setup_fault_attr+0x2b0/0x2b0 [ 660.261892][T28948] __should_failslab+0x11a/0x160 [ 660.266811][T28948] ? kzalloc+0x26/0x40 [ 660.270854][T28948] should_failslab+0x9/0x20 [ 660.275337][T28948] __kmalloc+0x7a/0x310 [ 660.279482][T28948] kzalloc+0x26/0x40 [ 660.283352][T28948] kobject_get_path+0xa7/0x1d0 [ 660.288087][T28948] kobject_uevent_env+0x2f2/0x1260 [ 660.293184][T28948] ? sysfs_create_group+0x30/0x30 [ 660.298198][T28948] kobject_uevent+0x1f/0x30 [ 660.302678][T28948] loop_set_fd+0xce7/0x1130 [ 660.307173][T28948] lo_ioctl+0x17a/0x2400 [ 660.311396][T28948] ? match_held_lock+0x280/0x280 [ 660.316336][T28948] ? kobj_lookup+0xc2/0x450 [ 660.320825][T28948] ? lo_release+0x1f0/0x1f0 [ 660.325322][T28948] ? match_held_lock+0x280/0x280 [ 660.330235][T28948] ? __bfs+0x550/0x550 [ 660.334292][T28948] ? __bfs+0x550/0x550 [ 660.338349][T28948] ? __mutex_lock_common+0x56b/0x2fc0 [ 660.343701][T28948] ? __bfs+0x550/0x550 [ 660.347743][T28948] ? match_held_lock+0x280/0x280 [ 660.352667][T28948] ? __lock_acquire+0xcf7/0x1a40 [ 660.357603][T28948] ? __bfs+0x550/0x550 [ 660.361657][T28948] ? __lock_acquire+0xcf7/0x1a40 [ 660.366580][T28948] ? __lock_acquire+0xcf7/0x1a40 [ 660.371504][T28948] ? trace_lock_acquire+0x190/0x190 [ 660.376707][T28948] ? __read_once_size_nocheck+0x10/0x10 [ 660.382236][T28948] ? unwind_next_frame+0x415/0x870 [ 660.387333][T28948] ? rcu_lock_release+0x9/0x30 [ 660.392075][T28948] ? stack_trace_save+0x1e0/0x1e0 [ 660.397081][T28948] ? rcu_lock_release+0x26/0x30 [ 660.401915][T28948] ? is_bpf_text_address+0x398/0x3b0 [ 660.407184][T28948] ? stack_trace_save+0x1e0/0x1e0 [ 660.412181][T28948] ? __kernel_text_address+0x9a/0x110 [ 660.417533][T28948] ? unwind_get_return_address+0x4c/0x90 [ 660.423142][T28948] ? arch_stack_walk+0x98/0xe0 [ 660.427885][T28948] ? stack_trace_save+0x111/0x1e0 [ 660.432896][T28948] ? lo_release+0x1f0/0x1f0 [ 660.437382][T28948] blkdev_ioctl+0x917/0x2c10 [ 660.441946][T28948] ? tomoyo_path_number_perm+0x587/0x740 [ 660.447563][T28948] ? trace_hardirqs_off+0x74/0x80 [ 660.452569][T28948] ? quarantine_put+0xb7/0x1f0 [ 660.457326][T28948] ? tomoyo_path_number_perm+0x587/0x740 [ 660.462950][T28948] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 660.468209][T28948] ? __kasan_slab_free+0x19d/0x1e0 [ 660.473297][T28948] ? __kasan_slab_free+0x12a/0x1e0 [ 660.478392][T28948] ? kasan_slab_free+0xe/0x10 [ 660.483057][T28948] ? kfree+0xae/0x120 [ 660.487021][T28948] ? tomoyo_path_number_perm+0x587/0x740 [ 660.492733][T28948] ? tomoyo_file_ioctl+0x23/0x30 [ 660.497655][T28948] ? security_file_ioctl+0x6d/0xd0 [ 660.502739][T28948] ? __x64_sys_ioctl+0xa3/0x120 [ 660.507560][T28948] ? do_syscall_64+0xfe/0x140 [ 660.512229][T28948] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 660.518276][T28948] ? kasan_check_write+0x14/0x20 [ 660.523209][T28948] ? do_raw_spin_lock+0x143/0x3a0 [ 660.528216][T28948] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 660.534013][T28948] ? rcu_lock_release+0x9/0x30 [ 660.538782][T28948] ? tomoyo_path_number_perm+0x5f0/0x740 [ 660.545979][T28948] ? trace_lock_acquire+0x190/0x190 [ 660.557035][T28948] ? tomoyo_check_path_acl+0x180/0x180 [ 660.562488][T28948] block_ioctl+0xbd/0x100 [ 660.566806][T28948] ? blkdev_iopoll+0x100/0x100 [ 660.571559][T28948] do_vfs_ioctl+0x7d4/0x1890 [ 660.576138][T28948] ? ioctl_preallocate+0x240/0x240 [ 660.581241][T28948] ? fget_many+0x30/0x30 [ 660.585458][T28948] ? debug_smp_processor_id+0x1c/0x20 [ 660.591638][T28948] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 660.597698][T28948] ? tomoyo_file_ioctl+0x23/0x30 [ 660.602614][T28948] ? security_file_ioctl+0xa1/0xd0 [ 660.607735][T28948] __x64_sys_ioctl+0xe3/0x120 [ 660.612389][T28948] do_syscall_64+0xfe/0x140 [ 660.616883][T28948] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 660.622763][T28948] RIP: 0033:0x459637 [ 660.626630][T28948] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 660.646232][T28948] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 660.654629][T28948] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 660.662589][T28948] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 660.670537][T28948] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 660.678487][T28948] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 660.686452][T28948] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:14 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:14 executing program 1 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:14 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:14 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:15 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:15 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 660.962761][T28971] FAULT_INJECTION: forcing a failure. [ 660.962761][T28971] name failslab, interval 1, probability 0, space 0, times 0 [ 660.985262][T28971] CPU: 0 PID: 28971 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 660.993258][T28971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.003340][T28971] Call Trace: [ 661.006655][T28971] dump_stack+0x1d8/0x2f8 16:14:15 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 661.011018][T28971] should_fail+0x608/0x860 [ 661.015437][T28971] ? setup_fault_attr+0x2b0/0x2b0 [ 661.020466][T28971] __should_failslab+0x11a/0x160 [ 661.025408][T28971] should_failslab+0x9/0x20 [ 661.029938][T28971] kmem_cache_alloc_trace+0x5d/0x2c0 [ 661.035223][T28971] ? kobject_uevent_env+0x2cd/0x1260 [ 661.040504][T28971] ? dev_uevent_filter+0xb0/0xb0 [ 661.045441][T28971] kobject_uevent_env+0x2cd/0x1260 [ 661.050556][T28971] ? sysfs_create_group+0x30/0x30 [ 661.055674][T28971] kobject_uevent+0x1f/0x30 [ 661.060174][T28971] loop_set_fd+0xce7/0x1130 [ 661.064682][T28971] lo_ioctl+0x17a/0x2400 [ 661.068922][T28971] ? match_held_lock+0x280/0x280 [ 661.073848][T28971] ? kobj_lookup+0xc2/0x450 [ 661.078336][T28971] ? lo_release+0x1f0/0x1f0 [ 661.082823][T28971] ? match_held_lock+0x280/0x280 [ 661.087744][T28971] ? __bfs+0x550/0x550 [ 661.091814][T28971] ? __bfs+0x550/0x550 [ 661.095866][T28971] ? __bfs+0x550/0x550 [ 661.099910][T28971] ? match_held_lock+0x280/0x280 [ 661.104836][T28971] ? __lock_acquire+0xcf7/0x1a40 [ 661.109756][T28971] ? __bfs+0x550/0x550 [ 661.113819][T28971] ? __lock_acquire+0xcf7/0x1a40 [ 661.118746][T28971] ? __lock_acquire+0xcf7/0x1a40 [ 661.123678][T28971] ? trace_lock_acquire+0x190/0x190 [ 661.128875][T28971] ? __read_once_size_nocheck+0x10/0x10 [ 661.134403][T28971] ? unwind_next_frame+0x415/0x870 [ 661.139507][T28971] ? rcu_lock_release+0x9/0x30 [ 661.144289][T28971] ? stack_trace_save+0x1e0/0x1e0 [ 661.149323][T28971] ? rcu_lock_release+0x26/0x30 [ 661.154153][T28971] ? is_bpf_text_address+0x398/0x3b0 [ 661.159419][T28971] ? stack_trace_save+0x1e0/0x1e0 [ 661.164428][T28971] ? __kernel_text_address+0x9a/0x110 [ 661.169784][T28971] ? unwind_get_return_address+0x4c/0x90 [ 661.175406][T28971] ? arch_stack_walk+0x98/0xe0 [ 661.180172][T28971] ? stack_trace_save+0x111/0x1e0 [ 661.185287][T28971] ? lo_release+0x1f0/0x1f0 [ 661.189795][T28971] blkdev_ioctl+0x917/0x2c10 [ 661.194432][T28971] ? tomoyo_path_number_perm+0x587/0x740 [ 661.200143][T28971] ? trace_hardirqs_off+0x74/0x80 [ 661.205165][T28971] ? quarantine_put+0xb7/0x1f0 [ 661.209926][T28971] ? tomoyo_path_number_perm+0x587/0x740 [ 661.215542][T28971] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 661.220804][T28971] ? __kasan_slab_free+0x19d/0x1e0 [ 661.225889][T28971] ? __kasan_slab_free+0x12a/0x1e0 [ 661.230975][T28971] ? kasan_slab_free+0xe/0x10 [ 661.235625][T28971] ? kfree+0xae/0x120 [ 661.239583][T28971] ? tomoyo_path_number_perm+0x587/0x740 [ 661.245194][T28971] ? tomoyo_file_ioctl+0x23/0x30 [ 661.250125][T28971] ? security_file_ioctl+0x6d/0xd0 [ 661.255226][T28971] ? __x64_sys_ioctl+0xa3/0x120 [ 661.260051][T28971] ? do_syscall_64+0xfe/0x140 [ 661.264721][T28971] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 661.270775][T28971] ? kasan_check_write+0x14/0x20 [ 661.275713][T28971] ? do_raw_spin_lock+0x143/0x3a0 [ 661.280732][T28971] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 661.286517][T28971] ? rcu_lock_release+0x9/0x30 [ 661.291268][T28971] ? tomoyo_path_number_perm+0x5f0/0x740 [ 661.296909][T28971] ? trace_lock_acquire+0x190/0x190 [ 661.302103][T28971] ? tomoyo_check_path_acl+0x180/0x180 [ 661.307541][T28971] block_ioctl+0xbd/0x100 [ 661.311846][T28971] ? blkdev_iopoll+0x100/0x100 [ 661.317196][T28971] do_vfs_ioctl+0x7d4/0x1890 [ 661.321771][T28971] ? ioctl_preallocate+0x240/0x240 [ 661.326897][T28971] ? fget_many+0x30/0x30 [ 661.331119][T28971] ? debug_smp_processor_id+0x1c/0x20 [ 661.336468][T28971] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 661.342520][T28971] ? tomoyo_file_ioctl+0x23/0x30 [ 661.347445][T28971] ? security_file_ioctl+0xa1/0xd0 [ 661.352543][T28971] __x64_sys_ioctl+0xe3/0x120 [ 661.357215][T28971] do_syscall_64+0xfe/0x140 [ 661.361702][T28971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 661.367577][T28971] RIP: 0033:0x459637 [ 661.371836][T28971] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 661.391416][T28971] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 661.399826][T28971] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 16:14:15 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:15 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 661.407780][T28971] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 661.415742][T28971] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 661.423712][T28971] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 661.431672][T28971] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:15 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:15 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:15 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:15 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:15 executing program 1 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:15 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:15 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:15 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:15 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:15 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 661.796709][T29009] FAULT_INJECTION: forcing a failure. [ 661.796709][T29009] name failslab, interval 1, probability 0, space 0, times 0 [ 661.818828][T29009] CPU: 1 PID: 29009 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 661.826867][T29009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.836924][T29009] Call Trace: [ 661.840219][T29009] dump_stack+0x1d8/0x2f8 [ 661.844548][T29009] should_fail+0x608/0x860 [ 661.848972][T29009] ? setup_fault_attr+0x2b0/0x2b0 [ 661.854530][T29009] __should_failslab+0x11a/0x160 [ 661.859461][T29009] should_failslab+0x9/0x20 [ 661.863958][T29009] kmem_cache_alloc_node+0x65/0x270 [ 661.869212][T29009] ? __alloc_skb+0x9f/0x500 [ 661.873705][T29009] __alloc_skb+0x9f/0x500 [ 661.878028][T29009] alloc_uevent_skb+0x7f/0x230 [ 661.882773][T29009] kobject_uevent_env+0xcbb/0x1260 [ 661.887865][T29009] ? sysfs_create_group+0x30/0x30 [ 661.892923][T29009] kobject_uevent+0x1f/0x30 [ 661.897408][T29009] loop_set_fd+0xce7/0x1130 [ 661.901906][T29009] lo_ioctl+0x17a/0x2400 [ 661.906130][T29009] ? match_held_lock+0x280/0x280 [ 661.911046][T29009] ? kobj_lookup+0xc2/0x450 [ 661.915532][T29009] ? lo_release+0x1f0/0x1f0 [ 661.920036][T29009] ? match_held_lock+0x280/0x280 [ 661.924950][T29009] ? __bfs+0x550/0x550 [ 661.929019][T29009] ? __bfs+0x550/0x550 [ 661.933069][T29009] ? __bfs+0x550/0x550 [ 661.937126][T29009] ? match_held_lock+0x280/0x280 [ 661.942049][T29009] ? __lock_acquire+0xcf7/0x1a40 [ 661.946966][T29009] ? __bfs+0x550/0x550 [ 661.951011][T29009] ? __lock_acquire+0xcf7/0x1a40 [ 661.955925][T29009] ? __lock_acquire+0xcf7/0x1a40 [ 661.960842][T29009] ? trace_lock_acquire+0x190/0x190 [ 661.966023][T29009] ? __read_once_size_nocheck+0x10/0x10 [ 661.971541][T29009] ? unwind_next_frame+0x415/0x870 [ 661.976634][T29009] ? rcu_lock_release+0x9/0x30 [ 661.981373][T29009] ? stack_trace_save+0x1e0/0x1e0 [ 661.986896][T29009] ? rcu_lock_release+0x26/0x30 [ 661.991720][T29009] ? is_bpf_text_address+0x398/0x3b0 [ 661.996981][T29009] ? stack_trace_save+0x1e0/0x1e0 [ 662.001981][T29009] ? __kernel_text_address+0x9a/0x110 [ 662.007329][T29009] ? unwind_get_return_address+0x4c/0x90 [ 662.012937][T29009] ? arch_stack_walk+0x98/0xe0 [ 662.017682][T29009] ? stack_trace_save+0x111/0x1e0 [ 662.022690][T29009] ? lo_release+0x1f0/0x1f0 [ 662.027214][T29009] blkdev_ioctl+0x917/0x2c10 [ 662.031787][T29009] ? tomoyo_path_number_perm+0x587/0x740 [ 662.037400][T29009] ? trace_hardirqs_off+0x74/0x80 [ 662.042400][T29009] ? quarantine_put+0xb7/0x1f0 [ 662.047160][T29009] ? tomoyo_path_number_perm+0x587/0x740 [ 662.052773][T29009] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 662.058038][T29009] ? __kasan_slab_free+0x19d/0x1e0 [ 662.063129][T29009] ? __kasan_slab_free+0x12a/0x1e0 [ 662.068220][T29009] ? kasan_slab_free+0xe/0x10 [ 662.072875][T29009] ? kfree+0xae/0x120 [ 662.076842][T29009] ? tomoyo_path_number_perm+0x587/0x740 [ 662.083115][T29009] ? tomoyo_file_ioctl+0x23/0x30 [ 662.088055][T29009] ? security_file_ioctl+0x6d/0xd0 [ 662.093155][T29009] ? __x64_sys_ioctl+0xa3/0x120 [ 662.097990][T29009] ? do_syscall_64+0xfe/0x140 [ 662.102653][T29009] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.108709][T29009] ? kasan_check_write+0x14/0x20 [ 662.113630][T29009] ? do_raw_spin_lock+0x143/0x3a0 [ 662.118643][T29009] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 662.124432][T29009] ? rcu_lock_release+0x9/0x30 [ 662.129214][T29009] ? tomoyo_path_number_perm+0x5f0/0x740 [ 662.134838][T29009] ? trace_lock_acquire+0x190/0x190 [ 662.140015][T29009] ? tomoyo_check_path_acl+0x180/0x180 [ 662.145452][T29009] block_ioctl+0xbd/0x100 [ 662.149764][T29009] ? blkdev_iopoll+0x100/0x100 [ 662.154511][T29009] do_vfs_ioctl+0x7d4/0x1890 [ 662.159099][T29009] ? ioctl_preallocate+0x240/0x240 [ 662.164197][T29009] ? fget_many+0x30/0x30 [ 662.168418][T29009] ? debug_smp_processor_id+0x1c/0x20 [ 662.173767][T29009] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 662.179811][T29009] ? tomoyo_file_ioctl+0x23/0x30 [ 662.184723][T29009] ? security_file_ioctl+0xa1/0xd0 [ 662.189828][T29009] __x64_sys_ioctl+0xe3/0x120 [ 662.194496][T29009] do_syscall_64+0xfe/0x140 [ 662.198991][T29009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.204875][T29009] RIP: 0033:0x459637 [ 662.208763][T29009] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 662.228345][T29009] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 662.236739][T29009] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 16:14:16 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 662.244695][T29009] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 662.252661][T29009] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 662.260635][T29009] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 662.268592][T29009] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:16 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:16 executing program 1 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:16 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:16 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:16 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:16 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 662.552583][T29034] FAULT_INJECTION: forcing a failure. [ 662.552583][T29034] name failslab, interval 1, probability 0, space 0, times 0 [ 662.565522][T29034] CPU: 1 PID: 29034 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 662.573518][T29034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 662.583573][T29034] Call Trace: [ 662.587474][T29034] dump_stack+0x1d8/0x2f8 [ 662.592164][T29034] should_fail+0x608/0x860 [ 662.596587][T29034] ? setup_fault_attr+0x2b0/0x2b0 [ 662.602143][T29034] __should_failslab+0x11a/0x160 [ 662.607092][T29034] ? kzalloc+0x26/0x40 [ 662.611156][T29034] should_failslab+0x9/0x20 [ 662.615662][T29034] __kmalloc+0x7a/0x310 [ 662.619843][T29034] kzalloc+0x26/0x40 [ 662.623747][T29034] kobject_get_path+0xa7/0x1d0 [ 662.628519][T29034] kobject_uevent_env+0x2f2/0x1260 [ 662.633631][T29034] ? sysfs_create_group+0x30/0x30 [ 662.638669][T29034] kobject_uevent+0x1f/0x30 [ 662.643178][T29034] loop_set_fd+0xce7/0x1130 [ 662.647703][T29034] lo_ioctl+0x17a/0x2400 16:14:16 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:16 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 662.651955][T29034] ? match_held_lock+0x280/0x280 [ 662.656890][T29034] ? kobj_lookup+0xc2/0x450 [ 662.661393][T29034] ? lo_release+0x1f0/0x1f0 [ 662.672595][T29034] ? match_held_lock+0x280/0x280 [ 662.677553][T29034] ? __bfs+0x550/0x550 [ 662.681634][T29034] ? __bfs+0x550/0x550 [ 662.685722][T29034] ? __bfs+0x550/0x550 [ 662.689789][T29034] ? match_held_lock+0x280/0x280 [ 662.694720][T29034] ? __lock_acquire+0xcf7/0x1a40 [ 662.699641][T29034] ? __bfs+0x550/0x550 [ 662.703701][T29034] ? __lock_acquire+0xcf7/0x1a40 [ 662.708626][T29034] ? __lock_acquire+0xcf7/0x1a40 [ 662.713549][T29034] ? trace_lock_acquire+0x190/0x190 [ 662.718735][T29034] ? __read_once_size_nocheck+0x10/0x10 [ 662.724291][T29034] ? unwind_next_frame+0x415/0x870 [ 662.730416][T29034] ? rcu_lock_release+0x9/0x30 [ 662.735184][T29034] ? stack_trace_save+0x1e0/0x1e0 [ 662.740210][T29034] ? rcu_lock_release+0x26/0x30 [ 662.745041][T29034] ? is_bpf_text_address+0x398/0x3b0 [ 662.750305][T29034] ? stack_trace_save+0x1e0/0x1e0 [ 662.755322][T29034] ? __kernel_text_address+0x9a/0x110 [ 662.760674][T29034] ? unwind_get_return_address+0x4c/0x90 [ 662.766306][T29034] ? arch_stack_walk+0x98/0xe0 [ 662.771056][T29034] ? stack_trace_save+0x111/0x1e0 [ 662.776060][T29034] ? lo_release+0x1f0/0x1f0 [ 662.780538][T29034] blkdev_ioctl+0x917/0x2c10 [ 662.785104][T29034] ? tomoyo_path_number_perm+0x587/0x740 [ 662.790712][T29034] ? trace_hardirqs_off+0x74/0x80 [ 662.795716][T29034] ? quarantine_put+0xb7/0x1f0 [ 662.800454][T29034] ? tomoyo_path_number_perm+0x587/0x740 [ 662.806080][T29034] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 662.811339][T29034] ? __kasan_slab_free+0x19d/0x1e0 [ 662.816422][T29034] ? __kasan_slab_free+0x12a/0x1e0 [ 662.821509][T29034] ? kasan_slab_free+0xe/0x10 [ 662.826166][T29034] ? kfree+0xae/0x120 [ 662.830136][T29034] ? tomoyo_path_number_perm+0x587/0x740 [ 662.835763][T29034] ? tomoyo_file_ioctl+0x23/0x30 [ 662.840708][T29034] ? security_file_ioctl+0x6d/0xd0 [ 662.845807][T29034] ? __x64_sys_ioctl+0xa3/0x120 [ 662.850642][T29034] ? do_syscall_64+0xfe/0x140 [ 662.855303][T29034] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.861354][T29034] ? kasan_check_write+0x14/0x20 [ 662.866281][T29034] ? do_raw_spin_lock+0x143/0x3a0 [ 662.871288][T29034] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 662.877072][T29034] ? rcu_lock_release+0x9/0x30 [ 662.881814][T29034] ? tomoyo_path_number_perm+0x5f0/0x740 [ 662.887423][T29034] ? trace_lock_acquire+0x190/0x190 [ 662.892622][T29034] ? tomoyo_check_path_acl+0x180/0x180 [ 662.898064][T29034] block_ioctl+0xbd/0x100 [ 662.902370][T29034] ? blkdev_iopoll+0x100/0x100 [ 662.907115][T29034] do_vfs_ioctl+0x7d4/0x1890 [ 662.911717][T29034] ? ioctl_preallocate+0x240/0x240 [ 662.916818][T29034] ? fget_many+0x30/0x30 [ 662.921040][T29034] ? debug_smp_processor_id+0x1c/0x20 [ 662.926401][T29034] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 662.932467][T29034] ? tomoyo_file_ioctl+0x23/0x30 [ 662.937403][T29034] ? security_file_ioctl+0xa1/0xd0 [ 662.942508][T29034] __x64_sys_ioctl+0xe3/0x120 [ 662.947176][T29034] do_syscall_64+0xfe/0x140 [ 662.951662][T29034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.957530][T29034] RIP: 0033:0x459637 [ 662.961413][T29034] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 662.981021][T29034] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 662.989418][T29034] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 16:14:17 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 662.997383][T29034] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 663.005333][T29034] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 663.013308][T29034] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 663.021262][T29034] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:17 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:17 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:17 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:17 executing program 1 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:17 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:17 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:17 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:17 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 663.326597][T29066] FAULT_INJECTION: forcing a failure. [ 663.326597][T29066] name failslab, interval 1, probability 0, space 0, times 0 16:14:17 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:17 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 663.466827][T29066] CPU: 0 PID: 29066 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 663.474848][T29066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.484900][T29066] Call Trace: [ 663.488204][T29066] dump_stack+0x1d8/0x2f8 [ 663.492549][T29066] should_fail+0x608/0x860 [ 663.496975][T29066] ? setup_fault_attr+0x2b0/0x2b0 [ 663.501999][T29066] ? tomoyo_encode2+0x273/0x5a0 [ 663.506853][T29066] __should_failslab+0x11a/0x160 [ 663.511792][T29066] ? tomoyo_encode2+0x273/0x5a0 16:14:17 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 663.516649][T29066] should_failslab+0x9/0x20 [ 663.521152][T29066] __kmalloc+0x7a/0x310 [ 663.525313][T29066] tomoyo_encode2+0x273/0x5a0 [ 663.529994][T29066] tomoyo_realpath_from_path+0x769/0x7c0 [ 663.535633][T29066] tomoyo_path_number_perm+0x1e0/0x740 [ 663.541091][T29066] ? quarantine_put+0xb7/0x1f0 [ 663.545858][T29066] ? __kasan_slab_free+0x19d/0x1e0 [ 663.550970][T29066] ? __kasan_slab_free+0x12a/0x1e0 [ 663.556080][T29066] ? filename_create+0x480/0x6f0 [ 663.556112][T29066] ? tomoyo_check_path_acl+0x180/0x180 16:14:17 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 663.556129][T29066] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 663.566493][T29066] ? trace_kfree+0xb2/0x110 [ 663.566508][T29066] ? do_raw_spin_lock+0x143/0x3a0 [ 663.566537][T29066] ? filename_create+0x480/0x6f0 [ 663.566550][T29066] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 663.566566][T29066] tomoyo_path_mkdir+0xe3/0x120 [ 663.566578][T29066] ? tomoyo_path_unlink+0x100/0x100 [ 663.566588][T29066] ? kern_path_create+0x40/0x40 [ 663.566603][T29066] security_path_mkdir+0xed/0x170 [ 663.608667][T29066] do_mkdirat+0x1ae/0x390 [ 663.608681][T29066] ? debug_smp_processor_id+0x1c/0x20 [ 663.608701][T29066] ? vfs_mkdir+0x610/0x610 [ 663.608716][T29066] ? kasan_check_write+0x14/0x20 [ 663.632759][T29066] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 663.632773][T29066] ? do_syscall_64+0x1d/0x140 [ 663.632788][T29066] __x64_sys_mkdir+0x60/0x70 [ 663.632798][T29066] do_syscall_64+0xfe/0x140 [ 663.632814][T29066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 663.632824][T29066] RIP: 0033:0x458be7 [ 663.632834][T29066] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 663.632840][T29066] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 663.632850][T29066] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 663.632856][T29066] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 663.632862][T29066] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 16:14:17 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:17 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:17 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 663.632867][T29066] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 663.632872][T29066] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 663.783307][T29066] ERROR: Out of memory at tomoyo_realpath_from_path. 16:14:17 executing program 1 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:17 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:17 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:17 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:17 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:17 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:18 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:18 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:18 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:18 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:18 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:18 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 664.077716][T29118] FAULT_INJECTION: forcing a failure. [ 664.077716][T29118] name failslab, interval 1, probability 0, space 0, times 0 [ 664.101135][T29118] CPU: 0 PID: 29118 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 664.109153][T29118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 664.119222][T29118] Call Trace: [ 664.122526][T29118] dump_stack+0x1d8/0x2f8 [ 664.126847][T29118] should_fail+0x608/0x860 [ 664.131239][T29118] ? setup_fault_attr+0x2b0/0x2b0 [ 664.136247][T29118] __should_failslab+0x11a/0x160 [ 664.141185][T29118] ? skb_clone+0x1cc/0x380 [ 664.145585][T29118] should_failslab+0x9/0x20 [ 664.150064][T29118] kmem_cache_alloc+0x56/0x2b0 [ 664.154811][T29118] skb_clone+0x1cc/0x380 [ 664.159090][T29118] netlink_broadcast_filtered+0x5d1/0x1000 [ 664.164893][T29118] ? refcount_inc_not_zero_checked+0x1ac/0x280 [ 664.171028][T29118] netlink_broadcast+0x3a/0x50 [ 664.175776][T29118] kobject_uevent_env+0xcf0/0x1260 [ 664.180868][T29118] ? sysfs_create_group+0x30/0x30 [ 664.185879][T29118] kobject_uevent+0x1f/0x30 [ 664.190361][T29118] loop_set_fd+0xce7/0x1130 [ 664.194877][T29118] lo_ioctl+0x17a/0x2400 [ 664.199113][T29118] ? match_held_lock+0x280/0x280 [ 664.204026][T29118] ? kobj_lookup+0xc2/0x450 [ 664.208506][T29118] ? lo_release+0x1f0/0x1f0 [ 664.213010][T29118] ? match_held_lock+0x280/0x280 [ 664.217926][T29118] ? __bfs+0x550/0x550 [ 664.221990][T29118] ? __bfs+0x550/0x550 [ 664.226038][T29118] ? __bfs+0x550/0x550 [ 664.230086][T29118] ? match_held_lock+0x280/0x280 [ 664.235013][T29118] ? __lock_acquire+0xcf7/0x1a40 [ 664.239932][T29118] ? __bfs+0x550/0x550 [ 664.243985][T29118] ? __lock_acquire+0xcf7/0x1a40 [ 664.248917][T29118] ? __lock_acquire+0xcf7/0x1a40 [ 664.253838][T29118] ? trace_lock_acquire+0x190/0x190 [ 664.259020][T29118] ? __read_once_size_nocheck+0x10/0x10 [ 664.264538][T29118] ? unwind_next_frame+0x415/0x870 [ 664.269645][T29118] ? rcu_lock_release+0x9/0x30 [ 664.274391][T29118] ? stack_trace_save+0x1e0/0x1e0 [ 664.279393][T29118] ? rcu_lock_release+0x26/0x30 [ 664.284218][T29118] ? is_bpf_text_address+0x398/0x3b0 [ 664.289483][T29118] ? stack_trace_save+0x1e0/0x1e0 [ 664.294483][T29118] ? __kernel_text_address+0x9a/0x110 [ 664.299834][T29118] ? unwind_get_return_address+0x4c/0x90 [ 664.305443][T29118] ? arch_stack_walk+0x98/0xe0 [ 664.310187][T29118] ? stack_trace_save+0x111/0x1e0 [ 664.315193][T29118] ? lo_release+0x1f0/0x1f0 [ 664.319675][T29118] blkdev_ioctl+0x917/0x2c10 [ 664.324261][T29118] ? tomoyo_path_number_perm+0x587/0x740 [ 664.329887][T29118] ? trace_hardirqs_off+0x74/0x80 [ 664.334890][T29118] ? quarantine_put+0xb7/0x1f0 [ 664.339628][T29118] ? tomoyo_path_number_perm+0x587/0x740 [ 664.345237][T29118] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 664.350496][T29118] ? __kasan_slab_free+0x19d/0x1e0 [ 664.355597][T29118] ? __kasan_slab_free+0x12a/0x1e0 [ 664.360710][T29118] ? kasan_slab_free+0xe/0x10 [ 664.365360][T29118] ? kfree+0xae/0x120 [ 664.369313][T29118] ? tomoyo_path_number_perm+0x587/0x740 [ 664.374921][T29118] ? tomoyo_file_ioctl+0x23/0x30 [ 664.379832][T29118] ? security_file_ioctl+0x6d/0xd0 [ 664.384921][T29118] ? __x64_sys_ioctl+0xa3/0x120 [ 664.389765][T29118] ? do_syscall_64+0xfe/0x140 [ 664.394418][T29118] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 664.400476][T29118] ? kasan_check_write+0x14/0x20 [ 664.405389][T29118] ? do_raw_spin_lock+0x143/0x3a0 [ 664.410394][T29118] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 664.416183][T29118] ? rcu_lock_release+0x9/0x30 [ 664.420923][T29118] ? tomoyo_path_number_perm+0x5f0/0x740 [ 664.426531][T29118] ? trace_lock_acquire+0x190/0x190 [ 664.431710][T29118] ? tomoyo_check_path_acl+0x180/0x180 [ 664.437148][T29118] block_ioctl+0xbd/0x100 [ 664.441454][T29118] ? blkdev_iopoll+0x100/0x100 [ 664.446203][T29118] do_vfs_ioctl+0x7d4/0x1890 [ 664.450787][T29118] ? ioctl_preallocate+0x240/0x240 [ 664.455886][T29118] ? fget_many+0x30/0x30 [ 664.460104][T29118] ? debug_smp_processor_id+0x1c/0x20 [ 664.465447][T29118] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 664.471710][T29118] ? tomoyo_file_ioctl+0x23/0x30 [ 664.476626][T29118] ? security_file_ioctl+0xa1/0xd0 [ 664.481713][T29118] __x64_sys_ioctl+0xe3/0x120 [ 664.486370][T29118] do_syscall_64+0xfe/0x140 [ 664.490866][T29118] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 664.496738][T29118] RIP: 0033:0x459637 [ 664.500889][T29118] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 664.520476][T29118] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 664.528871][T29118] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 664.542204][T29118] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 664.550203][T29118] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 664.558177][T29118] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 664.566164][T29118] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:18 executing program 1 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:18 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:18 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:18 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:18 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:18 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:18 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:18 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:18 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:18 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:18 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 664.823087][T29144] FAULT_INJECTION: forcing a failure. [ 664.823087][T29144] name failslab, interval 1, probability 0, space 0, times 0 [ 664.899883][T29144] CPU: 1 PID: 29144 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 664.907915][T29144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 664.918011][T29144] Call Trace: [ 664.921315][T29144] dump_stack+0x1d8/0x2f8 [ 664.925653][T29144] should_fail+0x608/0x860 [ 664.930084][T29144] ? setup_fault_attr+0x2b0/0x2b0 [ 664.935128][T29144] __should_failslab+0x11a/0x160 [ 664.940073][T29144] ? getname_flags+0xba/0x640 [ 664.944753][T29144] should_failslab+0x9/0x20 [ 664.949262][T29144] kmem_cache_alloc+0x56/0x2b0 [ 664.954031][T29144] getname_flags+0xba/0x640 [ 664.958537][T29144] do_mkdirat+0x91/0x390 [ 664.962821][T29144] ? file_open_root+0x440/0x440 [ 664.967676][T29144] ? vfs_mkdir+0x610/0x610 [ 664.972092][T29144] ? kasan_check_write+0x14/0x20 [ 664.977035][T29144] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 664.982494][T29144] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 664.988224][T29144] ? do_syscall_64+0x1d/0x140 [ 664.992903][T29144] __x64_sys_mkdir+0x60/0x70 [ 664.997495][T29144] do_syscall_64+0xfe/0x140 [ 665.002009][T29144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 665.007901][T29144] RIP: 0033:0x458be7 [ 665.011799][T29144] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 665.031411][T29144] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 665.039822][T29144] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 16:14:19 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 665.047791][T29144] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 665.055763][T29144] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 665.063738][T29144] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 665.071711][T29144] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:19 executing program 1 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:19 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:19 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:19 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:19 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:19 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:19 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:19 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:19 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:19 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:19 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:19 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 665.328440][T29171] FAULT_INJECTION: forcing a failure. [ 665.328440][T29171] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 665.341710][T29171] CPU: 1 PID: 29171 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 665.349683][T29171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.359765][T29171] Call Trace: [ 665.363059][T29171] dump_stack+0x1d8/0x2f8 [ 665.367394][T29171] should_fail+0x608/0x860 [ 665.371817][T29171] ? setup_fault_attr+0x2b0/0x2b0 [ 665.376850][T29171] ? __bfs+0x550/0x550 [ 665.376869][T29171] should_fail_alloc_page+0x55/0x60 [ 665.376880][T29171] prepare_alloc_pages+0x283/0x460 [ 665.376895][T29171] __alloc_pages_nodemask+0x11c/0x790 [ 665.376913][T29171] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 665.386156][T29171] ? __lock_acquire+0xcf7/0x1a40 [ 665.386179][T29171] kmem_getpages+0x46/0x480 [ 665.386199][T29171] cache_grow_begin+0x7e/0x2c0 [ 665.386213][T29171] cache_alloc_refill+0x311/0x3f0 [ 665.386225][T29171] ? check_preemption_disabled+0xb7/0x280 [ 665.386239][T29171] __kmalloc+0x2e5/0x310 [ 665.386249][T29171] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 665.386267][T29171] tomoyo_realpath_from_path+0xdc/0x7c0 [ 665.396744][T29171] tomoyo_path_number_perm+0x1e0/0x740 [ 665.396756][T29171] ? quarantine_put+0xb7/0x1f0 [ 665.396768][T29171] ? __kasan_slab_free+0x19d/0x1e0 [ 665.396777][T29171] ? __kasan_slab_free+0x12a/0x1e0 [ 665.396787][T29171] ? filename_create+0x480/0x6f0 [ 665.396797][T29171] ? tomoyo_check_path_acl+0x180/0x180 [ 665.396813][T29171] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 665.407255][T29171] ? trace_kfree+0xb2/0x110 [ 665.407272][T29171] ? do_raw_spin_lock+0x143/0x3a0 [ 665.407306][T29171] ? filename_create+0x480/0x6f0 [ 665.407319][T29171] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 665.407336][T29171] tomoyo_path_mkdir+0xe3/0x120 [ 665.416568][T29171] ? tomoyo_path_unlink+0x100/0x100 [ 665.416580][T29171] ? kern_path_create+0x40/0x40 [ 665.416597][T29171] security_path_mkdir+0xed/0x170 [ 665.416611][T29171] do_mkdirat+0x1ae/0x390 [ 665.416622][T29171] ? debug_smp_processor_id+0x1c/0x20 [ 665.416635][T29171] ? vfs_mkdir+0x610/0x610 [ 665.427367][T29171] ? kasan_check_write+0x14/0x20 [ 665.427380][T29171] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 665.427392][T29171] ? do_syscall_64+0x1d/0x140 [ 665.427404][T29171] __x64_sys_mkdir+0x60/0x70 [ 665.427416][T29171] do_syscall_64+0xfe/0x140 [ 665.427432][T29171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 665.427443][T29171] RIP: 0033:0x458be7 [ 665.427454][T29171] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 665.427460][T29171] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 665.427475][T29171] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 665.604050][T29171] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 665.612306][T29171] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 665.620277][T29171] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 665.628247][T29171] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:19 executing program 1 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:19 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:19 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:19 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:19 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:19 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:19 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:19 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:19 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:19 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:19 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 665.922992][T29197] FAULT_INJECTION: forcing a failure. [ 665.922992][T29197] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 665.936245][T29197] CPU: 1 PID: 29197 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 665.944226][T29197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.954298][T29197] Call Trace: [ 665.957599][T29197] dump_stack+0x1d8/0x2f8 [ 665.962115][T29197] should_fail+0x608/0x860 [ 665.966544][T29197] ? setup_fault_attr+0x2b0/0x2b0 [ 665.971577][T29197] should_fail_alloc_page+0x55/0x60 [ 665.971588][T29197] prepare_alloc_pages+0x283/0x460 [ 665.971604][T29197] __alloc_pages_nodemask+0x11c/0x790 [ 665.987275][T29197] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 665.992833][T29197] ? tomoyo_path_number_perm+0x5f0/0x740 [ 665.998473][T29197] ? tomoyo_check_path_acl+0x180/0x180 [ 666.003933][T29197] kmem_getpages+0x46/0x480 [ 666.003948][T29197] cache_grow_begin+0x7e/0x2c0 [ 666.003961][T29197] cache_alloc_refill+0x311/0x3f0 [ 666.003974][T29197] ? check_preemption_disabled+0xb7/0x280 [ 666.003993][T29197] kmem_cache_alloc+0x288/0x2b0 [ 666.018251][T29197] ? getname_flags+0xba/0x640 [ 666.018265][T29197] getname_flags+0xba/0x640 [ 666.018280][T29197] do_mkdirat+0x91/0x390 [ 666.037978][T29197] ? debug_smp_processor_id+0x1c/0x20 [ 666.037995][T29197] ? vfs_mkdir+0x610/0x610 [ 666.038004][T29197] ? kasan_check_write+0x14/0x20 [ 666.038020][T29197] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 666.047642][T29197] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 666.047655][T29197] ? do_syscall_64+0x1d/0x140 16:14:19 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 666.047673][T29197] __x64_sys_mkdir+0x60/0x70 [ 666.062453][T29197] do_syscall_64+0xfe/0x140 [ 666.072815][T29197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 666.072826][T29197] RIP: 0033:0x458be7 [ 666.072838][T29197] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 666.072843][T29197] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 666.072853][T29197] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 666.072859][T29197] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 666.072870][T29197] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 666.081928][T29197] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 666.081935][T29197] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:20 executing program 1 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:20 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:20 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:20 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:20 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:20 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 666.304601][T29220] FAULT_INJECTION: forcing a failure. [ 666.304601][T29220] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 666.317833][T29220] CPU: 0 PID: 29220 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 666.325803][T29220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 666.335855][T29220] Call Trace: [ 666.339147][T29220] dump_stack+0x1d8/0x2f8 [ 666.343490][T29220] should_fail+0x608/0x860 [ 666.347919][T29220] ? setup_fault_attr+0x2b0/0x2b0 [ 666.352957][T29220] ? __bfs+0x550/0x550 [ 666.357031][T29220] should_fail_alloc_page+0x55/0x60 [ 666.362232][T29220] prepare_alloc_pages+0x283/0x460 [ 666.367345][T29220] __alloc_pages_nodemask+0x11c/0x790 [ 666.372727][T29220] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 666.378272][T29220] ? __lock_acquire+0xcf7/0x1a40 [ 666.383237][T29220] kmem_getpages+0x46/0x480 [ 666.387748][T29220] cache_grow_begin+0x7e/0x2c0 [ 666.392517][T29220] cache_alloc_refill+0x311/0x3f0 [ 666.397547][T29220] ? check_preemption_disabled+0xb7/0x280 [ 666.403270][T29220] __kmalloc+0x2e5/0x310 [ 666.407515][T29220] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 666.413236][T29220] tomoyo_realpath_from_path+0xdc/0x7c0 [ 666.418788][T29220] tomoyo_path_number_perm+0x1e0/0x740 [ 666.424244][T29220] ? quarantine_put+0xb7/0x1f0 [ 666.429010][T29220] ? __kasan_slab_free+0x19d/0x1e0 [ 666.434116][T29220] ? __kasan_slab_free+0x12a/0x1e0 [ 666.439225][T29220] ? filename_create+0x480/0x6f0 [ 666.444166][T29220] ? tomoyo_check_path_acl+0x180/0x180 [ 666.449622][T29220] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 666.455698][T29220] ? trace_kfree+0xb2/0x110 [ 666.460208][T29220] ? do_raw_spin_lock+0x143/0x3a0 [ 666.465260][T29220] ? filename_create+0x480/0x6f0 [ 666.470198][T29220] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 666.475924][T29220] tomoyo_path_mkdir+0xe3/0x120 [ 666.480775][T29220] ? tomoyo_path_unlink+0x100/0x100 [ 666.485980][T29220] ? kern_path_create+0x40/0x40 [ 666.490835][T29220] security_path_mkdir+0xed/0x170 [ 666.495863][T29220] do_mkdirat+0x1ae/0x390 [ 666.500191][T29220] ? debug_smp_processor_id+0x1c/0x20 [ 666.505560][T29220] ? vfs_mkdir+0x610/0x610 [ 666.505571][T29220] ? kasan_check_write+0x14/0x20 [ 666.505583][T29220] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 666.505598][T29220] ? do_syscall_64+0x1d/0x140 [ 666.514952][T29220] __x64_sys_mkdir+0x60/0x70 [ 666.514964][T29220] do_syscall_64+0xfe/0x140 [ 666.514980][T29220] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 666.514990][T29220] RIP: 0033:0x458be7 [ 666.515001][T29220] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 666.515006][T29220] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 666.515015][T29220] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 666.515022][T29220] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 666.515027][T29220] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 16:14:20 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:20 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:20 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:20 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:20 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:20 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 666.515033][T29220] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 666.515039][T29220] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:20 executing program 1 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:20 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:20 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:20 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:20 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:20 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:20 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:20 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:20 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:20 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:20 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 666.901532][T29245] FAULT_INJECTION: forcing a failure. [ 666.901532][T29245] name failslab, interval 1, probability 0, space 0, times 0 16:14:21 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 667.007680][T29245] CPU: 0 PID: 29245 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 667.015721][T29245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 667.025777][T29245] Call Trace: [ 667.025819][T29245] dump_stack+0x1d8/0x2f8 [ 667.025835][T29245] should_fail+0x608/0x860 [ 667.025850][T29245] ? setup_fault_attr+0x2b0/0x2b0 [ 667.025872][T29245] __should_failslab+0x11a/0x160 [ 667.025884][T29245] ? security_inode_alloc+0x36/0x1e0 [ 667.025894][T29245] should_failslab+0x9/0x20 [ 667.025903][T29245] kmem_cache_alloc+0x56/0x2b0 [ 667.025912][T29245] ? memset+0x31/0x40 [ 667.025924][T29245] security_inode_alloc+0x36/0x1e0 [ 667.025945][T29245] inode_init_always+0x3b5/0x8d0 [ 667.047934][T29245] ? set_qf_name+0x3c0/0x3c0 [ 667.047950][T29245] new_inode_pseudo+0x7f/0x240 [ 667.081038][T29245] new_inode+0x28/0x1c0 [ 667.081126][T29245] ? trace_ext4_request_inode+0x24d/0x290 [ 667.081141][T29245] __ext4_new_inode+0x5ea/0x5c40 [ 667.090058][T29245] ? tomoyo_path_number_perm+0x5f0/0x740 [ 667.090073][T29245] ? ext4_read_inode_bitmap+0x1710/0x1710 [ 667.090087][T29245] ? smack_log+0xe3/0x4e0 [ 667.116384][T29245] ? memset+0x31/0x40 [ 667.120435][T29245] ? __dquot_initialize+0x228/0xdd0 [ 667.125641][T29245] ? smk_access+0x18c/0x4f0 [ 667.130155][T29245] ? dquot_initialize+0x20/0x20 [ 667.135012][T29245] ? smk_tskacc+0x2ef/0x390 [ 667.139525][T29245] ? smk_curacc+0xa3/0xe0 [ 667.143921][T29245] ext4_mkdir+0x413/0x1460 [ 667.148410][T29245] ? from_kgid+0x236/0x390 [ 667.152837][T29245] ? ext4_symlink+0x1010/0x1010 [ 667.157699][T29245] ? security_inode_permission+0xdd/0x120 [ 667.163437][T29245] ? security_inode_mkdir+0xeb/0x130 [ 667.168734][T29245] vfs_mkdir+0x43f/0x610 [ 667.172988][T29245] do_mkdirat+0x22a/0x390 [ 667.177313][T29245] ? debug_smp_processor_id+0x1c/0x20 [ 667.182684][T29245] ? vfs_mkdir+0x610/0x610 [ 667.187111][T29245] ? kasan_check_write+0x14/0x20 [ 667.192047][T29245] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 667.192061][T29245] ? do_syscall_64+0x1d/0x140 [ 667.192075][T29245] __x64_sys_mkdir+0x60/0x70 [ 667.192086][T29245] do_syscall_64+0xfe/0x140 [ 667.192105][T29245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 667.202495][T29245] RIP: 0033:0x458be7 [ 667.202507][T29245] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 667.202513][T29245] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 667.202524][T29245] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 16:14:21 executing program 1 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:21 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:21 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:21 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:21 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:21 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 667.202530][T29245] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 667.202535][T29245] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 667.202540][T29245] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 667.202546][T29245] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 667.384533][T29270] FAULT_INJECTION: forcing a failure. [ 667.384533][T29270] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 667.397775][T29270] CPU: 0 PID: 29270 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 667.405753][T29270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 667.415811][T29270] Call Trace: [ 667.419115][T29270] dump_stack+0x1d8/0x2f8 [ 667.423455][T29270] should_fail+0x608/0x860 [ 667.427876][T29270] ? setup_fault_attr+0x2b0/0x2b0 [ 667.432911][T29270] ? __bfs+0x550/0x550 [ 667.436982][T29270] should_fail_alloc_page+0x55/0x60 [ 667.442177][T29270] prepare_alloc_pages+0x283/0x460 [ 667.447293][T29270] __alloc_pages_nodemask+0x11c/0x790 [ 667.452669][T29270] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 667.452683][T29270] ? __lock_acquire+0xcf7/0x1a40 [ 667.452712][T29270] kmem_getpages+0x46/0x480 [ 667.452724][T29270] cache_grow_begin+0x7e/0x2c0 [ 667.452737][T29270] cache_alloc_refill+0x311/0x3f0 [ 667.452750][T29270] ? check_preemption_disabled+0xb7/0x280 [ 667.452763][T29270] __kmalloc+0x2e5/0x310 [ 667.463226][T29270] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 667.463241][T29270] tomoyo_realpath_from_path+0xdc/0x7c0 [ 667.463260][T29270] tomoyo_path_number_perm+0x1e0/0x740 [ 667.463270][T29270] ? quarantine_put+0xb7/0x1f0 [ 667.463281][T29270] ? __kasan_slab_free+0x19d/0x1e0 [ 667.463289][T29270] ? __kasan_slab_free+0x12a/0x1e0 [ 667.463299][T29270] ? filename_create+0x480/0x6f0 [ 667.463308][T29270] ? tomoyo_check_path_acl+0x180/0x180 [ 667.463319][T29270] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 667.463327][T29270] ? trace_kfree+0xb2/0x110 [ 667.463343][T29270] ? do_raw_spin_lock+0x143/0x3a0 [ 667.519173][T29270] ? filename_create+0x480/0x6f0 [ 667.519189][T29270] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 667.519209][T29270] tomoyo_path_mkdir+0xe3/0x120 [ 667.529584][T29270] ? tomoyo_path_unlink+0x100/0x100 [ 667.529597][T29270] ? kern_path_create+0x40/0x40 [ 667.529614][T29270] security_path_mkdir+0xed/0x170 [ 667.529632][T29270] do_mkdirat+0x1ae/0x390 [ 667.580028][T29270] ? debug_smp_processor_id+0x1c/0x20 [ 667.585406][T29270] ? vfs_mkdir+0x610/0x610 [ 667.589827][T29270] ? kasan_check_write+0x14/0x20 [ 667.589842][T29270] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 667.589854][T29270] ? do_syscall_64+0x1d/0x140 [ 667.589871][T29270] __x64_sys_mkdir+0x60/0x70 [ 667.600506][T29270] do_syscall_64+0xfe/0x140 [ 667.600523][T29270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 667.600533][T29270] RIP: 0033:0x458be7 [ 667.600547][T29270] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 667.643626][T29270] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 667.652047][T29270] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 667.660026][T29270] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 667.668012][T29270] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 667.675993][T29270] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 16:14:21 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:21 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:21 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:21 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:21 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 667.684055][T29270] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:21 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:21 executing program 1 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:21 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:21 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:21 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:21 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:21 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:22 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 667.968430][T29295] FAULT_INJECTION: forcing a failure. [ 667.968430][T29295] name failslab, interval 1, probability 0, space 0, times 0 [ 667.987340][T29295] CPU: 1 PID: 29295 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 667.995332][T29295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 668.005388][T29295] Call Trace: [ 668.008690][T29295] dump_stack+0x1d8/0x2f8 [ 668.013033][T29295] should_fail+0x608/0x860 [ 668.017459][T29295] ? setup_fault_attr+0x2b0/0x2b0 [ 668.022486][T29295] ? kasan_slab_free+0xe/0x10 [ 668.022494][T29295] ? kfree+0xae/0x120 [ 668.022507][T29295] __should_failslab+0x11a/0x160 [ 668.022523][T29295] ? ext4_alloc_inode+0x1f/0x560 [ 668.031165][T29295] should_failslab+0x9/0x20 [ 668.045497][T29295] kmem_cache_alloc+0x56/0x2b0 [ 668.050266][T29295] ? set_qf_name+0x3c0/0x3c0 [ 668.054958][T29295] ext4_alloc_inode+0x1f/0x560 [ 668.059722][T29295] ? set_qf_name+0x3c0/0x3c0 [ 668.064335][T29295] new_inode_pseudo+0x68/0x240 [ 668.064348][T29295] new_inode+0x28/0x1c0 [ 668.064362][T29295] ? trace_ext4_request_inode+0x24d/0x290 [ 668.064375][T29295] __ext4_new_inode+0x5ea/0x5c40 [ 668.064400][T29295] ? tomoyo_path_number_perm+0x5f0/0x740 [ 668.064414][T29295] ? ext4_read_inode_bitmap+0x1710/0x1710 [ 668.079021][T29295] ? smack_log+0xe3/0x4e0 [ 668.079037][T29295] ? memset+0x31/0x40 [ 668.079050][T29295] ? __dquot_initialize+0x228/0xdd0 [ 668.079059][T29295] ? smk_access+0x18c/0x4f0 [ 668.079074][T29295] ? dquot_initialize+0x20/0x20 16:14:22 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:22 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:22 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:22 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:22 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 668.099631][T29295] ? smk_tskacc+0x2ef/0x390 [ 668.113265][T29295] ? smk_curacc+0xa3/0xe0 [ 668.113282][T29295] ext4_mkdir+0x413/0x1460 [ 668.113309][T29295] ? from_kgid+0x236/0x390 [ 668.113320][T29295] ? ext4_symlink+0x1010/0x1010 [ 668.113335][T29295] ? security_inode_permission+0xdd/0x120 [ 668.122674][T29295] ? security_inode_mkdir+0xeb/0x130 [ 668.122689][T29295] vfs_mkdir+0x43f/0x610 [ 668.122706][T29295] do_mkdirat+0x22a/0x390 [ 668.122718][T29295] ? debug_smp_processor_id+0x1c/0x20 [ 668.122731][T29295] ? vfs_mkdir+0x610/0x610 [ 668.122744][T29295] ? kasan_check_write+0x14/0x20 [ 668.131460][T29295] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 668.131472][T29295] ? do_syscall_64+0x1d/0x140 [ 668.131485][T29295] __x64_sys_mkdir+0x60/0x70 [ 668.155928][T29295] do_syscall_64+0xfe/0x140 [ 668.155946][T29295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 668.155957][T29295] RIP: 0033:0x458be7 [ 668.155973][T29295] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 668.165641][T29295] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 668.165652][T29295] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 668.165659][T29295] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 668.165665][T29295] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 668.165671][T29295] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 668.165676][T29295] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:22 executing program 1 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:22 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:22 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:22 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:22 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:22 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:22 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:22 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:22 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:22 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:22 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:22 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 668.470790][T29325] FAULT_INJECTION: forcing a failure. [ 668.470790][T29325] name failslab, interval 1, probability 0, space 0, times 0 [ 668.483807][T29325] CPU: 0 PID: 29325 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 668.491793][T29325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 668.501850][T29325] Call Trace: [ 668.505149][T29325] dump_stack+0x1d8/0x2f8 [ 668.509489][T29325] should_fail+0x608/0x860 [ 668.513914][T29325] ? setup_fault_attr+0x2b0/0x2b0 [ 668.518947][T29325] ? trace_lock_acquire+0x190/0x190 [ 668.524142][T29325] ? kcalloc+0x2f/0x50 [ 668.528217][T29325] __should_failslab+0x11a/0x160 [ 668.533157][T29325] ? __es_insert_extent+0x7ba/0x17c0 [ 668.538440][T29325] should_failslab+0x9/0x20 [ 668.542939][T29325] kmem_cache_alloc+0x56/0x2b0 [ 668.547717][T29325] __es_insert_extent+0x7ba/0x17c0 [ 668.552829][T29325] ? trace_ext4_es_insert_extent+0x290/0x290 [ 668.558851][T29325] ext4_es_insert_extent+0x2d0/0x2f40 [ 668.564254][T29325] ? kcalloc+0x2f/0x50 [ 668.568333][T29325] ? ext4_es_scan_clu+0x270/0x270 [ 668.573366][T29325] ? trace_ext4_es_find_extent_range_exit+0x24d/0x290 [ 668.580133][T29325] ? trace_ext4_ext_convert_to_initialized_fastpath+0x2d0/0x2d0 [ 668.589283][T29325] ? ext4_es_find_extent_range+0x63/0x80 [ 668.589330][T29325] ext4_ext_map_blocks+0x181f/0x7f30 [ 668.589364][T29325] ? ext4_ext_release+0x10/0x10 [ 668.589374][T29325] ? kasan_check_write+0x14/0x20 [ 668.589398][T29325] ? trace_lock_acquire+0x11c/0x190 [ 668.589409][T29325] ? lock_acquire+0x158/0x250 [ 668.589418][T29325] ? ext4_map_blocks+0x300/0x1cd0 [ 668.589434][T29325] ? kasan_check_write+0x14/0x20 [ 668.629904][T29325] ? __down_read+0x1a/0x1a0 [ 668.634413][T29325] ext4_map_blocks+0x480/0x1cd0 [ 668.639266][T29325] ? ext4_issue_zeroout+0x170/0x170 [ 668.639276][T29325] ? __brelse+0x5a/0xa0 [ 668.639296][T29325] ext4_getblk+0xff/0x530 [ 668.652935][T29325] ? tomoyo_path_number_perm+0x5f0/0x740 [ 668.658569][T29325] ? ext4_get_block_trans+0x590/0x590 [ 668.666428][T29325] ? smack_log+0xe3/0x4e0 [ 668.674151][T29325] ? memset+0x31/0x40 [ 668.674165][T29325] ? __dquot_initialize+0x228/0xdd0 [ 668.674177][T29325] ext4_bread+0x91/0x240 [ 668.674189][T29325] ? ext4_getblk+0x530/0x530 [ 668.674198][T29325] ? smk_tskacc+0x2ef/0x390 [ 668.674214][T29325] ext4_append+0x175/0x310 [ 668.674229][T29325] ext4_mkdir+0x7d8/0x1460 [ 668.674251][T29325] ? from_kgid+0x236/0x390 [ 668.674263][T29325] ? ext4_symlink+0x1010/0x1010 [ 668.674278][T29325] ? security_inode_permission+0xdd/0x120 [ 668.687657][T29325] ? security_inode_mkdir+0xeb/0x130 [ 668.701122][T29325] vfs_mkdir+0x43f/0x610 [ 668.701140][T29325] do_mkdirat+0x22a/0x390 [ 668.701156][T29325] ? debug_smp_processor_id+0x1c/0x20 [ 668.714799][T29325] ? vfs_mkdir+0x610/0x610 [ 668.714809][T29325] ? kasan_check_write+0x14/0x20 [ 668.714820][T29325] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 668.714831][T29325] ? do_syscall_64+0x1d/0x140 [ 668.714843][T29325] __x64_sys_mkdir+0x60/0x70 [ 668.714854][T29325] do_syscall_64+0xfe/0x140 [ 668.714869][T29325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 668.714879][T29325] RIP: 0033:0x458be7 [ 668.714890][T29325] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 668.714895][T29325] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 668.714906][T29325] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 668.714912][T29325] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 668.714917][T29325] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 668.714922][T29325] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 668.714927][T29325] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:22 executing program 1 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:22 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:22 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:22 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:22 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:22 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:23 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:23 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:23 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:23 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:23 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 669.030229][T29347] FAULT_INJECTION: forcing a failure. [ 669.030229][T29347] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 669.043470][T29347] CPU: 0 PID: 29347 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 669.051445][T29347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.061494][T29347] Call Trace: [ 669.061516][T29347] dump_stack+0x1d8/0x2f8 [ 669.061532][T29347] should_fail+0x608/0x860 [ 669.061545][T29347] ? setup_fault_attr+0x2b0/0x2b0 16:14:23 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 669.061567][T29347] should_fail_alloc_page+0x55/0x60 [ 669.061577][T29347] prepare_alloc_pages+0x283/0x460 [ 669.061593][T29347] __alloc_pages_nodemask+0x11c/0x790 [ 669.061611][T29347] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 669.099969][T29347] kmem_getpages+0x46/0x480 [ 669.104504][T29347] cache_grow_begin+0x7e/0x2c0 [ 669.109270][T29347] cache_alloc_refill+0x311/0x3f0 [ 669.114295][T29347] ? check_preemption_disabled+0xb7/0x280 [ 669.120021][T29347] kmem_cache_alloc+0x288/0x2b0 [ 669.124876][T29347] ? ext4_alloc_inode+0x1f/0x560 [ 669.129812][T29347] ? set_qf_name+0x3c0/0x3c0 [ 669.134401][T29347] ext4_alloc_inode+0x1f/0x560 [ 669.139161][T29347] ? set_qf_name+0x3c0/0x3c0 [ 669.143747][T29347] new_inode_pseudo+0x68/0x240 [ 669.143760][T29347] new_inode+0x28/0x1c0 [ 669.143772][T29347] ? trace_ext4_request_inode+0x24d/0x290 [ 669.143784][T29347] __ext4_new_inode+0x5ea/0x5c40 [ 669.143808][T29347] ? tomoyo_path_number_perm+0x5f0/0x740 [ 669.143817][T29347] ? ext4_read_inode_bitmap+0x1710/0x1710 [ 669.143827][T29347] ? smack_log+0xe3/0x4e0 [ 669.143841][T29347] ? memset+0x31/0x40 [ 669.174777][T29347] ? __dquot_initialize+0x228/0xdd0 [ 669.174789][T29347] ? smk_access+0x18c/0x4f0 [ 669.174803][T29347] ? dquot_initialize+0x20/0x20 [ 669.174810][T29347] ? smk_tskacc+0x2ef/0x390 [ 669.174824][T29347] ? smk_curacc+0xa3/0xe0 [ 669.174840][T29347] ext4_mkdir+0x413/0x1460 [ 669.197639][T29347] ? from_kgid+0x236/0x390 [ 669.206446][T29347] ? ext4_symlink+0x1010/0x1010 [ 669.206457][T29347] ? security_inode_permission+0xdd/0x120 [ 669.206469][T29347] ? security_inode_mkdir+0xeb/0x130 [ 669.206483][T29347] vfs_mkdir+0x43f/0x610 [ 669.206498][T29347] do_mkdirat+0x22a/0x390 [ 669.206509][T29347] ? debug_smp_processor_id+0x1c/0x20 [ 669.206521][T29347] ? vfs_mkdir+0x610/0x610 [ 669.206530][T29347] ? kasan_check_write+0x14/0x20 [ 669.206543][T29347] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 669.206555][T29347] ? do_syscall_64+0x1d/0x140 [ 669.206566][T29347] __x64_sys_mkdir+0x60/0x70 [ 669.206577][T29347] do_syscall_64+0xfe/0x140 [ 669.206591][T29347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 669.206601][T29347] RIP: 0033:0x458be7 [ 669.206612][T29347] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 669.206617][T29347] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 669.206627][T29347] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 669.206633][T29347] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 669.206638][T29347] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 669.206644][T29347] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 669.206650][T29347] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:23 executing program 1 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:23 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:23 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:23 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:23 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:23 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:23 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 669.539136][T29371] FAULT_INJECTION: forcing a failure. [ 669.539136][T29371] name failslab, interval 1, probability 0, space 0, times 0 [ 669.551932][T29371] CPU: 0 PID: 29371 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 669.559938][T29371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.569990][T29371] Call Trace: [ 669.573285][T29371] dump_stack+0x1d8/0x2f8 [ 669.577625][T29371] should_fail+0x608/0x860 [ 669.582039][T29371] ? setup_fault_attr+0x2b0/0x2b0 16:14:23 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:23 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:23 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:23 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 669.587588][T29371] ? trace_lock_acquire+0x190/0x190 [ 669.592796][T29371] ? kcalloc+0x2f/0x50 [ 669.596868][T29371] __should_failslab+0x11a/0x160 [ 669.601803][T29371] ? __es_insert_extent+0x7ba/0x17c0 [ 669.607088][T29371] should_failslab+0x9/0x20 [ 669.611589][T29371] kmem_cache_alloc+0x56/0x2b0 [ 669.616354][T29371] __es_insert_extent+0x7ba/0x17c0 [ 669.621467][T29371] ? trace_ext4_es_insert_extent+0x290/0x290 [ 669.627456][T29371] ext4_es_insert_extent+0x2d0/0x2f40 [ 669.632827][T29371] ? kcalloc+0x2f/0x50 16:14:23 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 669.636898][T29371] ? ext4_es_scan_clu+0x270/0x270 [ 669.641932][T29371] ? trace_ext4_es_find_extent_range_exit+0x24d/0x290 [ 669.648694][T29371] ? trace_ext4_ext_convert_to_initialized_fastpath+0x2d0/0x2d0 [ 669.648707][T29371] ? ext4_es_find_extent_range+0x63/0x80 [ 669.648721][T29371] ext4_ext_map_blocks+0x181f/0x7f30 [ 669.667261][T29371] ? ext4_ext_release+0x10/0x10 [ 669.672108][T29371] ? kasan_check_write+0x14/0x20 [ 669.677060][T29371] ? trace_lock_acquire+0x11c/0x190 [ 669.682261][T29371] ? lock_acquire+0x158/0x250 [ 669.686940][T29371] ? ext4_map_blocks+0x300/0x1cd0 [ 669.691966][T29371] ? kasan_check_write+0x14/0x20 [ 669.696908][T29371] ? __down_read+0x1a/0x1a0 [ 669.701417][T29371] ext4_map_blocks+0x480/0x1cd0 [ 669.706279][T29371] ? ext4_issue_zeroout+0x170/0x170 [ 669.711473][T29371] ? __brelse+0x5a/0xa0 [ 669.711496][T29371] ext4_getblk+0xff/0x530 [ 669.711511][T29371] ? tomoyo_path_number_perm+0x5f0/0x740 [ 669.711525][T29371] ? ext4_get_block_trans+0x590/0x590 [ 669.731004][T29371] ? smack_log+0xe3/0x4e0 [ 669.735337][T29371] ? memset+0x31/0x40 [ 669.739317][T29371] ? __dquot_initialize+0x228/0xdd0 [ 669.744542][T29371] ext4_bread+0x91/0x240 [ 669.748788][T29371] ? ext4_getblk+0x530/0x530 [ 669.753374][T29371] ? smk_tskacc+0x2ef/0x390 [ 669.753392][T29371] ext4_append+0x175/0x310 [ 669.753407][T29371] ext4_mkdir+0x7d8/0x1460 [ 669.753428][T29371] ? from_kgid+0x236/0x390 [ 669.766737][T29371] ? ext4_symlink+0x1010/0x1010 [ 669.766748][T29371] ? security_inode_permission+0xdd/0x120 [ 669.766762][T29371] ? security_inode_mkdir+0xeb/0x130 [ 669.786994][T29371] vfs_mkdir+0x43f/0x610 [ 669.791237][T29371] do_mkdirat+0x22a/0x390 [ 669.795561][T29371] ? debug_smp_processor_id+0x1c/0x20 [ 669.795574][T29371] ? vfs_mkdir+0x610/0x610 [ 669.795582][T29371] ? kasan_check_write+0x14/0x20 [ 669.795593][T29371] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 669.795604][T29371] ? do_syscall_64+0x1d/0x140 [ 669.795620][T29371] __x64_sys_mkdir+0x60/0x70 [ 669.816000][T29371] do_syscall_64+0xfe/0x140 [ 669.816017][T29371] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 669.816027][T29371] RIP: 0033:0x458be7 [ 669.816038][T29371] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 669.816044][T29371] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 669.816053][T29371] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 669.816059][T29371] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 669.816064][T29371] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 669.816069][T29371] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 669.816074][T29371] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:24 executing program 1 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:24 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:24 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:24 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:24 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:24 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:24 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:24 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 670.090596][T29396] FAULT_INJECTION: forcing a failure. [ 670.090596][T29396] name failslab, interval 1, probability 0, space 0, times 0 [ 670.112211][T29396] CPU: 0 PID: 29396 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 670.120252][T29396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.130305][T29396] Call Trace: [ 670.130369][T29396] dump_stack+0x1d8/0x2f8 [ 670.130387][T29396] should_fail+0x608/0x860 [ 670.130400][T29396] ? setup_fault_attr+0x2b0/0x2b0 [ 670.130412][T29396] ? kcalloc+0x2f/0x50 [ 670.130434][T29396] __should_failslab+0x11a/0x160 [ 670.156477][T29396] ? kcalloc+0x2f/0x50 [ 670.160576][T29396] should_failslab+0x9/0x20 [ 670.165080][T29396] __kmalloc+0x7a/0x310 [ 670.165095][T29396] kcalloc+0x2f/0x50 [ 670.165105][T29396] ext4_find_extent+0x216/0xaa0 [ 670.165115][T29396] ? trace_ext4_ext_map_blocks_enter+0x28c/0x2d0 [ 670.165127][T29396] ext4_ext_map_blocks+0x201/0x7f30 [ 670.165142][T29396] ? __lock_acquire+0xcf7/0x1a40 [ 670.165167][T29396] ? ext4_ext_release+0x10/0x10 [ 670.165176][T29396] ? kasan_check_write+0x14/0x20 [ 670.165186][T29396] ? ext4_mark_iloc_dirty+0x23b4/0x3310 [ 670.165206][T29396] ? trace_lock_acquire+0x11c/0x190 [ 670.165221][T29396] ? lock_acquire+0x158/0x250 [ 670.173259][T29396] ? ext4_map_blocks+0x300/0x1cd0 [ 670.173272][T29396] ? kasan_check_write+0x14/0x20 [ 670.173284][T29396] ? __down_read+0x1a/0x1a0 [ 670.173296][T29396] ext4_map_blocks+0x480/0x1cd0 [ 670.173318][T29396] ? ext4_issue_zeroout+0x170/0x170 [ 670.173327][T29396] ? __brelse+0x5a/0xa0 [ 670.173347][T29396] ext4_getblk+0xff/0x530 [ 670.184561][T29396] ? tomoyo_path_number_perm+0x5f0/0x740 [ 670.184572][T29396] ? ext4_get_block_trans+0x590/0x590 [ 670.184581][T29396] ? smack_log+0xe3/0x4e0 [ 670.184593][T29396] ? memset+0x31/0x40 [ 670.184605][T29396] ? __dquot_initialize+0x228/0xdd0 [ 670.184616][T29396] ext4_bread+0x91/0x240 [ 670.184626][T29396] ? ext4_getblk+0x530/0x530 [ 670.184634][T29396] ? smk_tskacc+0x2ef/0x390 [ 670.184655][T29396] ext4_append+0x175/0x310 [ 670.194770][T29396] ext4_mkdir+0x7d8/0x1460 [ 670.194793][T29396] ? from_kgid+0x236/0x390 [ 670.194804][T29396] ? ext4_symlink+0x1010/0x1010 [ 670.194814][T29396] ? security_inode_permission+0xdd/0x120 [ 670.194826][T29396] ? security_inode_mkdir+0xeb/0x130 [ 670.194839][T29396] vfs_mkdir+0x43f/0x610 [ 670.194859][T29396] do_mkdirat+0x22a/0x390 [ 670.290625][T29396] ? debug_smp_processor_id+0x1c/0x20 [ 670.290641][T29396] ? vfs_mkdir+0x610/0x610 [ 670.290650][T29396] ? kasan_check_write+0x14/0x20 [ 670.290666][T29396] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 670.299481][T29396] ? do_syscall_64+0x1d/0x140 [ 670.299496][T29396] __x64_sys_mkdir+0x60/0x70 [ 670.299508][T29396] do_syscall_64+0xfe/0x140 [ 670.299525][T29396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.342977][T29396] RIP: 0033:0x458be7 16:14:24 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:24 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:24 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:24 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 670.342988][T29396] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 670.342994][T29396] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 670.343004][T29396] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 670.343009][T29396] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 670.343014][T29396] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 670.343020][T29396] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 670.343025][T29396] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:24 executing program 1 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:24 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:24 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:24 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:24 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:24 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:24 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:24 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:24 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:24 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:24 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 670.695884][T29422] FAULT_INJECTION: forcing a failure. [ 670.695884][T29422] name failslab, interval 1, probability 0, space 0, times 0 [ 670.708714][T29422] CPU: 1 PID: 29422 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 670.716702][T29422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.728295][T29422] Call Trace: [ 670.731596][T29422] dump_stack+0x1d8/0x2f8 [ 670.735943][T29422] should_fail+0x608/0x860 [ 670.740378][T29422] ? setup_fault_attr+0x2b0/0x2b0 16:14:24 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 670.745417][T29422] ? trace_lock_acquire+0x190/0x190 [ 670.750617][T29422] ? kcalloc+0x2f/0x50 [ 670.754726][T29422] __should_failslab+0x11a/0x160 [ 670.759672][T29422] ? __es_insert_extent+0x7ba/0x17c0 [ 670.764973][T29422] should_failslab+0x9/0x20 [ 670.769496][T29422] kmem_cache_alloc+0x56/0x2b0 [ 670.774274][T29422] __es_insert_extent+0x7ba/0x17c0 [ 670.779422][T29422] ? trace_ext4_es_insert_extent+0x290/0x290 [ 670.785523][T29422] ext4_es_insert_extent+0x2d0/0x2f40 [ 670.790920][T29422] ? kcalloc+0x2f/0x50 [ 670.795021][T29422] ? ext4_es_scan_clu+0x270/0x270 [ 670.800333][T29422] ? trace_ext4_es_find_extent_range_exit+0x24d/0x290 [ 670.807118][T29422] ? trace_ext4_ext_convert_to_initialized_fastpath+0x2d0/0x2d0 [ 670.814772][T29422] ? ext4_es_find_extent_range+0x63/0x80 [ 670.814787][T29422] ext4_ext_map_blocks+0x181f/0x7f30 [ 670.814824][T29422] ? ext4_ext_release+0x10/0x10 [ 670.814834][T29422] ? kasan_check_write+0x14/0x20 [ 670.814855][T29422] ? trace_lock_acquire+0x11c/0x190 [ 670.814870][T29422] ? lock_acquire+0x158/0x250 [ 670.814879][T29422] ? ext4_map_blocks+0x300/0x1cd0 [ 670.814894][T29422] ? kasan_check_write+0x14/0x20 [ 670.825826][T29422] ? __down_read+0x1a/0x1a0 [ 670.835633][T29422] ext4_map_blocks+0x480/0x1cd0 [ 670.845494][T29422] ? ext4_issue_zeroout+0x170/0x170 [ 670.845504][T29422] ? __brelse+0x5a/0xa0 [ 670.845527][T29422] ext4_getblk+0xff/0x530 [ 670.845542][T29422] ? tomoyo_path_number_perm+0x5f0/0x740 [ 670.845550][T29422] ? ext4_get_block_trans+0x590/0x590 [ 670.845559][T29422] ? smack_log+0xe3/0x4e0 [ 670.845571][T29422] ? memset+0x31/0x40 [ 670.845581][T29422] ? __dquot_initialize+0x228/0xdd0 [ 670.845592][T29422] ext4_bread+0x91/0x240 [ 670.845605][T29422] ? ext4_getblk+0x530/0x530 [ 670.855552][T29422] ? smk_tskacc+0x2ef/0x390 [ 670.855572][T29422] ext4_append+0x175/0x310 [ 670.855589][T29422] ext4_mkdir+0x7d8/0x1460 [ 670.855612][T29422] ? from_kgid+0x236/0x390 [ 670.855626][T29422] ? ext4_symlink+0x1010/0x1010 [ 670.864962][T29422] ? security_inode_permission+0xdd/0x120 [ 670.864975][T29422] ? security_inode_mkdir+0xeb/0x130 [ 670.864988][T29422] vfs_mkdir+0x43f/0x610 [ 670.865005][T29422] do_mkdirat+0x22a/0x390 [ 670.865017][T29422] ? debug_smp_processor_id+0x1c/0x20 [ 670.865030][T29422] ? vfs_mkdir+0x610/0x610 [ 670.865039][T29422] ? kasan_check_write+0x14/0x20 [ 670.865051][T29422] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 670.865063][T29422] ? do_syscall_64+0x1d/0x140 [ 670.865073][T29422] __x64_sys_mkdir+0x60/0x70 [ 670.865084][T29422] do_syscall_64+0xfe/0x140 [ 670.865101][T29422] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.874430][T29422] RIP: 0033:0x458be7 [ 670.874442][T29422] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 670.874448][T29422] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 670.874459][T29422] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 670.874466][T29422] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 670.874472][T29422] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 670.874477][T29422] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 670.874488][T29422] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:25 executing program 1 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:25 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:25 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:25 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:25 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:25 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:25 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:25 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:25 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:25 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:25 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:25 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 671.305330][T29448] FAULT_INJECTION: forcing a failure. [ 671.305330][T29448] name failslab, interval 1, probability 0, space 0, times 0 [ 671.380738][T29448] CPU: 0 PID: 29448 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 671.388765][T29448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.398823][T29448] Call Trace: [ 671.402126][T29448] dump_stack+0x1d8/0x2f8 [ 671.406463][T29448] should_fail+0x608/0x860 [ 671.410879][T29448] ? setup_fault_attr+0x2b0/0x2b0 [ 671.415904][T29448] __should_failslab+0x11a/0x160 [ 671.415997][T29448] should_failslab+0x9/0x20 [ 671.425426][T29448] kmem_cache_alloc_trace+0x5d/0x2c0 [ 671.430742][T29448] ? smack_d_instantiate+0x7f4/0xe50 [ 671.436031][T29448] smack_d_instantiate+0x7f4/0xe50 [ 671.441151][T29448] ? smack_sem_semop+0x220/0x220 [ 671.446093][T29448] ? lockdep_init_map+0x2a/0x680 [ 671.451036][T29448] security_d_instantiate+0xa5/0x100 [ 671.456320][T29448] d_instantiate_new+0x65/0x120 [ 671.461171][T29448] ext4_mkdir+0xf8c/0x1460 [ 671.465623][T29448] ? ext4_symlink+0x1010/0x1010 [ 671.470492][T29448] ? security_inode_permission+0xdd/0x120 [ 671.476213][T29448] ? security_inode_mkdir+0xeb/0x130 [ 671.481501][T29448] vfs_mkdir+0x43f/0x610 [ 671.485752][T29448] do_mkdirat+0x22a/0x390 [ 671.490079][T29448] ? file_open_root+0x440/0x440 [ 671.494931][T29448] ? vfs_mkdir+0x610/0x610 [ 671.499343][T29448] ? kasan_check_write+0x14/0x20 [ 671.504280][T29448] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 671.509996][T29448] ? do_syscall_64+0x1d/0x140 [ 671.514674][T29448] __x64_sys_mkdir+0x60/0x70 [ 671.519269][T29448] do_syscall_64+0xfe/0x140 [ 671.523782][T29448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 671.529673][T29448] RIP: 0033:0x458be7 [ 671.533571][T29448] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 671.560216][T29448] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 671.568636][T29448] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 671.576604][T29448] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 671.584570][T29448] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 671.584577][T29448] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 671.584582][T29448] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:25 executing program 1 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:25 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:25 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:25 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:25 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:25 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:25 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:25 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:25 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:25 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:25 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 671.842660][T29473] FAULT_INJECTION: forcing a failure. [ 671.842660][T29473] name failslab, interval 1, probability 0, space 0, times 0 [ 671.855352][T29473] CPU: 1 PID: 29473 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 671.863342][T29473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.873400][T29473] Call Trace: [ 671.876706][T29473] dump_stack+0x1d8/0x2f8 [ 671.881052][T29473] should_fail+0x608/0x860 [ 671.885485][T29473] ? setup_fault_attr+0x2b0/0x2b0 [ 671.890522][T29473] ? trace_lock_acquire+0x190/0x190 [ 671.895735][T29473] __should_failslab+0x11a/0x160 [ 671.900681][T29473] ? __es_insert_extent+0x7ba/0x17c0 [ 671.905974][T29473] should_failslab+0x9/0x20 [ 671.910486][T29473] kmem_cache_alloc+0x56/0x2b0 [ 671.915259][T29473] __es_insert_extent+0x7ba/0x17c0 [ 671.920378][T29473] ? trace_ext4_es_insert_extent+0x290/0x290 [ 671.926371][T29473] ext4_es_insert_extent+0x2d0/0x2f40 [ 671.931757][T29473] ? ext4_es_scan_clu+0x270/0x270 [ 671.936795][T29473] ext4_map_blocks+0xe63/0x1cd0 16:14:26 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 671.941663][T29473] ? ext4_issue_zeroout+0x170/0x170 [ 671.946858][T29473] ? __brelse+0x5a/0xa0 [ 671.951034][T29473] ext4_getblk+0xff/0x530 [ 671.955375][T29473] ? tomoyo_path_number_perm+0x5f0/0x740 [ 671.961024][T29473] ? ext4_get_block_trans+0x590/0x590 [ 671.966431][T29473] ? smack_log+0xe3/0x4e0 [ 671.970767][T29473] ? memset+0x31/0x40 [ 671.974757][T29473] ? __dquot_initialize+0x228/0xdd0 [ 671.979957][T29473] ext4_bread+0x91/0x240 [ 671.984211][T29473] ? ext4_getblk+0x530/0x530 [ 671.988801][T29473] ? smk_tskacc+0x2ef/0x390 [ 671.993313][T29473] ext4_append+0x175/0x310 [ 671.997738][T29473] ext4_mkdir+0x7d8/0x1460 [ 672.002175][T29473] ? from_kgid+0x236/0x390 [ 672.006603][T29473] ? ext4_symlink+0x1010/0x1010 [ 672.011458][T29473] ? security_inode_permission+0xdd/0x120 [ 672.017197][T29473] ? security_inode_mkdir+0xeb/0x130 [ 672.022493][T29473] vfs_mkdir+0x43f/0x610 [ 672.026763][T29473] do_mkdirat+0x22a/0x390 [ 672.031105][T29473] ? debug_smp_processor_id+0x1c/0x20 [ 672.031121][T29473] ? vfs_mkdir+0x610/0x610 [ 672.031131][T29473] ? kasan_check_write+0x14/0x20 [ 672.031147][T29473] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 672.040932][T29473] ? do_syscall_64+0x1d/0x140 [ 672.040944][T29473] __x64_sys_mkdir+0x60/0x70 [ 672.040956][T29473] do_syscall_64+0xfe/0x140 [ 672.040971][T29473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.040986][T29473] RIP: 0033:0x458be7 [ 672.051612][T29473] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 672.051618][T29473] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 672.051629][T29473] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 672.051635][T29473] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 672.051641][T29473] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 672.051647][T29473] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 672.051658][T29473] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:26 executing program 1 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:26 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:26 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:26 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:26 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:26 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:26 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:26 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:26 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:26 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:26 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 672.352439][T29499] FAULT_INJECTION: forcing a failure. [ 672.352439][T29499] name failslab, interval 1, probability 0, space 0, times 0 [ 672.386000][T29499] CPU: 1 PID: 29499 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 16:14:26 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 672.394028][T29499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.394033][T29499] Call Trace: [ 672.394055][T29499] dump_stack+0x1d8/0x2f8 [ 672.394073][T29499] should_fail+0x608/0x860 [ 672.394088][T29499] ? setup_fault_attr+0x2b0/0x2b0 [ 672.394112][T29499] __should_failslab+0x11a/0x160 [ 672.394126][T29499] ? ext4_mb_new_blocks+0x30a/0x2d00 [ 672.394137][T29499] should_failslab+0x9/0x20 [ 672.394147][T29499] kmem_cache_alloc+0x56/0x2b0 [ 672.394162][T29499] ext4_mb_new_blocks+0x30a/0x2d00 [ 672.394181][T29499] ? trace_kmalloc+0xcd/0x130 [ 672.394203][T29499] ? __kmalloc+0x254/0x310 [ 672.394214][T29499] ? kcalloc+0x2f/0x50 [ 672.394230][T29499] ? ext4_mb_pa_callback+0xd0/0xd0 [ 672.394240][T29499] ? ext4_find_extent+0x8e0/0xaa0 [ 672.394252][T29499] ? ext4_inode_to_goal_block+0x27b/0x3b0 [ 672.394268][T29499] ext4_ext_map_blocks+0x296b/0x7f30 [ 672.464457][T29499] ? trace_lock_acquire+0x190/0x190 [ 672.464475][T29499] ? ext4_ext_release+0x10/0x10 [ 672.480555][T29499] ? kasan_check_write+0x14/0x20 [ 672.480593][T29499] ext4_map_blocks+0x94d/0x1cd0 [ 672.480617][T29499] ? ext4_issue_zeroout+0x170/0x170 [ 672.480625][T29499] ? __brelse+0x5a/0xa0 [ 672.480644][T29499] ext4_getblk+0xff/0x530 [ 672.480662][T29499] ? tomoyo_path_number_perm+0x5f0/0x740 [ 672.519980][T29499] ? ext4_get_block_trans+0x590/0x590 [ 672.525383][T29499] ? smack_log+0xe3/0x4e0 [ 672.532730][T29499] ? memset+0x31/0x40 [ 672.538419][T29499] ? __dquot_initialize+0x228/0xdd0 [ 672.544964][T29499] ext4_bread+0x91/0x240 [ 672.549227][T29499] ? ext4_getblk+0x530/0x530 [ 672.549239][T29499] ? smk_tskacc+0x2ef/0x390 [ 672.549256][T29499] ext4_append+0x175/0x310 [ 672.549272][T29499] ext4_mkdir+0x7d8/0x1460 [ 672.549301][T29499] ? from_kgid+0x236/0x390 [ 672.558433][T29499] ? ext4_symlink+0x1010/0x1010 [ 672.558446][T29499] ? security_inode_permission+0xdd/0x120 [ 672.558459][T29499] ? security_inode_mkdir+0xeb/0x130 [ 672.558473][T29499] vfs_mkdir+0x43f/0x610 [ 672.558498][T29499] do_mkdirat+0x22a/0x390 [ 672.597142][T29499] ? debug_smp_processor_id+0x1c/0x20 [ 672.602542][T29499] ? vfs_mkdir+0x610/0x610 [ 672.606981][T29499] ? kasan_check_write+0x14/0x20 [ 672.611947][T29499] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 672.617786][T29499] ? do_syscall_64+0x1d/0x140 [ 672.622495][T29499] __x64_sys_mkdir+0x60/0x70 [ 672.627129][T29499] do_syscall_64+0xfe/0x140 [ 672.631686][T29499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.637788][T29499] RIP: 0033:0x458be7 [ 672.641873][T29499] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 672.661589][T29499] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 672.670369][T29499] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 672.678366][T29499] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 672.686355][T29499] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 672.694377][T29499] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 672.702369][T29499] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:26 executing program 1 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:26 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:26 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:26 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:26 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:26 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:26 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 672.890392][T29526] FAULT_INJECTION: forcing a failure. [ 672.890392][T29526] name failslab, interval 1, probability 0, space 0, times 0 [ 672.903237][T29526] CPU: 1 PID: 29526 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 672.911235][T29526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.911248][T29526] Call Trace: [ 672.924740][T29526] dump_stack+0x1d8/0x2f8 [ 672.929265][T29526] should_fail+0x608/0x860 [ 672.933694][T29526] ? setup_fault_attr+0x2b0/0x2b0 [ 672.938753][T29526] ? trace_lock_acquire+0x190/0x190 [ 672.944322][T29526] __should_failslab+0x11a/0x160 [ 672.944336][T29526] ? __es_insert_extent+0x7ba/0x17c0 [ 672.944345][T29526] should_failslab+0x9/0x20 [ 672.944354][T29526] kmem_cache_alloc+0x56/0x2b0 [ 672.944366][T29526] __es_insert_extent+0x7ba/0x17c0 [ 672.944382][T29526] ? trace_ext4_es_insert_extent+0x290/0x290 [ 672.975127][T29526] ext4_es_insert_extent+0x2d0/0x2f40 [ 672.980555][T29526] ? ext4_es_scan_clu+0x270/0x270 [ 672.985603][T29526] ext4_map_blocks+0xe63/0x1cd0 16:14:27 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 672.990475][T29526] ? ext4_issue_zeroout+0x170/0x170 [ 672.995696][T29526] ? __brelse+0x5a/0xa0 [ 672.999871][T29526] ext4_getblk+0xff/0x530 [ 673.004211][T29526] ? tomoyo_path_number_perm+0x5f0/0x740 [ 673.004222][T29526] ? ext4_get_block_trans+0x590/0x590 [ 673.004230][T29526] ? smack_log+0xe3/0x4e0 [ 673.004241][T29526] ? memset+0x31/0x40 [ 673.004259][T29526] ? __dquot_initialize+0x228/0xdd0 [ 673.015297][T29526] ext4_bread+0x91/0x240 [ 673.015312][T29526] ? ext4_getblk+0x530/0x530 16:14:27 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 673.015320][T29526] ? smk_tskacc+0x2ef/0x390 [ 673.015334][T29526] ext4_append+0x175/0x310 [ 673.015349][T29526] ext4_mkdir+0x7d8/0x1460 [ 673.015369][T29526] ? from_kgid+0x236/0x390 [ 673.055384][T29526] ? ext4_symlink+0x1010/0x1010 [ 673.060272][T29526] ? security_inode_permission+0xdd/0x120 [ 673.066015][T29526] ? security_inode_mkdir+0xeb/0x130 [ 673.071318][T29526] vfs_mkdir+0x43f/0x610 [ 673.075585][T29526] do_mkdirat+0x22a/0x390 [ 673.079929][T29526] ? debug_smp_processor_id+0x1c/0x20 [ 673.085318][T29526] ? vfs_mkdir+0x610/0x610 [ 673.089781][T29526] ? kasan_check_write+0x14/0x20 [ 673.094723][T29526] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 673.094736][T29526] ? do_syscall_64+0x1d/0x140 [ 673.094750][T29526] __x64_sys_mkdir+0x60/0x70 [ 673.094764][T29526] do_syscall_64+0xfe/0x140 [ 673.105197][T29526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 673.105208][T29526] RIP: 0033:0x458be7 16:14:27 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 673.105220][T29526] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 673.105225][T29526] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 673.105234][T29526] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 673.105246][T29526] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 673.168094][T29526] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 673.168101][T29526] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 16:14:27 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:27 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 673.168106][T29526] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:27 executing program 1 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:27 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:27 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:27 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:27 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:27 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:27 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:27 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:27 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:27 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:27 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 673.468007][T29551] FAULT_INJECTION: forcing a failure. [ 673.468007][T29551] name failslab, interval 1, probability 0, space 0, times 0 [ 673.518354][T29551] CPU: 1 PID: 29551 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 673.526402][T29551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 673.536502][T29551] Call Trace: [ 673.539816][T29551] dump_stack+0x1d8/0x2f8 [ 673.544172][T29551] should_fail+0x608/0x860 [ 673.548627][T29551] ? setup_fault_attr+0x2b0/0x2b0 [ 673.553675][T29551] ? kzalloc+0x1f/0x40 [ 673.557767][T29551] __should_failslab+0x11a/0x160 [ 673.562725][T29551] ? kzalloc+0x1f/0x40 [ 673.566808][T29551] should_failslab+0x9/0x20 [ 673.571326][T29551] __kmalloc+0x7a/0x310 [ 673.575505][T29551] kzalloc+0x1f/0x40 [ 673.579422][T29551] smk_parse_smack+0x197/0x230 [ 673.584224][T29551] smk_import_entry+0x27/0x590 [ 673.589012][T29551] smack_d_instantiate+0x852/0xe50 [ 673.594148][T29551] ? smack_sem_semop+0x220/0x220 [ 673.599106][T29551] ? lockdep_init_map+0x2a/0x680 [ 673.599122][T29551] security_d_instantiate+0xa5/0x100 [ 673.599138][T29551] d_instantiate_new+0x65/0x120 [ 673.609381][T29551] ext4_mkdir+0xf8c/0x1460 16:14:27 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 673.618660][T29551] ? ext4_symlink+0x1010/0x1010 [ 673.618672][T29551] ? security_inode_permission+0xdd/0x120 [ 673.618684][T29551] ? security_inode_mkdir+0xeb/0x130 [ 673.618704][T29551] vfs_mkdir+0x43f/0x610 [ 673.629293][T29551] do_mkdirat+0x22a/0x390 [ 673.629304][T29551] ? file_open_root+0x440/0x440 [ 673.629314][T29551] ? vfs_mkdir+0x610/0x610 [ 673.629323][T29551] ? kasan_check_write+0x14/0x20 [ 673.629335][T29551] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 673.629347][T29551] ? do_syscall_64+0x1d/0x140 [ 673.629361][T29551] __x64_sys_mkdir+0x60/0x70 [ 673.638927][T29551] do_syscall_64+0xfe/0x140 [ 673.638945][T29551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 673.638961][T29551] RIP: 0033:0x458be7 [ 673.648152][T29551] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 673.648159][T29551] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 673.648168][T29551] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 673.648173][T29551] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 673.648178][T29551] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 673.648182][T29551] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 673.648194][T29551] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:27 executing program 1 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:27 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:27 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:27 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:27 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:27 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:27 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:28 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:28 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:28 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:28 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 673.959799][T29577] FAULT_INJECTION: forcing a failure. [ 673.959799][T29577] name failslab, interval 1, probability 0, space 0, times 0 [ 674.000265][T29577] CPU: 1 PID: 29577 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 674.008282][T29577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.008288][T29577] Call Trace: [ 674.008309][T29577] dump_stack+0x1d8/0x2f8 [ 674.008327][T29577] should_fail+0x608/0x860 [ 674.008343][T29577] ? setup_fault_attr+0x2b0/0x2b0 [ 674.035417][T29577] ? ksys_mount+0x38/0x100 [ 674.039853][T29577] __should_failslab+0x11a/0x160 [ 674.044802][T29577] ? ksys_mount+0x38/0x100 16:14:28 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 674.044814][T29577] should_failslab+0x9/0x20 [ 674.044824][T29577] __kmalloc_track_caller+0x79/0x310 [ 674.044835][T29577] ? strnlen_user+0x1e0/0x260 [ 674.044849][T29577] strndup_user+0x76/0x130 [ 674.044859][T29577] ksys_mount+0x38/0x100 [ 674.044874][T29577] __x64_sys_mount+0xbf/0xd0 [ 674.059090][T29577] do_syscall_64+0xfe/0x140 [ 674.059108][T29577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 674.059119][T29577] RIP: 0033:0x45c21a [ 674.059130][T29577] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 674.059135][T29577] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 674.081559][T29577] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 674.081567][T29577] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 674.081573][T29577] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 674.081577][T29577] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 674.081583][T29577] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:28 executing program 1 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:28 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:28 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:28 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:28 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:28 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:28 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:28 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 674.321378][T29604] FAULT_INJECTION: forcing a failure. [ 674.321378][T29604] name failslab, interval 1, probability 0, space 0, times 0 [ 674.352711][T29604] CPU: 0 PID: 29604 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 674.360721][T29604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 16:14:28 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 674.370775][T29604] Call Trace: [ 674.374070][T29604] dump_stack+0x1d8/0x2f8 [ 674.378408][T29604] should_fail+0x608/0x860 [ 674.382828][T29604] ? setup_fault_attr+0x2b0/0x2b0 [ 674.387849][T29604] ? kzalloc+0x1f/0x40 [ 674.391924][T29604] __should_failslab+0x11a/0x160 [ 674.391937][T29604] ? kzalloc+0x1f/0x40 [ 674.391951][T29604] should_failslab+0x9/0x20 [ 674.405434][T29604] __kmalloc+0x7a/0x310 [ 674.409595][T29604] kzalloc+0x1f/0x40 [ 674.413484][T29604] smk_parse_smack+0x197/0x230 16:14:28 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 674.413498][T29604] smk_import_entry+0x27/0x590 [ 674.413514][T29604] smack_d_instantiate+0x852/0xe50 [ 674.413532][T29604] ? smack_sem_semop+0x220/0x220 [ 674.413547][T29604] ? lockdep_init_map+0x2a/0x680 [ 674.413562][T29604] security_d_instantiate+0xa5/0x100 [ 674.413574][T29604] d_instantiate_new+0x65/0x120 [ 674.413587][T29604] ext4_mkdir+0xf8c/0x1460 [ 674.413610][T29604] ? ext4_symlink+0x1010/0x1010 [ 674.413619][T29604] ? security_inode_permission+0xdd/0x120 [ 674.413630][T29604] ? security_inode_mkdir+0xeb/0x130 [ 674.413642][T29604] vfs_mkdir+0x43f/0x610 [ 674.413657][T29604] do_mkdirat+0x22a/0x390 [ 674.476927][T29604] ? debug_smp_processor_id+0x1c/0x20 [ 674.482296][T29604] ? vfs_mkdir+0x610/0x610 [ 674.482306][T29604] ? kasan_check_write+0x14/0x20 [ 674.482320][T29604] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 674.482332][T29604] ? do_syscall_64+0x1d/0x140 [ 674.482344][T29604] __x64_sys_mkdir+0x60/0x70 [ 674.482358][T29604] do_syscall_64+0xfe/0x140 [ 674.511140][T29604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 674.511151][T29604] RIP: 0033:0x458be7 16:14:28 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 674.511163][T29604] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 674.511168][T29604] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 674.550965][T29604] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 674.558941][T29604] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 16:14:28 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 674.567001][T29604] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 674.574971][T29604] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 674.574978][T29604] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:28 executing program 1 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:28 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:28 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:28 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:28 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:28 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:28 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:28 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:28 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 674.831671][T29629] FAULT_INJECTION: forcing a failure. [ 674.831671][T29629] name failslab, interval 1, probability 0, space 0, times 0 [ 674.844551][T29629] CPU: 1 PID: 29629 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 674.852522][T29629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.852549][T29629] Call Trace: [ 674.852571][T29629] dump_stack+0x1d8/0x2f8 [ 674.852588][T29629] should_fail+0x608/0x860 [ 674.874640][T29629] ? setup_fault_attr+0x2b0/0x2b0 [ 674.879665][T29629] ? kasan_check_write+0x14/0x20 [ 674.884618][T29629] __should_failslab+0x11a/0x160 [ 674.889620][T29629] ? __sigqueue_alloc+0x2ce/0x440 [ 674.889635][T29629] should_failslab+0x9/0x20 [ 674.899144][T29629] kmem_cache_alloc+0x56/0x2b0 [ 674.903915][T29629] __sigqueue_alloc+0x2ce/0x440 [ 674.908767][T29629] __send_signal+0x2b2/0x1110 [ 674.913454][T29629] force_sig_info+0x46d/0x520 [ 674.918140][T29629] force_sig_fault+0x11d/0x1c0 [ 674.922902][T29629] ? force_sigsegv+0xe0/0xe0 [ 674.927497][T29629] ? __bad_area_nosemaphore+0x480/0x480 [ 674.933046][T29629] ? __bad_area_nosemaphore+0x8d/0x480 [ 674.938516][T29629] __bad_area_nosemaphore+0x316/0x480 [ 674.943894][T29629] ? kasan_check_write+0x14/0x20 [ 674.948835][T29629] bad_area+0x6b/0x80 [ 674.952837][T29629] do_user_addr_fault+0x7d5/0xaa0 [ 674.952850][T29629] ? kasan_check_write+0x14/0x20 [ 674.952866][T29629] __do_page_fault+0xd3/0x1f0 [ 674.952879][T29629] do_page_fault+0xce/0xe0 [ 674.971884][T29629] ? page_fault+0x8/0x30 [ 674.976129][T29629] page_fault+0x1e/0x30 16:14:28 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:28 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:29 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 674.980285][T29629] RIP: 0033:0x4533cf [ 674.984183][T29629] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 675.003822][T29629] RSP: 002b:00007f6e067e6a88 EFLAGS: 00010283 [ 675.003832][T29629] RAX: 00007f6e067e6b40 RBX: 0000000020000228 RCX: 0000000000000000 [ 675.003837][T29629] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f6e067e6b40 [ 675.003842][T29629] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 675.003848][T29629] R10: 0000000000000075 R11: 00000000004e4ca0 R12: 0000000000000004 [ 675.003854][T29629] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:29 executing program 1 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:29 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:29 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:29 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:29 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:29 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:29 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:29 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:29 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 675.280208][T29654] FAULT_INJECTION: forcing a failure. [ 675.280208][T29654] name failslab, interval 1, probability 0, space 0, times 0 [ 675.302863][T29654] CPU: 0 PID: 29654 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 675.310865][T29654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 675.310874][T29654] Call Trace: [ 675.324210][T29654] dump_stack+0x1d8/0x2f8 [ 675.324227][T29654] should_fail+0x608/0x860 [ 675.324240][T29654] ? setup_fault_attr+0x2b0/0x2b0 [ 675.324251][T29654] ? ksys_mount+0x6a/0x100 [ 675.324267][T29654] __should_failslab+0x11a/0x160 [ 675.324276][T29654] ? ksys_mount+0x6a/0x100 [ 675.324286][T29654] should_failslab+0x9/0x20 [ 675.324295][T29654] __kmalloc_track_caller+0x79/0x310 [ 675.324304][T29654] ? strnlen_user+0x1e0/0x260 [ 675.324318][T29654] strndup_user+0x76/0x130 [ 675.324330][T29654] ksys_mount+0x6a/0x100 [ 675.375206][T29654] __x64_sys_mount+0xbf/0xd0 [ 675.379806][T29654] do_syscall_64+0xfe/0x140 [ 675.384314][T29654] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 675.390206][T29654] RIP: 0033:0x45c21a [ 675.394103][T29654] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 675.413706][T29654] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 675.413718][T29654] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a 16:14:29 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:29 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:29 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 675.413724][T29654] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 675.413730][T29654] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 675.413736][T29654] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 675.413741][T29654] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:29 executing program 1 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:29 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:29 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:29 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:29 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:29 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:29 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:29 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:29 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:29 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:29 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 675.769827][T29679] FAULT_INJECTION: forcing a failure. [ 675.769827][T29679] name failslab, interval 1, probability 0, space 0, times 0 [ 675.812647][T29679] CPU: 0 PID: 29679 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 675.820707][T29679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 675.820713][T29679] Call Trace: [ 675.820734][T29679] dump_stack+0x1d8/0x2f8 [ 675.820751][T29679] should_fail+0x608/0x860 [ 675.820774][T29679] ? setup_fault_attr+0x2b0/0x2b0 [ 675.847967][T29679] ? ksys_mount+0x38/0x100 [ 675.852418][T29679] __should_failslab+0x11a/0x160 [ 675.852433][T29679] ? ksys_mount+0x38/0x100 [ 675.852443][T29679] should_failslab+0x9/0x20 [ 675.852452][T29679] __kmalloc_track_caller+0x79/0x310 [ 675.852463][T29679] ? strnlen_user+0x1e0/0x260 [ 675.852475][T29679] strndup_user+0x76/0x130 [ 675.852484][T29679] ksys_mount+0x38/0x100 [ 675.852496][T29679] __x64_sys_mount+0xbf/0xd0 [ 675.852511][T29679] do_syscall_64+0xfe/0x140 [ 675.852526][T29679] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 675.852537][T29679] RIP: 0033:0x45c21a [ 675.852547][T29679] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 675.852552][T29679] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 675.852561][T29679] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 675.852567][T29679] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 675.852574][T29679] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 16:14:29 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 675.852580][T29679] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 675.852586][T29679] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:30 executing program 1 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:30 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:30 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:30 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:30 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:30 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:30 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:30 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:30 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:30 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 676.178027][T29706] FAULT_INJECTION: forcing a failure. [ 676.178027][T29706] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 676.191312][T29706] CPU: 0 PID: 29706 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 676.199305][T29706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 676.209384][T29706] Call Trace: [ 676.212712][T29706] dump_stack+0x1d8/0x2f8 [ 676.217077][T29706] should_fail+0x608/0x860 [ 676.221538][T29706] ? setup_fault_attr+0x2b0/0x2b0 [ 676.226603][T29706] should_fail_alloc_page+0x55/0x60 [ 676.231840][T29706] prepare_alloc_pages+0x283/0x460 [ 676.236991][T29706] __alloc_pages_nodemask+0x11c/0x790 [ 676.242394][T29706] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 676.248127][T29706] ? __local_bh_enable_ip+0x13a/0x240 [ 676.253547][T29706] kmem_getpages+0x46/0x480 [ 676.258083][T29706] cache_grow_begin+0x7e/0x2c0 [ 676.262884][T29706] cache_alloc_refill+0x311/0x3f0 [ 676.267943][T29706] ? check_preemption_disabled+0xb7/0x280 [ 676.273695][T29706] kmem_cache_alloc_trace+0x29f/0x2c0 [ 676.279088][T29706] ? copy_mount_options+0x5f/0x360 [ 676.284232][T29706] copy_mount_options+0x5f/0x360 [ 676.289200][T29706] ksys_mount+0xa0/0x100 [ 676.293463][T29706] __x64_sys_mount+0xbf/0xd0 [ 676.298080][T29706] do_syscall_64+0xfe/0x140 [ 676.302642][T29706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 676.308552][T29706] RIP: 0033:0x45c21a 16:14:30 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 676.312463][T29706] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 676.332262][T29706] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 676.332274][T29706] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 676.332279][T29706] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 676.332285][T29706] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 676.332290][T29706] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 676.332296][T29706] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:30 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:30 executing program 1 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:30 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:30 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:30 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:30 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:30 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:30 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:30 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:30 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:30 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:30 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:30 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 676.770895][T29733] FAULT_INJECTION: forcing a failure. [ 676.770895][T29733] name failslab, interval 1, probability 0, space 0, times 0 [ 676.872930][T29733] CPU: 0 PID: 29733 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 676.880982][T29733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 676.891068][T29733] Call Trace: [ 676.894394][T29733] dump_stack+0x1d8/0x2f8 [ 676.898759][T29733] should_fail+0x608/0x860 [ 676.903300][T29733] ? setup_fault_attr+0x2b0/0x2b0 [ 676.908366][T29733] __should_failslab+0x11a/0x160 [ 676.913333][T29733] ? getname_kernel+0x59/0x2f0 [ 676.913345][T29733] should_failslab+0x9/0x20 [ 676.913355][T29733] kmem_cache_alloc+0x56/0x2b0 [ 676.913368][T29733] getname_kernel+0x59/0x2f0 [ 676.913378][T29733] kern_path+0x1f/0x40 [ 676.913390][T29733] tomoyo_mount_permission+0x850/0xaf0 [ 676.913407][T29733] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 676.913417][T29733] ? check_preemption_disabled+0x47/0x280 [ 676.913427][T29733] ? tomoyo_get_name+0x540/0x540 [ 676.913446][T29733] ? filename_lookup+0x4e3/0x6d0 [ 676.913477][T29733] ? strncpy_from_user+0x33e/0x3b0 [ 676.913490][T29733] tomoyo_sb_mount+0x35/0x40 [ 676.913502][T29733] security_sb_mount+0x84/0xe0 [ 676.913514][T29733] do_mount+0x186/0x2730 [ 676.913522][T29733] ? check_preemption_disabled+0x47/0x280 [ 676.913529][T29733] ? setup_fault_attr+0x2b0/0x2b0 [ 676.913544][T29733] ? copy_mount_string+0x30/0x30 [ 676.927739][T29733] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 676.927752][T29733] ? trace_kmalloc+0xcd/0x130 [ 676.927764][T29733] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 676.927780][T29733] ? copy_mount_options+0x5f/0x360 [ 676.942054][T29733] ? copy_mount_options+0x2c8/0x360 [ 676.953796][T29733] ksys_mount+0xcc/0x100 [ 676.953809][T29733] __x64_sys_mount+0xbf/0xd0 [ 676.953822][T29733] do_syscall_64+0xfe/0x140 [ 676.953839][T29733] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 676.953849][T29733] RIP: 0033:0x45c21a [ 676.953861][T29733] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 676.953866][T29733] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 676.953876][T29733] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 676.953882][T29733] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 676.953887][T29733] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 676.953892][T29733] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 676.953897][T29733] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:31 executing program 1 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:31 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:31 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:31 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:31 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:31 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:31 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 677.269267][T29756] FAULT_INJECTION: forcing a failure. [ 677.269267][T29756] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 677.282537][T29756] CPU: 1 PID: 29756 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 677.290536][T29756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.300619][T29756] Call Trace: [ 677.300648][T29756] dump_stack+0x1d8/0x2f8 [ 677.300664][T29756] should_fail+0x608/0x860 [ 677.300677][T29756] ? setup_fault_attr+0x2b0/0x2b0 [ 677.300693][T29756] ? rcu_lock_release+0x26/0x30 [ 677.300712][T29756] should_fail_alloc_page+0x55/0x60 [ 677.312772][T29756] prepare_alloc_pages+0x283/0x460 [ 677.312786][T29756] __alloc_pages_nodemask+0x11c/0x790 [ 677.312802][T29756] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 677.312814][T29756] ? stack_trace_save+0x111/0x1e0 [ 677.312825][T29756] ? stack_trace_snprint+0x150/0x150 [ 677.312833][T29756] ? __lock_acquire+0xcf7/0x1a40 [ 677.312846][T29756] ? check_preemption_disabled+0x47/0x280 [ 677.312858][T29756] kmem_getpages+0x46/0x480 16:14:31 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 677.312869][T29756] cache_grow_begin+0x7e/0x2c0 [ 677.312884][T29756] cache_alloc_refill+0x311/0x3f0 [ 677.379467][T29756] ? check_preemption_disabled+0xb7/0x280 [ 677.385223][T29756] kmem_cache_alloc+0x288/0x2b0 [ 677.390098][T29756] ? getname_flags+0xba/0x640 [ 677.394805][T29756] getname_flags+0xba/0x640 [ 677.399340][T29756] user_path_at_empty+0x2d/0x50 [ 677.404226][T29756] do_mount+0x14f/0x2730 [ 677.408498][T29756] ? check_preemption_disabled+0x47/0x280 [ 677.414245][T29756] ? copy_mount_string+0x30/0x30 [ 677.414258][T29756] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 677.414268][T29756] ? trace_kmalloc+0xcd/0x130 [ 677.414281][T29756] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 677.414287][T29756] ? copy_mount_options+0x5f/0x360 [ 677.414298][T29756] ? copy_mount_options+0x2c8/0x360 [ 677.414308][T29756] ksys_mount+0xcc/0x100 [ 677.414320][T29756] __x64_sys_mount+0xbf/0xd0 [ 677.414341][T29756] do_syscall_64+0xfe/0x140 [ 677.425041][T29756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.425053][T29756] RIP: 0033:0x45c21a [ 677.425064][T29756] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 677.425069][T29756] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 677.425078][T29756] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 677.425084][T29756] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 16:14:31 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:31 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:31 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:31 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 677.425090][T29756] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 677.425096][T29756] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 677.425101][T29756] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:31 executing program 1 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:31 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:31 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:31 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:31 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:31 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:31 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:31 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 677.777910][T29781] FAULT_INJECTION: forcing a failure. [ 677.777910][T29781] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 677.791271][T29781] CPU: 0 PID: 29781 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 677.799263][T29781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.809338][T29781] Call Trace: [ 677.812652][T29781] dump_stack+0x1d8/0x2f8 [ 677.817018][T29781] should_fail+0x608/0x860 [ 677.821548][T29781] ? setup_fault_attr+0x2b0/0x2b0 16:14:31 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 677.826598][T29781] should_fail_alloc_page+0x55/0x60 [ 677.831811][T29781] prepare_alloc_pages+0x283/0x460 [ 677.831825][T29781] __alloc_pages_nodemask+0x11c/0x790 [ 677.831839][T29781] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 677.831920][T29781] ? pick_next_task_fair+0x124e/0x1bf0 [ 677.831938][T29781] kmem_getpages+0x46/0x480 [ 677.842444][T29781] cache_grow_begin+0x7e/0x2c0 [ 677.842460][T29781] cache_alloc_refill+0x311/0x3f0 [ 677.842473][T29781] ? check_preemption_disabled+0xb7/0x280 16:14:31 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 677.842489][T29781] kmem_cache_alloc+0x288/0x2b0 [ 677.842498][T29781] ? getname_flags+0xba/0x640 [ 677.842508][T29781] getname_flags+0xba/0x640 [ 677.842520][T29781] user_path_at_empty+0x2d/0x50 [ 677.842532][T29781] do_mount+0x14f/0x2730 [ 677.842541][T29781] ? trace_hardirqs_on_caller+0x74/0x80 [ 677.842552][T29781] ? trace_hardirqs_off+0x46/0x80 [ 677.842563][T29781] ? copy_mount_string+0x30/0x30 [ 677.842574][T29781] ? retint_kernel+0x2b/0x2b [ 677.842586][T29781] ? copy_mount_options+0x238/0x360 [ 677.842593][T29781] ? copy_mount_options+0x21e/0x360 16:14:31 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:32 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 677.842604][T29781] ? copy_mount_options+0x233/0x360 [ 677.842614][T29781] ? copy_mount_options+0x2c8/0x360 [ 677.842625][T29781] ksys_mount+0xcc/0x100 [ 677.842637][T29781] __x64_sys_mount+0xbf/0xd0 [ 677.842654][T29781] do_syscall_64+0xfe/0x140 [ 677.858200][T29781] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.858212][T29781] RIP: 0033:0x45c21a [ 677.858223][T29781] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 677.858229][T29781] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 677.858239][T29781] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 677.858246][T29781] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 677.858252][T29781] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 677.858257][T29781] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 677.858263][T29781] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:32 executing program 1 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:32 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:32 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:32 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:32 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:32 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:32 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:32 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:32 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:32 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:32 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 678.245133][T29806] FAULT_INJECTION: forcing a failure. [ 678.245133][T29806] name failslab, interval 1, probability 0, space 0, times 0 16:14:32 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 678.328632][T29806] CPU: 1 PID: 29806 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 678.336671][T29806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.346744][T29806] Call Trace: [ 678.350056][T29806] dump_stack+0x1d8/0x2f8 [ 678.354671][T29806] should_fail+0x608/0x860 [ 678.359115][T29806] ? setup_fault_attr+0x2b0/0x2b0 [ 678.364169][T29806] __should_failslab+0x11a/0x160 [ 678.369141][T29806] should_failslab+0x9/0x20 [ 678.373654][T29806] kmem_cache_alloc_trace+0x5d/0x2c0 [ 678.379036][T29806] ? legacy_init_fs_context+0x51/0xc0 [ 678.384421][T29806] legacy_init_fs_context+0x51/0xc0 [ 678.389632][T29806] alloc_fs_context+0x49a/0x580 [ 678.394500][T29806] fs_context_for_mount+0x24/0x30 [ 678.399539][T29806] do_mount+0x1200/0x2730 [ 678.403886][T29806] ? check_preemption_disabled+0x47/0x280 [ 678.409624][T29806] ? copy_mount_string+0x30/0x30 [ 678.414658][T29806] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 678.420430][T29806] ? trace_kmalloc+0xcd/0x130 [ 678.425118][T29806] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 678.430672][T29806] ? copy_mount_options+0x5f/0x360 [ 678.435793][T29806] ? copy_mount_options+0x2c8/0x360 [ 678.435806][T29806] ksys_mount+0xcc/0x100 [ 678.435820][T29806] __x64_sys_mount+0xbf/0xd0 [ 678.435835][T29806] do_syscall_64+0xfe/0x140 [ 678.435849][T29806] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.435859][T29806] RIP: 0033:0x45c21a [ 678.435868][T29806] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 678.435874][T29806] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 678.435883][T29806] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 678.435895][T29806] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 678.449897][T29806] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 678.449905][T29806] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 678.449910][T29806] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:32 executing program 1 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:32 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:32 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:32 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:32 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:32 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:32 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:32 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:32 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:32 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:32 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 678.728322][T29832] FAULT_INJECTION: forcing a failure. [ 678.728322][T29832] name failslab, interval 1, probability 0, space 0, times 0 16:14:32 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 678.825988][T29832] CPU: 1 PID: 29832 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 678.834068][T29832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.834075][T29832] Call Trace: [ 678.834105][T29832] dump_stack+0x1d8/0x2f8 [ 678.834123][T29832] should_fail+0x608/0x860 [ 678.834138][T29832] ? setup_fault_attr+0x2b0/0x2b0 [ 678.834163][T29832] ? vfs_parse_fs_string+0x171/0x280 [ 678.866598][T29832] __should_failslab+0x11a/0x160 [ 678.871573][T29832] ? vfs_parse_fs_string+0x171/0x280 [ 678.876878][T29832] should_failslab+0x9/0x20 [ 678.876891][T29832] __kmalloc_track_caller+0x79/0x310 [ 678.876903][T29832] kmemdup_nul+0x2a/0xa0 [ 678.876914][T29832] vfs_parse_fs_string+0x171/0x280 [ 678.876925][T29832] ? logfc+0x710/0x710 [ 678.876943][T29832] do_mount+0x1396/0x2730 [ 678.876955][T29832] ? check_preemption_disabled+0x47/0x280 [ 678.876970][T29832] ? copy_mount_string+0x30/0x30 [ 678.896148][T29832] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 678.904567][T29832] ? trace_kmalloc+0xcd/0x130 [ 678.904581][T29832] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 678.904588][T29832] ? copy_mount_options+0x5f/0x360 [ 678.904598][T29832] ? copy_mount_options+0x2c8/0x360 [ 678.904609][T29832] ksys_mount+0xcc/0x100 [ 678.904621][T29832] __x64_sys_mount+0xbf/0xd0 [ 678.904639][T29832] do_syscall_64+0xfe/0x140 [ 678.915519][T29832] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.915531][T29832] RIP: 0033:0x45c21a [ 678.915541][T29832] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 678.915547][T29832] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 678.915556][T29832] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 678.915562][T29832] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 678.915574][T29832] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 16:14:33 executing program 1 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:33 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:33 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:33 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:33 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:33 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 678.925999][T29832] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 678.926006][T29832] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:33 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:33 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:33 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:33 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:33 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 679.239142][T29857] FAULT_INJECTION: forcing a failure. [ 679.239142][T29857] name failslab, interval 1, probability 0, space 0, times 0 [ 679.307995][T29857] CPU: 1 PID: 29857 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 679.316215][T29857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 679.326472][T29857] Call Trace: [ 679.329813][T29857] dump_stack+0x1d8/0x2f8 [ 679.334740][T29857] should_fail+0x608/0x860 [ 679.339217][T29857] ? setup_fault_attr+0x2b0/0x2b0 [ 679.344410][T29857] ? tomoyo_encode2+0x273/0x5a0 [ 679.349301][T29857] __should_failslab+0x11a/0x160 [ 679.354276][T29857] ? tomoyo_encode2+0x273/0x5a0 [ 679.359152][T29857] should_failslab+0x9/0x20 [ 679.363694][T29857] __kmalloc+0x7a/0x310 [ 679.367889][T29857] tomoyo_encode2+0x273/0x5a0 [ 679.372602][T29857] tomoyo_realpath_from_path+0x769/0x7c0 [ 679.378279][T29857] tomoyo_mount_permission+0x9d6/0xaf0 [ 679.383776][T29857] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 679.389616][T29857] ? check_preemption_disabled+0x47/0x280 [ 679.395372][T29857] ? tomoyo_get_name+0x540/0x540 [ 679.400356][T29857] ? filename_lookup+0x4e3/0x6d0 [ 679.405348][T29857] ? strncpy_from_user+0x33e/0x3b0 [ 679.410504][T29857] tomoyo_sb_mount+0x35/0x40 [ 679.415131][T29857] security_sb_mount+0x84/0xe0 [ 679.419939][T29857] do_mount+0x186/0x2730 [ 679.424228][T29857] ? check_preemption_disabled+0x47/0x280 [ 679.430032][T29857] ? copy_mount_string+0x30/0x30 [ 679.435006][T29857] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 679.440755][T29857] ? trace_kmalloc+0xcd/0x130 [ 679.445464][T29857] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 679.451039][T29857] ? copy_mount_options+0x5f/0x360 [ 679.456196][T29857] ? copy_mount_options+0x2c8/0x360 [ 679.461427][T29857] ksys_mount+0xcc/0x100 [ 679.465703][T29857] __x64_sys_mount+0xbf/0xd0 [ 679.470417][T29857] do_syscall_64+0xfe/0x140 [ 679.474958][T29857] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.480876][T29857] RIP: 0033:0x45c21a [ 679.484795][T29857] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 16:14:33 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 679.504419][T29857] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 679.512861][T29857] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 679.520857][T29857] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 679.528856][T29857] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 679.536851][T29857] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 679.544846][T29857] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 679.634734][T29857] ERROR: Out of memory at tomoyo_realpath_from_path. 16:14:33 executing program 1 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:33 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:33 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:33 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:33 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:33 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:33 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:33 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 679.835842][T29883] FAULT_INJECTION: forcing a failure. [ 679.835842][T29883] name failslab, interval 1, probability 0, space 0, times 0 [ 679.849666][T29883] CPU: 1 PID: 29883 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 679.857687][T29883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 679.867765][T29883] Call Trace: [ 679.871118][T29883] dump_stack+0x1d8/0x2f8 [ 679.875474][T29883] should_fail+0x608/0x860 [ 679.879912][T29883] ? setup_fault_attr+0x2b0/0x2b0 [ 679.879928][T29883] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 679.879946][T29883] __should_failslab+0x11a/0x160 [ 679.879962][T29883] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 679.890773][T29883] should_failslab+0x9/0x20 [ 679.890787][T29883] __kmalloc+0x7a/0x310 [ 679.890798][T29883] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 679.890808][T29883] tomoyo_realpath_from_path+0xdc/0x7c0 [ 679.890826][T29883] tomoyo_mount_permission+0x312/0xaf0 [ 679.890843][T29883] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 679.890861][T29883] ? check_preemption_disabled+0x47/0x280 [ 679.901534][T29883] ? tomoyo_get_name+0x540/0x540 [ 679.901558][T29883] ? filename_lookup+0x4e3/0x6d0 [ 679.901570][T29883] ? retint_kernel+0x2b/0x2b [ 679.901598][T29883] ? strncpy_from_user+0x33e/0x3b0 [ 679.910284][T29883] tomoyo_sb_mount+0x35/0x40 [ 679.910298][T29883] security_sb_mount+0x84/0xe0 [ 679.910313][T29883] do_mount+0x186/0x2730 [ 679.910325][T29883] ? check_preemption_disabled+0x47/0x280 [ 679.910339][T29883] ? copy_mount_string+0x30/0x30 [ 679.921664][T29883] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 679.921676][T29883] ? trace_kmalloc+0xcd/0x130 [ 679.921688][T29883] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 679.921697][T29883] ? copy_mount_options+0x5f/0x360 [ 679.921710][T29883] ? copy_mount_options+0x2c8/0x360 [ 679.933237][T29883] ksys_mount+0xcc/0x100 [ 679.933251][T29883] __x64_sys_mount+0xbf/0xd0 [ 679.933265][T29883] do_syscall_64+0xfe/0x140 [ 679.933280][T29883] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.933290][T29883] RIP: 0033:0x45c21a [ 679.933302][T29883] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 679.933307][T29883] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 680.076211][T29883] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a 16:14:34 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:34 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:34 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 680.084280][T29883] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 680.092348][T29883] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 680.100330][T29883] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 680.108314][T29883] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 680.128087][T29883] ERROR: Out of memory at tomoyo_realpath_from_path. 16:14:34 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:34 executing program 1 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:34 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:34 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:34 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:34 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:34 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:34 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:34 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:34 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:34 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 680.404451][T29905] FAULT_INJECTION: forcing a failure. [ 680.404451][T29905] name failslab, interval 1, probability 0, space 0, times 0 16:14:34 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:34 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 680.506826][T29905] CPU: 0 PID: 29905 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 680.514877][T29905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.514884][T29905] Call Trace: [ 680.514909][T29905] dump_stack+0x1d8/0x2f8 [ 680.514925][T29905] should_fail+0x608/0x860 [ 680.514938][T29905] ? setup_fault_attr+0x2b0/0x2b0 [ 680.515035][T29905] ? btrfs_mount+0x109/0x1a70 [ 680.515055][T29905] __should_failslab+0x11a/0x160 [ 680.515065][T29905] ? btrfs_mount+0x109/0x1a70 [ 680.515075][T29905] should_failslab+0x9/0x20 [ 680.515093][T29905] __kmalloc_track_caller+0x79/0x310 [ 680.546889][T29905] ? __kasan_kmalloc+0x178/0x1b0 [ 680.546907][T29905] kstrdup+0x34/0x70 [ 680.546921][T29905] btrfs_mount+0x109/0x1a70 [ 680.546937][T29905] ? trace_lock_acquire+0x190/0x190 [ 680.584884][T29905] ? kasan_kmalloc+0x9/0x10 [ 680.590870][T29905] ? alloc_fs_context+0x49a/0x580 [ 680.595901][T29905] ? fs_context_for_mount+0x24/0x30 [ 680.601116][T29905] ? do_mount+0x1200/0x2730 [ 680.605642][T29905] ? ksys_mount+0xcc/0x100 [ 680.610160][T29905] ? __x64_sys_mount+0xbf/0xd0 [ 680.614946][T29905] ? do_syscall_64+0xfe/0x140 [ 680.619647][T29905] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.625748][T29905] ? fs_parse+0x1bd/0x10a0 [ 680.630194][T29905] ? btrfs_resize_thread_pool+0x290/0x290 [ 680.635942][T29905] ? smack_fs_context_parse_param+0x16a/0x3b0 [ 680.642040][T29905] ? smack_fs_context_dup+0x2e0/0x2e0 [ 680.647442][T29905] ? check_preemption_disabled+0x47/0x280 [ 680.653192][T29905] ? vfs_parse_fs_string+0x1da/0x280 [ 680.658505][T29905] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 680.664265][T29905] ? trace_kfree+0xb2/0x110 [ 680.672190][T29905] ? vfs_parse_fs_string+0x1da/0x280 [ 680.677509][T29905] ? kfree+0x1d/0x120 [ 680.681520][T29905] ? vfs_parse_fs_string+0x1da/0x280 [ 680.686834][T29905] ? logfc+0x710/0x710 [ 680.690932][T29905] legacy_get_tree+0xf9/0x1a0 [ 680.695897][T29905] ? btrfs_resize_thread_pool+0x290/0x290 [ 680.701646][T29905] vfs_get_tree+0x8f/0x360 [ 680.706092][T29905] do_mount+0x1813/0x2730 [ 680.710440][T29905] ? check_preemption_disabled+0x47/0x280 [ 680.716188][T29905] ? copy_mount_string+0x30/0x30 [ 680.721721][T29905] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 680.727465][T29905] ? trace_kmalloc+0xcd/0x130 [ 680.732168][T29905] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 680.737743][T29905] ? copy_mount_options+0x5f/0x360 [ 680.742875][T29905] ? copy_mount_options+0x2c8/0x360 [ 680.748098][T29905] ksys_mount+0xcc/0x100 [ 680.752367][T29905] __x64_sys_mount+0xbf/0xd0 [ 680.756982][T29905] do_syscall_64+0xfe/0x140 [ 680.761510][T29905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.767424][T29905] RIP: 0033:0x45c21a [ 680.771337][T29905] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 680.790963][T29905] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 680.799396][T29905] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 680.807393][T29905] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 680.815392][T29905] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 680.823384][T29905] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 680.831378][T29905] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:34 executing program 1 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:34 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:34 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:34 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:34 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:34 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:35 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:35 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:35 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:35 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:35 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 681.093245][T29937] FAULT_INJECTION: forcing a failure. [ 681.093245][T29937] name failslab, interval 1, probability 0, space 0, times 0 [ 681.122643][T29937] CPU: 1 PID: 29937 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 681.130688][T29937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 16:14:35 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 681.140771][T29937] Call Trace: [ 681.144086][T29937] dump_stack+0x1d8/0x2f8 [ 681.148452][T29937] should_fail+0x608/0x860 [ 681.152894][T29937] ? setup_fault_attr+0x2b0/0x2b0 [ 681.157956][T29937] __should_failslab+0x11a/0x160 [ 681.162919][T29937] ? getname_kernel+0x59/0x2f0 [ 681.167696][T29937] should_failslab+0x9/0x20 [ 681.172219][T29937] kmem_cache_alloc+0x56/0x2b0 [ 681.176996][T29937] ? do_raw_read_unlock+0x42/0xf0 [ 681.182036][T29937] getname_kernel+0x59/0x2f0 [ 681.186639][T29937] kern_path+0x1f/0x40 [ 681.190714][T29937] tomoyo_mount_permission+0x850/0xaf0 [ 681.196256][T29937] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 681.202072][T29937] ? check_preemption_disabled+0x47/0x280 [ 681.207805][T29937] ? tomoyo_get_name+0x540/0x540 [ 681.213560][T29937] ? filename_lookup+0x4e3/0x6d0 [ 681.218523][T29937] ? strncpy_from_user+0x33e/0x3b0 [ 681.223644][T29937] tomoyo_sb_mount+0x35/0x40 [ 681.228267][T29937] security_sb_mount+0x84/0xe0 [ 681.233037][T29937] do_mount+0x186/0x2730 [ 681.237285][T29937] ? check_preemption_disabled+0x47/0x280 [ 681.243017][T29937] ? copy_mount_string+0x30/0x30 [ 681.247956][T29937] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 681.253679][T29937] ? trace_kmalloc+0xcd/0x130 [ 681.258459][T29937] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 681.264003][T29937] ? copy_mount_options+0x5f/0x360 [ 681.269122][T29937] ? copy_mount_options+0x2c8/0x360 [ 681.274333][T29937] ksys_mount+0xcc/0x100 [ 681.278590][T29937] __x64_sys_mount+0xbf/0xd0 [ 681.283205][T29937] do_syscall_64+0xfe/0x140 [ 681.287719][T29937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.293607][T29937] RIP: 0033:0x45c21a [ 681.297495][T29937] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 681.317097][T29937] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 681.325574][T29937] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 681.333583][T29937] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 681.341548][T29937] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 681.349506][T29937] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 681.357470][T29937] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:35 executing program 1 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:35 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:35 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:35 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:35 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:35 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:35 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:35 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:35 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:35 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:35 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:35 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 681.865562][T29974] FAULT_INJECTION: forcing a failure. [ 681.865562][T29974] name failslab, interval 1, probability 0, space 0, times 0 [ 681.882241][T29974] CPU: 0 PID: 29974 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 681.890252][T29974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.900315][T29974] Call Trace: [ 681.903623][T29974] dump_stack+0x1d8/0x2f8 [ 681.907976][T29974] should_fail+0x608/0x860 [ 681.912399][T29974] ? setup_fault_attr+0x2b0/0x2b0 [ 681.917605][T29974] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 681.923685][T29974] __should_failslab+0x11a/0x160 [ 681.928638][T29974] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 681.934357][T29974] should_failslab+0x9/0x20 [ 681.938861][T29974] __kmalloc+0x7a/0x310 [ 681.943016][T29974] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 681.948831][T29974] tomoyo_realpath_from_path+0xdc/0x7c0 [ 681.954388][T29974] tomoyo_mount_permission+0x9d6/0xaf0 [ 681.959847][T29974] ? retint_kernel+0x2b/0x2b [ 681.964440][T29974] ? filename_lookup+0x4e3/0x6d0 [ 681.969378][T29974] ? tomoyo_get_name+0x540/0x540 [ 681.974353][T29974] ? filename_lookup+0x4e3/0x6d0 [ 681.979316][T29974] ? strncpy_from_user+0x33e/0x3b0 [ 681.984436][T29974] tomoyo_sb_mount+0x35/0x40 [ 681.989056][T29974] security_sb_mount+0x84/0xe0 [ 681.993825][T29974] do_mount+0x186/0x2730 [ 681.998065][T29974] ? check_preemption_disabled+0x47/0x280 [ 682.003791][T29974] ? copy_mount_string+0x30/0x30 [ 682.008755][T29974] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 682.014498][T29974] ? trace_kmalloc+0xcd/0x130 [ 682.019179][T29974] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 682.024723][T29974] ? copy_mount_options+0x5f/0x360 [ 682.029835][T29974] ? copy_mount_options+0x2c8/0x360 [ 682.035033][T29974] ksys_mount+0xcc/0x100 [ 682.039276][T29974] __x64_sys_mount+0xbf/0xd0 [ 682.043873][T29974] do_syscall_64+0xfe/0x140 [ 682.048382][T29974] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.054273][T29974] RIP: 0033:0x45c21a [ 682.058169][T29974] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 682.077806][T29974] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 682.086226][T29974] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 682.094206][T29974] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 682.102177][T29974] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 682.110146][T29974] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 682.118112][T29974] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 682.132058][T29974] ERROR: Out of memory at tomoyo_realpath_from_path. 16:14:36 executing program 1 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:36 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:36 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:36 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:36 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:36 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:36 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:36 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:36 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:36 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 682.298894][T29987] FAULT_INJECTION: forcing a failure. [ 682.298894][T29987] name failslab, interval 1, probability 0, space 0, times 0 [ 682.352784][T29987] CPU: 1 PID: 29987 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 682.360825][T29987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.370905][T29987] Call Trace: [ 682.374214][T29987] dump_stack+0x1d8/0x2f8 [ 682.378554][T29987] should_fail+0x608/0x860 [ 682.382976][T29987] ? setup_fault_attr+0x2b0/0x2b0 [ 682.387999][T29987] ? vfs_parse_fs_string+0x171/0x280 [ 682.388017][T29987] __should_failslab+0x11a/0x160 [ 682.388031][T29987] ? vfs_parse_fs_string+0x171/0x280 [ 682.403513][T29987] should_failslab+0x9/0x20 [ 682.408024][T29987] __kmalloc_track_caller+0x79/0x310 [ 682.413307][T29987] kmemdup_nul+0x2a/0xa0 [ 682.417551][T29987] vfs_parse_fs_string+0x171/0x280 [ 682.422662][T29987] ? logfc+0x710/0x710 [ 682.426751][T29987] do_mount+0x1396/0x2730 [ 682.431081][T29987] ? check_preemption_disabled+0x47/0x280 [ 682.436813][T29987] ? copy_mount_string+0x30/0x30 [ 682.441750][T29987] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 682.447465][T29987] ? trace_kmalloc+0xcd/0x130 [ 682.452145][T29987] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 682.457687][T29987] ? copy_mount_options+0x5f/0x360 [ 682.464013][T29987] ? copy_mount_options+0x2c8/0x360 [ 682.464026][T29987] ksys_mount+0xcc/0x100 [ 682.464040][T29987] __x64_sys_mount+0xbf/0xd0 [ 682.478042][T29987] do_syscall_64+0xfe/0x140 [ 682.482550][T29987] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.482562][T29987] RIP: 0033:0x45c21a 16:14:36 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:36 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 682.482576][T29987] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 682.492326][T29987] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 682.520390][T29987] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 682.528367][T29987] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 682.536339][T29987] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 682.544306][T29987] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 682.544313][T29987] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:36 executing program 1 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:36 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:36 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:36 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:36 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:36 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:36 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 682.756822][T30012] FAULT_INJECTION: forcing a failure. [ 682.756822][T30012] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 682.770074][T30012] CPU: 1 PID: 30012 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 682.778046][T30012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.788101][T30012] Call Trace: [ 682.791401][T30012] dump_stack+0x1d8/0x2f8 [ 682.795741][T30012] should_fail+0x608/0x860 [ 682.800166][T30012] ? setup_fault_attr+0x2b0/0x2b0 [ 682.805206][T30012] ? do_raw_spin_lock+0x143/0x3a0 [ 682.810245][T30012] should_fail_alloc_page+0x55/0x60 [ 682.815442][T30012] prepare_alloc_pages+0x283/0x460 [ 682.820559][T30012] __alloc_pages_nodemask+0x11c/0x790 [ 682.825936][T30012] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 682.831481][T30012] ? filename_lookup+0x4e3/0x6d0 [ 682.836424][T30012] ? kmem_cache_free+0x122/0x170 [ 682.841367][T30012] kmem_getpages+0x46/0x480 [ 682.845875][T30012] cache_grow_begin+0x7e/0x2c0 [ 682.850641][T30012] cache_alloc_refill+0x311/0x3f0 [ 682.855690][T30012] ? check_preemption_disabled+0xb7/0x280 [ 682.861419][T30012] __kmalloc+0x2e5/0x310 [ 682.865658][T30012] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 682.871381][T30012] tomoyo_realpath_from_path+0xdc/0x7c0 [ 682.876934][T30012] tomoyo_mount_permission+0x9d6/0xaf0 [ 682.882399][T30012] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 682.888214][T30012] ? check_preemption_disabled+0x47/0x280 [ 682.893939][T30012] ? tomoyo_get_name+0x540/0x540 [ 682.898896][T30012] ? filename_lookup+0x4e3/0x6d0 [ 682.903856][T30012] ? strncpy_from_user+0x33e/0x3b0 [ 682.908977][T30012] tomoyo_sb_mount+0x35/0x40 [ 682.913576][T30012] security_sb_mount+0x84/0xe0 [ 682.918351][T30012] do_mount+0x186/0x2730 [ 682.922599][T30012] ? check_preemption_disabled+0x47/0x280 [ 682.928333][T30012] ? copy_mount_string+0x30/0x30 [ 682.933277][T30012] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 682.938999][T30012] ? trace_kmalloc+0xcd/0x130 [ 682.943679][T30012] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 682.949226][T30012] ? copy_mount_options+0x5f/0x360 [ 682.954380][T30012] ? copy_mount_options+0x2c8/0x360 [ 682.959590][T30012] ksys_mount+0xcc/0x100 [ 682.963876][T30012] __x64_sys_mount+0xbf/0xd0 [ 682.968477][T30012] do_syscall_64+0xfe/0x140 [ 682.972990][T30012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.978890][T30012] RIP: 0033:0x45c21a [ 682.982790][T30012] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 16:14:36 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:36 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:36 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:36 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:36 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 683.002405][T30012] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 683.010836][T30012] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 683.018815][T30012] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 683.026792][T30012] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 683.034854][T30012] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 683.042848][T30012] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:37 executing program 1 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:37 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:37 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:37 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:37 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:37 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:37 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:37 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:37 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 683.284495][T30037] FAULT_INJECTION: forcing a failure. [ 683.284495][T30037] name failslab, interval 1, probability 0, space 0, times 0 [ 683.319333][T30037] CPU: 1 PID: 30037 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 16:14:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:37 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 683.327364][T30037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.337433][T30037] Call Trace: [ 683.340743][T30037] dump_stack+0x1d8/0x2f8 [ 683.345124][T30037] should_fail+0x608/0x860 [ 683.349564][T30037] ? setup_fault_attr+0x2b0/0x2b0 [ 683.354606][T30037] ? tomoyo_encode2+0x273/0x5a0 [ 683.359472][T30037] __should_failslab+0x11a/0x160 [ 683.364415][T30037] ? tomoyo_encode2+0x273/0x5a0 [ 683.369269][T30037] should_failslab+0x9/0x20 [ 683.373780][T30037] __kmalloc+0x7a/0x310 [ 683.377941][T30037] tomoyo_encode2+0x273/0x5a0 [ 683.382627][T30037] tomoyo_realpath_from_path+0x769/0x7c0 [ 683.388272][T30037] tomoyo_mount_permission+0x9d6/0xaf0 [ 683.393748][T30037] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 683.399558][T30037] ? check_preemption_disabled+0x47/0x280 [ 683.405280][T30037] ? tomoyo_get_name+0x540/0x540 [ 683.410245][T30037] ? filename_lookup+0x4e3/0x6d0 [ 683.415211][T30037] ? strncpy_from_user+0x33e/0x3b0 [ 683.420334][T30037] tomoyo_sb_mount+0x35/0x40 [ 683.424930][T30037] security_sb_mount+0x84/0xe0 [ 683.429697][T30037] do_mount+0x186/0x2730 [ 683.433940][T30037] ? check_preemption_disabled+0x47/0x280 [ 683.439670][T30037] ? copy_mount_string+0x30/0x30 [ 683.444611][T30037] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 683.450593][T30037] ? trace_kmalloc+0xcd/0x130 [ 683.455292][T30037] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 683.455302][T30037] ? copy_mount_options+0x5f/0x360 [ 683.455316][T30037] ? copy_mount_options+0x2c8/0x360 [ 683.455329][T30037] ksys_mount+0xcc/0x100 [ 683.455342][T30037] __x64_sys_mount+0xbf/0xd0 [ 683.455361][T30037] do_syscall_64+0xfe/0x140 [ 683.466003][T30037] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.466014][T30037] RIP: 0033:0x45c21a [ 683.466025][T30037] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 683.466031][T30037] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 683.466042][T30037] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 683.466048][T30037] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 683.466054][T30037] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 683.466060][T30037] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 683.466066][T30037] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 683.557316][T30037] ERROR: Out of memory at tomoyo_realpath_from_path. 16:14:37 executing program 1 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:37 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:37 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:37 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:37 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:37 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:37 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:37 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:37 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 683.781878][T30062] FAULT_INJECTION: forcing a failure. [ 683.781878][T30062] name failslab, interval 1, probability 0, space 0, times 0 [ 683.872564][T30062] CPU: 0 PID: 30062 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 683.880590][T30062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.890642][T30062] Call Trace: [ 683.893939][T30062] dump_stack+0x1d8/0x2f8 [ 683.898280][T30062] should_fail+0x608/0x860 [ 683.902735][T30062] ? setup_fault_attr+0x2b0/0x2b0 [ 683.907761][T30062] ? vfs_parse_fs_string+0x171/0x280 [ 683.913054][T30062] __should_failslab+0x11a/0x160 [ 683.918028][T30062] ? vfs_parse_fs_string+0x171/0x280 [ 683.923314][T30062] should_failslab+0x9/0x20 [ 683.927855][T30062] __kmalloc_track_caller+0x79/0x310 [ 683.933145][T30062] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 683.938873][T30062] kmemdup_nul+0x2a/0xa0 [ 683.943124][T30062] vfs_parse_fs_string+0x171/0x280 [ 683.948267][T30062] ? logfc+0x710/0x710 [ 683.948282][T30062] ? alloc_fs_context+0x4ae/0x580 [ 683.948304][T30062] vfs_kern_mount+0x77/0x160 [ 683.948320][T30062] btrfs_mount+0x3f0/0x1a70 [ 683.957392][T30062] ? alloc_fs_context+0x49a/0x580 [ 683.957402][T30062] ? fs_context_for_mount+0x24/0x30 [ 683.957411][T30062] ? do_mount+0x1200/0x2730 [ 683.957423][T30062] ? ksys_mount+0xcc/0x100 [ 683.966485][T30062] ? __x64_sys_mount+0xbf/0xd0 [ 683.976664][T30062] ? do_syscall_64+0xfe/0x140 [ 683.976678][T30062] ? fs_parse+0x1bd/0x10a0 [ 683.976702][T30062] ? btrfs_resize_thread_pool+0x290/0x290 [ 683.976717][T30062] ? smack_fs_context_parse_param+0x16a/0x3b0 [ 683.976730][T30062] ? smack_fs_context_dup+0x2e0/0x2e0 [ 683.976742][T30062] ? check_preemption_disabled+0x47/0x280 [ 683.976759][T30062] ? vfs_parse_fs_string+0x1da/0x280 [ 683.976771][T30062] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 683.976782][T30062] ? trace_kfree+0xb2/0x110 [ 683.976797][T30062] ? vfs_parse_fs_string+0x1da/0x280 [ 683.990431][T30062] ? kfree+0x1d/0x120 [ 683.990447][T30062] ? vfs_parse_fs_string+0x1da/0x280 [ 683.990460][T30062] ? logfc+0x710/0x710 [ 683.990472][T30062] legacy_get_tree+0xf9/0x1a0 [ 683.990487][T30062] ? btrfs_resize_thread_pool+0x290/0x290 [ 683.999563][T30062] vfs_get_tree+0x8f/0x360 16:14:37 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 683.999578][T30062] do_mount+0x1813/0x2730 [ 683.999590][T30062] ? check_preemption_disabled+0x47/0x280 [ 683.999611][T30062] ? copy_mount_string+0x30/0x30 [ 684.086672][T30062] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 684.092399][T30062] ? trace_kmalloc+0xcd/0x130 [ 684.097085][T30062] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 684.102627][T30062] ? copy_mount_options+0x5f/0x360 [ 684.107753][T30062] ? copy_mount_options+0x2c8/0x360 [ 684.112952][T30062] ksys_mount+0xcc/0x100 [ 684.117198][T30062] __x64_sys_mount+0xbf/0xd0 [ 684.121794][T30062] do_syscall_64+0xfe/0x140 [ 684.126307][T30062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.132194][T30062] RIP: 0033:0x45c21a [ 684.136087][T30062] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 684.155707][T30062] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 684.164121][T30062] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 684.172090][T30062] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 684.180060][T30062] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 684.188027][T30062] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 684.195996][T30062] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:38 executing program 1 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:38 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:38 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:38 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:38 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:38 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:38 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:38 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:38 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:38 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:38 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 684.410712][T30087] FAULT_INJECTION: forcing a failure. [ 684.410712][T30087] name failslab, interval 1, probability 0, space 0, times 0 [ 684.450560][T30087] CPU: 0 PID: 30087 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 16:14:38 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 684.458577][T30087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.468633][T30087] Call Trace: [ 684.471941][T30087] dump_stack+0x1d8/0x2f8 [ 684.476279][T30087] should_fail+0x608/0x860 [ 684.480705][T30087] ? setup_fault_attr+0x2b0/0x2b0 [ 684.485741][T30087] __should_failslab+0x11a/0x160 [ 684.490680][T30087] should_failslab+0x9/0x20 [ 684.495193][T30087] kmem_cache_alloc_trace+0x5d/0x2c0 [ 684.500486][T30087] ? btrfs_mount_root+0x215/0x1120 [ 684.505604][T30087] btrfs_mount_root+0x215/0x1120 [ 684.510541][T30087] ? smack_fs_context_dup+0x2e0/0x2e0 [ 684.515940][T30087] ? btrfs_control_open+0x40/0x40 [ 684.520969][T30087] ? vfs_parse_fs_string+0x1da/0x280 [ 684.526258][T30087] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 684.532726][T30087] ? trace_kfree+0xb2/0x110 [ 684.540010][T30087] ? vfs_parse_fs_string+0x1da/0x280 [ 684.545298][T30087] ? kfree+0x1d/0x120 [ 684.549290][T30087] ? vfs_parse_fs_string+0x1da/0x280 [ 684.554580][T30087] ? logfc+0x710/0x710 [ 684.558651][T30087] legacy_get_tree+0xf9/0x1a0 [ 684.563339][T30087] ? btrfs_control_open+0x40/0x40 [ 684.568432][T30087] vfs_get_tree+0x8f/0x360 [ 684.572863][T30087] vfs_kern_mount+0xc2/0x160 [ 684.577451][T30087] btrfs_mount+0x3f0/0x1a70 [ 684.577468][T30087] ? alloc_fs_context+0x49a/0x580 [ 684.577478][T30087] ? fs_context_for_mount+0x24/0x30 [ 684.577485][T30087] ? do_mount+0x1200/0x2730 [ 684.577493][T30087] ? ksys_mount+0xcc/0x100 [ 684.577506][T30087] ? __x64_sys_mount+0xbf/0xd0 [ 684.598401][T30087] ? do_syscall_64+0xfe/0x140 [ 684.612238][T30087] ? fs_parse+0x1bd/0x10a0 [ 684.616662][T30087] ? btrfs_resize_thread_pool+0x290/0x290 [ 684.622393][T30087] ? smack_fs_context_parse_param+0x16a/0x3b0 [ 684.628637][T30087] ? smack_fs_context_dup+0x2e0/0x2e0 [ 684.634011][T30087] ? check_preemption_disabled+0x47/0x280 [ 684.639734][T30087] ? vfs_parse_fs_string+0x1da/0x280 [ 684.639749][T30087] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 684.639760][T30087] ? trace_kfree+0xb2/0x110 [ 684.639771][T30087] ? vfs_parse_fs_string+0x1da/0x280 [ 684.639779][T30087] ? kfree+0x1d/0x120 [ 684.639793][T30087] ? vfs_parse_fs_string+0x1da/0x280 [ 684.670099][T30087] ? logfc+0x710/0x710 [ 684.670114][T30087] legacy_get_tree+0xf9/0x1a0 [ 684.670127][T30087] ? btrfs_resize_thread_pool+0x290/0x290 [ 684.670140][T30087] vfs_get_tree+0x8f/0x360 [ 684.670154][T30087] do_mount+0x1813/0x2730 [ 684.684612][T30087] ? check_preemption_disabled+0x47/0x280 [ 684.684632][T30087] ? copy_mount_string+0x30/0x30 [ 684.684645][T30087] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 684.684656][T30087] ? trace_kmalloc+0xcd/0x130 [ 684.684672][T30087] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 684.693405][T30087] ? copy_mount_options+0x5f/0x360 [ 684.693418][T30087] ? copy_mount_options+0x2c8/0x360 [ 684.693432][T30087] ksys_mount+0xcc/0x100 [ 684.693445][T30087] __x64_sys_mount+0xbf/0xd0 [ 684.693460][T30087] do_syscall_64+0xfe/0x140 [ 684.693475][T30087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.693485][T30087] RIP: 0033:0x45c21a [ 684.693495][T30087] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 684.693500][T30087] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 684.693509][T30087] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 684.693516][T30087] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 684.693522][T30087] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 684.693528][T30087] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 684.693534][T30087] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:38 executing program 1 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:38 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:38 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:38 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:38 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:38 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:39 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:39 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:39 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:39 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:39 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 685.007767][T30113] FAULT_INJECTION: forcing a failure. [ 685.007767][T30113] name failslab, interval 1, probability 0, space 0, times 0 [ 685.075155][T30113] CPU: 0 PID: 30113 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 685.083180][T30113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.093238][T30113] Call Trace: [ 685.096534][T30113] dump_stack+0x1d8/0x2f8 [ 685.100867][T30113] should_fail+0x608/0x860 [ 685.105319][T30113] ? setup_fault_attr+0x2b0/0x2b0 [ 685.110365][T30113] __should_failslab+0x11a/0x160 [ 685.115310][T30113] should_failslab+0x9/0x20 [ 685.119811][T30113] kmem_cache_alloc_trace+0x5d/0x2c0 16:14:39 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 685.119823][T30113] ? legacy_init_fs_context+0x51/0xc0 [ 685.119836][T30113] legacy_init_fs_context+0x51/0xc0 [ 685.119850][T30113] alloc_fs_context+0x49a/0x580 [ 685.119868][T30113] fs_context_for_mount+0x24/0x30 [ 685.135699][T30113] do_mount+0x1200/0x2730 [ 685.135714][T30113] ? check_preemption_disabled+0x47/0x280 [ 685.135729][T30113] ? copy_mount_string+0x30/0x30 [ 685.135742][T30113] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 685.135753][T30113] ? trace_kmalloc+0xcd/0x130 [ 685.135766][T30113] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 685.135774][T30113] ? copy_mount_options+0x5f/0x360 [ 685.135787][T30113] ? copy_mount_options+0x2c8/0x360 [ 685.135799][T30113] ksys_mount+0xcc/0x100 [ 685.135810][T30113] __x64_sys_mount+0xbf/0xd0 [ 685.135826][T30113] do_syscall_64+0xfe/0x140 [ 685.135843][T30113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.206003][T30113] RIP: 0033:0x45c21a [ 685.209902][T30113] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 685.229507][T30113] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 685.237918][T30113] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 685.245884][T30113] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 685.253858][T30113] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 685.261830][T30113] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 685.269986][T30113] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:39 executing program 1 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:39 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:39 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:39 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:39 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:39 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:39 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:39 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:39 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 685.496844][T30141] FAULT_INJECTION: forcing a failure. [ 685.496844][T30141] name failslab, interval 1, probability 0, space 0, times 0 [ 685.527791][T30141] CPU: 0 PID: 30141 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 685.535798][T30141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 16:14:39 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 685.545870][T30141] Call Trace: [ 685.549164][T30141] dump_stack+0x1d8/0x2f8 [ 685.553503][T30141] should_fail+0x608/0x860 [ 685.557931][T30141] ? setup_fault_attr+0x2b0/0x2b0 [ 685.562971][T30141] __should_failslab+0x11a/0x160 [ 685.567913][T30141] should_failslab+0x9/0x20 [ 685.572416][T30141] kmem_cache_alloc_trace+0x5d/0x2c0 [ 685.577726][T30141] ? alloc_fs_context+0x65/0x580 [ 685.582674][T30141] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 685.588499][T30141] alloc_fs_context+0x65/0x580 [ 685.593282][T30141] fs_context_for_mount+0x24/0x30 [ 685.598322][T30141] vfs_kern_mount+0x2c/0x160 [ 685.602931][T30141] btrfs_mount+0x3f0/0x1a70 [ 685.607454][T30141] ? alloc_fs_context+0x49a/0x580 [ 685.612490][T30141] ? fs_context_for_mount+0x24/0x30 [ 685.617712][T30141] ? do_mount+0x1200/0x2730 [ 685.622223][T30141] ? ksys_mount+0xcc/0x100 [ 685.626652][T30141] ? __x64_sys_mount+0xbf/0xd0 [ 685.631436][T30141] ? do_syscall_64+0xfe/0x140 [ 685.636130][T30141] ? fs_parse+0x1bd/0x10a0 [ 685.640560][T30141] ? btrfs_resize_thread_pool+0x290/0x290 16:14:39 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:39 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 685.646279][T30141] ? smack_fs_context_parse_param+0x16a/0x3b0 [ 685.652344][T30141] ? smack_fs_context_dup+0x2e0/0x2e0 [ 685.652356][T30141] ? check_preemption_disabled+0x47/0x280 [ 685.652375][T30141] ? vfs_parse_fs_string+0x1da/0x280 [ 685.652389][T30141] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 685.652403][T30141] ? trace_kfree+0xb2/0x110 [ 685.678951][T30141] ? vfs_parse_fs_string+0x1da/0x280 [ 685.684248][T30141] ? kfree+0x1d/0x120 [ 685.688245][T30141] ? vfs_parse_fs_string+0x1da/0x280 [ 685.693532][T30141] ? logfc+0x710/0x710 [ 685.693547][T30141] legacy_get_tree+0xf9/0x1a0 [ 685.693559][T30141] ? btrfs_resize_thread_pool+0x290/0x290 [ 685.693572][T30141] vfs_get_tree+0x8f/0x360 [ 685.693583][T30141] do_mount+0x1813/0x2730 [ 685.693594][T30141] ? check_preemption_disabled+0x47/0x280 [ 685.693608][T30141] ? copy_mount_string+0x30/0x30 [ 685.693619][T30141] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 685.693629][T30141] ? trace_kmalloc+0xcd/0x130 [ 685.693639][T30141] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 685.693646][T30141] ? copy_mount_options+0x5f/0x360 [ 685.693659][T30141] ? copy_mount_options+0x2c8/0x360 [ 685.693671][T30141] ksys_mount+0xcc/0x100 [ 685.693682][T30141] __x64_sys_mount+0xbf/0xd0 [ 685.693708][T30141] do_syscall_64+0xfe/0x140 [ 685.712604][T30141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.712616][T30141] RIP: 0033:0x45c21a [ 685.712627][T30141] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 685.712632][T30141] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 685.712641][T30141] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 685.712646][T30141] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 685.712651][T30141] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 685.712656][T30141] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 685.712661][T30141] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:39 executing program 1 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:39 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:39 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:39 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:39 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:40 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:40 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:40 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:40 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:40 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 686.053620][T30164] FAULT_INJECTION: forcing a failure. [ 686.053620][T30164] name failslab, interval 1, probability 0, space 0, times 0 [ 686.117669][T30164] CPU: 1 PID: 30164 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 686.125700][T30164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 686.135767][T30164] Call Trace: [ 686.139073][T30164] dump_stack+0x1d8/0x2f8 [ 686.143415][T30164] should_fail+0x608/0x860 [ 686.147836][T30164] ? setup_fault_attr+0x2b0/0x2b0 [ 686.152870][T30164] __should_failslab+0x11a/0x160 [ 686.157814][T30164] should_failslab+0x9/0x20 [ 686.162330][T30164] kmem_cache_alloc_trace+0x5d/0x2c0 [ 686.167628][T30164] ? btrfs_mount_root+0x215/0x1120 [ 686.172743][T30164] btrfs_mount_root+0x215/0x1120 [ 686.177684][T30164] ? smack_fs_context_dup+0x2e0/0x2e0 [ 686.183062][T30164] ? btrfs_control_open+0x40/0x40 [ 686.188108][T30164] ? vfs_parse_fs_string+0x1da/0x280 [ 686.193404][T30164] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 686.199133][T30164] ? trace_kfree+0xb2/0x110 [ 686.203649][T30164] ? vfs_parse_fs_string+0x1da/0x280 [ 686.208948][T30164] ? kfree+0x1d/0x120 [ 686.212949][T30164] ? vfs_parse_fs_string+0x1da/0x280 16:14:40 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:40 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 686.218278][T30164] ? logfc+0x710/0x710 [ 686.222368][T30164] legacy_get_tree+0xf9/0x1a0 [ 686.227052][T30164] ? btrfs_control_open+0x40/0x40 [ 686.232076][T30164] vfs_get_tree+0x8f/0x360 [ 686.236507][T30164] vfs_kern_mount+0xc2/0x160 [ 686.241109][T30164] btrfs_mount+0x3f0/0x1a70 [ 686.245623][T30164] ? alloc_fs_context+0x49a/0x580 [ 686.250654][T30164] ? fs_context_for_mount+0x24/0x30 [ 686.255856][T30164] ? do_mount+0x1200/0x2730 [ 686.260361][T30164] ? ksys_mount+0xcc/0x100 [ 686.264780][T30164] ? __x64_sys_mount+0xbf/0xd0 [ 686.269548][T30164] ? do_syscall_64+0xfe/0x140 [ 686.274268][T30164] ? fs_parse+0x1bd/0x10a0 [ 686.278685][T30164] ? btrfs_resize_thread_pool+0x290/0x290 [ 686.284393][T30164] ? smack_fs_context_parse_param+0x16a/0x3b0 [ 686.290445][T30164] ? smack_fs_context_dup+0x2e0/0x2e0 [ 686.295800][T30164] ? check_preemption_disabled+0x47/0x280 [ 686.301503][T30164] ? vfs_parse_fs_string+0x1da/0x280 [ 686.306770][T30164] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 686.312477][T30164] ? trace_kfree+0xb2/0x110 [ 686.316968][T30164] ? vfs_parse_fs_string+0x1da/0x280 [ 686.322231][T30164] ? kfree+0x1d/0x120 [ 686.326198][T30164] ? vfs_parse_fs_string+0x1da/0x280 [ 686.331473][T30164] ? logfc+0x710/0x710 [ 686.335522][T30164] legacy_get_tree+0xf9/0x1a0 [ 686.340179][T30164] ? btrfs_resize_thread_pool+0x290/0x290 [ 686.345888][T30164] vfs_get_tree+0x8f/0x360 [ 686.350288][T30164] do_mount+0x1813/0x2730 [ 686.354626][T30164] ? check_preemption_disabled+0x47/0x280 [ 686.360335][T30164] ? copy_mount_string+0x30/0x30 [ 686.365255][T30164] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 686.370954][T30164] ? trace_kmalloc+0xcd/0x130 [ 686.375616][T30164] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 686.381141][T30164] ? copy_mount_options+0x5f/0x360 [ 686.386263][T30164] ? copy_mount_options+0x2c8/0x360 [ 686.391449][T30164] ksys_mount+0xcc/0x100 [ 686.395674][T30164] __x64_sys_mount+0xbf/0xd0 [ 686.400259][T30164] do_syscall_64+0xfe/0x140 [ 686.404745][T30164] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.410618][T30164] RIP: 0033:0x45c21a [ 686.414492][T30164] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 686.434255][T30164] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 686.442675][T30164] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 686.450643][T30164] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 686.458611][T30164] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 686.466581][T30164] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 686.474558][T30164] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:40 executing program 1 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:40 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:40 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:40 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:40 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:40 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:40 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:40 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:40 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:40 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:40 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:40 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 686.910855][T30204] FAULT_INJECTION: forcing a failure. [ 686.910855][T30204] name failslab, interval 1, probability 0, space 0, times 0 [ 686.929948][T30204] CPU: 0 PID: 30204 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 686.937967][T30204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 686.948034][T30204] Call Trace: [ 686.951342][T30204] dump_stack+0x1d8/0x2f8 [ 686.955697][T30204] should_fail+0x608/0x860 [ 686.960122][T30204] ? setup_fault_attr+0x2b0/0x2b0 [ 686.965161][T30204] __should_failslab+0x11a/0x160 [ 686.970128][T30204] ? mempool_alloc_slab+0x4d/0x70 [ 686.975162][T30204] should_failslab+0x9/0x20 [ 686.979673][T30204] kmem_cache_alloc+0x56/0x2b0 [ 686.984463][T30204] ? mempool_free+0x350/0x350 [ 686.989165][T30204] mempool_alloc_slab+0x4d/0x70 [ 686.994037][T30204] mempool_alloc+0x15f/0x6b0 [ 686.998647][T30204] ? mempool_resize+0x900/0x900 [ 687.003588][T30204] bio_alloc_bioset+0x210/0x670 [ 687.008462][T30204] ? bio_chain_endio+0x110/0x110 [ 687.013409][T30204] submit_bh_wbc+0x186/0x680 [ 687.018012][T30204] ? __might_sleep+0x8f/0x100 [ 687.022703][T30204] block_read_full_page+0x991/0xbc0 [ 687.027918][T30204] ? blkdev_direct_IO+0xd0/0xd0 [ 687.032777][T30204] ? block_is_partially_uptodate+0x2e0/0x2e0 [ 687.038765][T30204] ? add_to_page_cache_lru+0x31b/0x4f0 [ 687.044286][T30204] ? __add_to_page_cache_locked+0xc60/0xc60 [ 687.050203][T30204] blkdev_readpage+0x1c/0x20 [ 687.054809][T30204] do_read_cache_page+0x66c/0xbd0 [ 687.059857][T30204] ? blkdev_writepage+0x30/0x30 [ 687.064738][T30204] read_cache_page_gfp+0x73/0x80 [ 687.069760][T30204] btrfs_scan_one_device+0x1c3/0x520 [ 687.075243][T30204] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 687.080545][T30204] ? btrfs_free_stale_devices+0x7f0/0x7f0 [ 687.086284][T30204] ? trace_hardirqs_on+0x74/0x80 [ 687.091237][T30204] btrfs_mount_root+0x548/0x1120 [ 687.096199][T30204] ? btrfs_control_open+0x40/0x40 [ 687.101242][T30204] ? vfs_parse_fs_string+0x1da/0x280 [ 687.106537][T30204] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 687.112263][T30204] ? trace_kfree+0xb2/0x110 [ 687.116778][T30204] ? vfs_parse_fs_string+0x1da/0x280 [ 687.122070][T30204] ? kfree+0x1d/0x120 [ 687.126060][T30204] ? vfs_parse_fs_string+0x1da/0x280 [ 687.131351][T30204] ? logfc+0x710/0x710 [ 687.135431][T30204] legacy_get_tree+0xf9/0x1a0 [ 687.140115][T30204] ? btrfs_control_open+0x40/0x40 [ 687.145146][T30204] vfs_get_tree+0x8f/0x360 [ 687.149579][T30204] vfs_kern_mount+0xc2/0x160 [ 687.154182][T30204] btrfs_mount+0x3f0/0x1a70 [ 687.158700][T30204] ? alloc_fs_context+0x49a/0x580 [ 687.163729][T30204] ? fs_context_for_mount+0x24/0x30 [ 687.168925][T30204] ? do_mount+0x1200/0x2730 [ 687.173428][T30204] ? ksys_mount+0xcc/0x100 [ 687.177844][T30204] ? __x64_sys_mount+0xbf/0xd0 [ 687.182614][T30204] ? do_syscall_64+0xfe/0x140 [ 687.187307][T30204] ? fs_parse+0x1bd/0x10a0 [ 687.191815][T30204] ? btrfs_resize_thread_pool+0x290/0x290 [ 687.197537][T30204] ? smack_fs_context_parse_param+0x16a/0x3b0 [ 687.203625][T30204] ? smack_fs_context_dup+0x2e0/0x2e0 [ 687.209002][T30204] ? check_preemption_disabled+0x47/0x280 [ 687.214732][T30204] ? vfs_parse_fs_string+0x1da/0x280 [ 687.220018][T30204] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 687.225745][T30204] ? trace_kfree+0xb2/0x110 [ 687.230248][T30204] ? vfs_parse_fs_string+0x1da/0x280 [ 687.235559][T30204] ? kfree+0x1d/0x120 [ 687.239541][T30204] ? vfs_parse_fs_string+0x1da/0x280 [ 687.244825][T30204] ? logfc+0x710/0x710 [ 687.248894][T30204] legacy_get_tree+0xf9/0x1a0 [ 687.253567][T30204] ? btrfs_resize_thread_pool+0x290/0x290 [ 687.259296][T30204] vfs_get_tree+0x8f/0x360 [ 687.263723][T30204] do_mount+0x1813/0x2730 [ 687.268050][T30204] ? check_preemption_disabled+0x47/0x280 [ 687.273771][T30204] ? copy_mount_string+0x30/0x30 [ 687.278712][T30204] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 687.284427][T30204] ? trace_kmalloc+0xcd/0x130 [ 687.289105][T30204] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 687.294647][T30204] ? copy_mount_options+0x5f/0x360 [ 687.299790][T30204] ? copy_mount_options+0x2c8/0x360 [ 687.304996][T30204] ksys_mount+0xcc/0x100 [ 687.309241][T30204] __x64_sys_mount+0xbf/0xd0 [ 687.313831][T30204] do_syscall_64+0xfe/0x140 [ 687.318333][T30204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 687.324220][T30204] RIP: 0033:0x45c21a [ 687.328114][T30204] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 687.347715][T30204] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 687.356121][T30204] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 687.364086][T30204] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 687.372052][T30204] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 687.380028][T30204] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 687.388004][T30204] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:41 executing program 1 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:41 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:41 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:41 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:41 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:41 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:41 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:41 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:41 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:41 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:41 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:41 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) [ 687.668478][T30219] FAULT_INJECTION: forcing a failure. [ 687.668478][T30219] name failslab, interval 1, probability 0, space 0, times 0 [ 687.723726][T30219] CPU: 1 PID: 30219 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 687.731754][T30219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 687.741814][T30219] Call Trace: [ 687.745111][T30219] dump_stack+0x1d8/0x2f8 [ 687.749445][T30219] should_fail+0x608/0x860 [ 687.753870][T30219] ? setup_fault_attr+0x2b0/0x2b0 [ 687.758897][T30219] ? vfs_parse_fs_string+0x171/0x280 [ 687.764201][T30219] __should_failslab+0x11a/0x160 [ 687.769144][T30219] ? vfs_parse_fs_string+0x171/0x280 [ 687.774426][T30219] should_failslab+0x9/0x20 [ 687.778928][T30219] __kmalloc_track_caller+0x79/0x310 [ 687.784217][T30219] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 687.789936][T30219] kmemdup_nul+0x2a/0xa0 [ 687.794182][T30219] vfs_parse_fs_string+0x171/0x280 [ 687.799326][T30219] ? logfc+0x710/0x710 [ 687.799342][T30219] ? alloc_fs_context+0x4ae/0x580 [ 687.799364][T30219] vfs_kern_mount+0x77/0x160 [ 687.799380][T30219] btrfs_mount+0x3f0/0x1a70 [ 687.808457][T30219] ? alloc_fs_context+0x49a/0x580 [ 687.817517][T30219] ? fs_context_for_mount+0x24/0x30 [ 687.827692][T30219] ? do_mount+0x1200/0x2730 [ 687.827701][T30219] ? ksys_mount+0xcc/0x100 [ 687.827709][T30219] ? __x64_sys_mount+0xbf/0xd0 [ 687.827720][T30219] ? do_syscall_64+0xfe/0x140 [ 687.827733][T30219] ? fs_parse+0x1bd/0x10a0 [ 687.827750][T30219] ? btrfs_resize_thread_pool+0x290/0x290 [ 687.827765][T30219] ? smack_fs_context_parse_param+0x16a/0x3b0 [ 687.862227][T30219] ? smack_fs_context_dup+0x2e0/0x2e0 [ 687.867607][T30219] ? check_preemption_disabled+0x47/0x280 [ 687.873345][T30219] ? vfs_parse_fs_string+0x1da/0x280 [ 687.878628][T30219] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 687.884345][T30219] ? trace_kfree+0xb2/0x110 [ 687.888849][T30219] ? vfs_parse_fs_string+0x1da/0x280 [ 687.894132][T30219] ? kfree+0x1d/0x120 [ 687.898113][T30219] ? vfs_parse_fs_string+0x1da/0x280 [ 687.903400][T30219] ? logfc+0x710/0x710 [ 687.907472][T30219] legacy_get_tree+0xf9/0x1a0 [ 687.912149][T30219] ? btrfs_resize_thread_pool+0x290/0x290 [ 687.917866][T30219] vfs_get_tree+0x8f/0x360 [ 687.922285][T30219] do_mount+0x1813/0x2730 [ 687.926619][T30219] ? check_preemption_disabled+0x47/0x280 [ 687.932344][T30219] ? copy_mount_string+0x30/0x30 [ 687.937286][T30219] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 687.943001][T30219] ? trace_kmalloc+0xcd/0x130 [ 687.947680][T30219] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 687.953304][T30219] ? copy_mount_options+0x5f/0x360 [ 687.958415][T30219] ? copy_mount_options+0x2c8/0x360 [ 687.963642][T30219] ksys_mount+0xcc/0x100 [ 687.967888][T30219] __x64_sys_mount+0xbf/0xd0 [ 687.972477][T30219] do_syscall_64+0xfe/0x140 [ 687.977076][T30219] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 687.982966][T30219] RIP: 0033:0x45c21a [ 687.986863][T30219] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 688.006470][T30219] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 688.014885][T30219] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 688.022856][T30219] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 688.030823][T30219] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 688.038788][T30219] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 688.046756][T30219] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:42 executing program 1 (fault-call:0 fault-nth:80): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:42 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:42 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:42 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:42 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:42 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:42 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:42 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:42 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 688.278870][T30242] FAULT_INJECTION: forcing a failure. [ 688.278870][T30242] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 688.369579][T30242] CPU: 0 PID: 30242 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 688.377608][T30242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.387665][T30242] Call Trace: [ 688.390967][T30242] dump_stack+0x1d8/0x2f8 [ 688.395307][T30242] should_fail+0x608/0x860 [ 688.399735][T30242] ? setup_fault_attr+0x2b0/0x2b0 [ 688.404861][T30242] should_fail_alloc_page+0x55/0x60 [ 688.410095][T30242] prepare_alloc_pages+0x283/0x460 [ 688.415208][T30242] __alloc_pages_nodemask+0x11c/0x790 [ 688.420585][T30242] ? rcu_lock_release+0x26/0x30 [ 688.425436][T30242] ? find_get_entry+0x6fa/0x7d0 [ 688.430283][T30242] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 688.435826][T30242] ? blkdev_get+0x863/0x9d0 [ 688.440333][T30242] ? bd_set_size+0xb0/0xb0 [ 688.444761][T30242] alloc_pages_current+0x2fb/0x540 [ 688.449968][T30242] __page_cache_alloc+0x70/0x1c0 [ 688.454919][T30242] do_read_cache_page+0x1f7/0xbd0 [ 688.459948][T30242] ? blkdev_writepage+0x30/0x30 [ 688.464811][T30242] read_cache_page_gfp+0x73/0x80 [ 688.469755][T30242] btrfs_scan_one_device+0x1c3/0x520 [ 688.475048][T30242] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 688.480336][T30242] ? btrfs_free_stale_devices+0x7f0/0x7f0 [ 688.486059][T30242] ? trace_hardirqs_on+0x74/0x80 [ 688.491006][T30242] btrfs_mount_root+0x548/0x1120 [ 688.495955][T30242] ? btrfs_control_open+0x40/0x40 [ 688.500988][T30242] ? vfs_parse_fs_string+0x1da/0x280 [ 688.506276][T30242] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 688.511994][T30242] ? trace_kfree+0xb2/0x110 [ 688.516502][T30242] ? vfs_parse_fs_string+0x1da/0x280 [ 688.521785][T30242] ? kfree+0x1d/0x120 [ 688.525771][T30242] ? vfs_parse_fs_string+0x1da/0x280 [ 688.531061][T30242] ? logfc+0x710/0x710 [ 688.535162][T30242] legacy_get_tree+0xf9/0x1a0 [ 688.539838][T30242] ? btrfs_control_open+0x40/0x40 [ 688.544868][T30242] vfs_get_tree+0x8f/0x360 [ 688.549288][T30242] vfs_kern_mount+0xc2/0x160 [ 688.553880][T30242] btrfs_mount+0x3f0/0x1a70 [ 688.558396][T30242] ? alloc_fs_context+0x49a/0x580 [ 688.563582][T30242] ? fs_context_for_mount+0x24/0x30 [ 688.568787][T30242] ? do_mount+0x1200/0x2730 [ 688.573291][T30242] ? ksys_mount+0xcc/0x100 [ 688.577790][T30242] ? __x64_sys_mount+0xbf/0xd0 [ 688.582555][T30242] ? do_syscall_64+0xfe/0x140 [ 688.588758][T30242] ? fs_parse+0x1bd/0x10a0 [ 688.593188][T30242] ? btrfs_resize_thread_pool+0x290/0x290 [ 688.598997][T30242] ? smack_fs_context_parse_param+0x16a/0x3b0 [ 688.605060][T30242] ? smack_fs_context_dup+0x2e0/0x2e0 [ 688.610437][T30242] ? check_preemption_disabled+0x47/0x280 [ 688.616161][T30242] ? vfs_parse_fs_string+0x1da/0x280 [ 688.621450][T30242] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 688.627177][T30242] ? trace_kfree+0xb2/0x110 [ 688.631680][T30242] ? vfs_parse_fs_string+0x1da/0x280 [ 688.636965][T30242] ? kfree+0x1d/0x120 [ 688.640970][T30242] ? vfs_parse_fs_string+0x1da/0x280 [ 688.646256][T30242] ? logfc+0x710/0x710 [ 688.650327][T30242] legacy_get_tree+0xf9/0x1a0 [ 688.655005][T30242] ? btrfs_resize_thread_pool+0x290/0x290 [ 688.660734][T30242] vfs_get_tree+0x8f/0x360 16:14:42 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 688.670977][T30242] do_mount+0x1813/0x2730 [ 688.678609][T30242] ? check_preemption_disabled+0x47/0x280 [ 688.684334][T30242] ? copy_mount_string+0x30/0x30 [ 688.689279][T30242] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 688.694994][T30242] ? trace_kmalloc+0xcd/0x130 [ 688.695023][T30242] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 688.695032][T30242] ? copy_mount_options+0x5f/0x360 [ 688.695045][T30242] ? copy_mount_options+0x2c8/0x360 [ 688.695056][T30242] ksys_mount+0xcc/0x100 [ 688.695068][T30242] __x64_sys_mount+0xbf/0xd0 [ 688.695085][T30242] do_syscall_64+0xfe/0x140 [ 688.705298][T30242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.705310][T30242] RIP: 0033:0x45c21a [ 688.705321][T30242] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 688.705327][T30242] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 688.705336][T30242] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 688.705343][T30242] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 688.705349][T30242] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 688.705354][T30242] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 688.705360][T30242] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:42 executing program 1 (fault-call:0 fault-nth:81): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:42 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:42 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:42 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:42 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:43 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:43 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:43 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:43 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:43 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 688.996573][T30268] FAULT_INJECTION: forcing a failure. [ 688.996573][T30268] name failslab, interval 1, probability 0, space 0, times 0 [ 689.077534][T30268] CPU: 0 PID: 30268 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 689.085556][T30268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.095613][T30268] Call Trace: [ 689.098915][T30268] dump_stack+0x1d8/0x2f8 [ 689.103255][T30268] should_fail+0x608/0x860 [ 689.107765][T30268] ? setup_fault_attr+0x2b0/0x2b0 [ 689.112802][T30268] __should_failslab+0x11a/0x160 [ 689.117741][T30268] ? getname_kernel+0x59/0x2f0 [ 689.122507][T30268] should_failslab+0x9/0x20 [ 689.127008][T30268] kmem_cache_alloc+0x56/0x2b0 [ 689.131768][T30268] ? btrfs_mount+0x3f0/0x1a70 [ 689.136446][T30268] ? legacy_get_tree+0xf9/0x1a0 [ 689.141297][T30268] getname_kernel+0x59/0x2f0 [ 689.145888][T30268] kern_path+0x1f/0x40 [ 689.149975][T30268] blkdev_get_by_path+0xb5/0x2d0 [ 689.154916][T30268] ? bd_may_claim+0xc0/0xc0 [ 689.159429][T30268] btrfs_scan_one_device+0x105/0x520 [ 689.164720][T30268] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 689.170002][T30268] ? btrfs_free_stale_devices+0x7f0/0x7f0 [ 689.170018][T30268] ? trace_hardirqs_on+0x74/0x80 [ 689.170035][T30268] btrfs_mount_root+0x548/0x1120 [ 689.170054][T30268] ? btrfs_control_open+0x40/0x40 [ 689.170072][T30268] ? vfs_parse_fs_string+0x1da/0x280 [ 689.195921][T30268] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 689.195934][T30268] ? trace_kfree+0xb2/0x110 [ 689.195946][T30268] ? vfs_parse_fs_string+0x1da/0x280 [ 689.195955][T30268] ? kfree+0x1d/0x120 [ 689.195970][T30268] ? vfs_parse_fs_string+0x1da/0x280 [ 689.206174][T30268] ? logfc+0x710/0x710 16:14:43 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 689.206189][T30268] legacy_get_tree+0xf9/0x1a0 [ 689.206200][T30268] ? btrfs_control_open+0x40/0x40 [ 689.206214][T30268] vfs_get_tree+0x8f/0x360 [ 689.215444][T30268] vfs_kern_mount+0xc2/0x160 [ 689.215457][T30268] btrfs_mount+0x3f0/0x1a70 [ 689.215470][T30268] ? alloc_fs_context+0x49a/0x580 [ 689.215480][T30268] ? fs_context_for_mount+0x24/0x30 [ 689.215488][T30268] ? do_mount+0x1200/0x2730 [ 689.215496][T30268] ? ksys_mount+0xcc/0x100 [ 689.215503][T30268] ? __x64_sys_mount+0xbf/0xd0 [ 689.215513][T30268] ? do_syscall_64+0xfe/0x140 [ 689.215526][T30268] ? fs_parse+0x1bd/0x10a0 [ 689.215541][T30268] ? btrfs_resize_thread_pool+0x290/0x290 [ 689.224863][T30268] ? smack_fs_context_parse_param+0x16a/0x3b0 [ 689.234521][T30268] ? smack_fs_context_dup+0x2e0/0x2e0 [ 689.234534][T30268] ? check_preemption_disabled+0x47/0x280 [ 689.234551][T30268] ? vfs_parse_fs_string+0x1da/0x280 [ 689.234563][T30268] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 689.234576][T30268] ? trace_kfree+0xb2/0x110 [ 689.243541][T30268] ? vfs_parse_fs_string+0x1da/0x280 [ 689.243550][T30268] ? kfree+0x1d/0x120 [ 689.243563][T30268] ? vfs_parse_fs_string+0x1da/0x280 [ 689.243576][T30268] ? logfc+0x710/0x710 [ 689.243588][T30268] legacy_get_tree+0xf9/0x1a0 [ 689.243599][T30268] ? btrfs_resize_thread_pool+0x290/0x290 [ 689.243611][T30268] vfs_get_tree+0x8f/0x360 [ 689.243624][T30268] do_mount+0x1813/0x2730 [ 689.243638][T30268] ? trace_hardirqs_off+0x46/0x80 [ 689.243646][T30268] ? copy_mount_string+0x30/0x30 [ 689.243656][T30268] ? retint_kernel+0x2b/0x2b [ 689.243668][T30268] ? copy_mount_options+0x238/0x360 [ 689.243676][T30268] ? copy_mount_options+0x21e/0x360 [ 689.243748][T30268] ? __sanitizer_cov_trace_const_cmp4+0x4/0x90 [ 689.243761][T30268] ? copy_mount_options+0x2c8/0x360 [ 689.253256][T30268] ksys_mount+0xcc/0x100 [ 689.281109][T30268] __x64_sys_mount+0xbf/0xd0 [ 689.281125][T30268] do_syscall_64+0xfe/0x140 [ 689.281142][T30268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.292892][T30268] RIP: 0033:0x45c21a [ 689.292903][T30268] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 689.292909][T30268] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 689.292919][T30268] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 689.292926][T30268] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 689.292932][T30268] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 689.292938][T30268] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 16:14:43 executing program 1 (fault-call:0 fault-nth:82): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:43 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:43 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:43 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:43 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 689.292943][T30268] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:43 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:43 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:43 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:43 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:43 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:43 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 689.682814][T30294] FAULT_INJECTION: forcing a failure. [ 689.682814][T30294] name failslab, interval 1, probability 0, space 0, times 0 [ 689.712754][T30294] CPU: 0 PID: 30294 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 689.720765][T30294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.730817][T30294] Call Trace: [ 689.734107][T30294] dump_stack+0x1d8/0x2f8 [ 689.738440][T30294] should_fail+0x608/0x860 [ 689.742857][T30294] ? setup_fault_attr+0x2b0/0x2b0 [ 689.747896][T30294] __should_failslab+0x11a/0x160 [ 689.752837][T30294] ? getname_kernel+0x59/0x2f0 [ 689.757600][T30294] should_failslab+0x9/0x20 [ 689.762195][T30294] kmem_cache_alloc+0x56/0x2b0 [ 689.766961][T30294] getname_kernel+0x59/0x2f0 [ 689.771551][T30294] kern_path+0x1f/0x40 [ 689.775624][T30294] blkdev_get_by_path+0xb5/0x2d0 [ 689.780562][T30294] ? bd_may_claim+0xc0/0xc0 [ 689.785073][T30294] ? __mutex_lock_common+0x56b/0x2fc0 [ 689.790523][T30294] btrfs_get_bdev_and_sb+0x48/0x280 [ 689.795745][T30294] open_fs_devices+0x1ee/0xbe0 [ 689.800516][T30294] ? list_sort+0x8ad/0x900 [ 689.804927][T30294] ? btrfs_open_devices+0x1b0/0x1b0 [ 689.810125][T30294] ? devid_cmp+0x90/0x90 [ 689.814377][T30294] btrfs_open_devices+0x11d/0x1b0 [ 689.819405][T30294] btrfs_mount_root+0x5c3/0x1120 [ 689.824353][T30294] ? btrfs_control_open+0x40/0x40 [ 689.829383][T30294] ? vfs_parse_fs_string+0x1da/0x280 [ 689.834670][T30294] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 689.840390][T30294] ? trace_kfree+0xb2/0x110 [ 689.844893][T30294] ? vfs_parse_fs_string+0x1da/0x280 [ 689.844912][T30294] ? kfree+0x1d/0x120 [ 689.844924][T30294] ? vfs_parse_fs_string+0x1da/0x280 [ 689.844936][T30294] ? logfc+0x710/0x710 [ 689.844948][T30294] legacy_get_tree+0xf9/0x1a0 [ 689.844958][T30294] ? btrfs_control_open+0x40/0x40 [ 689.844969][T30294] vfs_get_tree+0x8f/0x360 [ 689.844982][T30294] vfs_kern_mount+0xc2/0x160 [ 689.844993][T30294] btrfs_mount+0x3f0/0x1a70 [ 689.845005][T30294] ? alloc_fs_context+0x49a/0x580 [ 689.845015][T30294] ? fs_context_for_mount+0x24/0x30 [ 689.845027][T30294] ? do_mount+0x1200/0x2730 [ 689.896927][T30294] ? ksys_mount+0xcc/0x100 [ 689.905807][T30294] ? __x64_sys_mount+0xbf/0xd0 [ 689.905818][T30294] ? do_syscall_64+0xfe/0x140 [ 689.905831][T30294] ? fs_parse+0x1bd/0x10a0 [ 689.905846][T30294] ? btrfs_resize_thread_pool+0x290/0x290 [ 689.905858][T30294] ? smack_fs_context_parse_param+0x16a/0x3b0 [ 689.905869][T30294] ? smack_fs_context_dup+0x2e0/0x2e0 [ 689.905880][T30294] ? check_preemption_disabled+0x47/0x280 [ 689.905897][T30294] ? vfs_parse_fs_string+0x1da/0x280 [ 689.905913][T30294] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 689.931467][T30294] ? trace_kfree+0xb2/0x110 [ 689.931480][T30294] ? vfs_parse_fs_string+0x1da/0x280 [ 689.931489][T30294] ? kfree+0x1d/0x120 [ 689.931503][T30294] ? vfs_parse_fs_string+0x1da/0x280 [ 689.947905][T30294] ? logfc+0x710/0x710 [ 689.958111][T30294] legacy_get_tree+0xf9/0x1a0 16:14:44 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 689.967361][T30294] ? btrfs_resize_thread_pool+0x290/0x290 [ 689.976695][T30294] vfs_get_tree+0x8f/0x360 [ 689.987084][T30294] do_mount+0x1813/0x2730 [ 689.987096][T30294] ? check_preemption_disabled+0x47/0x280 [ 689.987110][T30294] ? copy_mount_string+0x30/0x30 [ 689.987120][T30294] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 689.987130][T30294] ? trace_kmalloc+0xcd/0x130 [ 689.987141][T30294] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 689.987148][T30294] ? copy_mount_options+0x5f/0x360 [ 689.987159][T30294] ? copy_mount_options+0x2c8/0x360 [ 689.987170][T30294] ksys_mount+0xcc/0x100 [ 689.987180][T30294] __x64_sys_mount+0xbf/0xd0 [ 689.987194][T30294] do_syscall_64+0xfe/0x140 [ 689.987208][T30294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.987217][T30294] RIP: 0033:0x45c21a [ 689.987227][T30294] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 689.987233][T30294] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 690.075368][T30294] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 690.075375][T30294] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 690.075381][T30294] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 690.075386][T30294] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 690.075392][T30294] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:44 executing program 1 (fault-call:0 fault-nth:83): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:44 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:44 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:44 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:44 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:44 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:44 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:44 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:44 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 690.278538][T30319] FAULT_INJECTION: forcing a failure. [ 690.278538][T30319] name failslab, interval 1, probability 0, space 0, times 0 [ 690.299383][T30319] CPU: 0 PID: 30319 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 690.307372][T30319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.317427][T30319] Call Trace: [ 690.320725][T30319] dump_stack+0x1d8/0x2f8 16:14:44 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 690.325055][T30319] should_fail+0x608/0x860 [ 690.325071][T30319] ? setup_fault_attr+0x2b0/0x2b0 [ 690.325094][T30319] __should_failslab+0x11a/0x160 [ 690.325108][T30319] should_failslab+0x9/0x20 [ 690.325119][T30319] kmem_cache_alloc_trace+0x5d/0x2c0 [ 690.325136][T30319] ? btrfs_mount_root+0x215/0x1120 [ 690.354358][T30319] btrfs_mount_root+0x215/0x1120 [ 690.359302][T30319] ? smack_fs_context_dup+0x2e0/0x2e0 [ 690.364674][T30319] ? btrfs_control_open+0x40/0x40 [ 690.364698][T30319] ? vfs_parse_fs_string+0x1da/0x280 [ 690.364711][T30319] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 690.364721][T30319] ? trace_kfree+0xb2/0x110 [ 690.364731][T30319] ? vfs_parse_fs_string+0x1da/0x280 [ 690.364739][T30319] ? kfree+0x1d/0x120 [ 690.364753][T30319] ? vfs_parse_fs_string+0x1da/0x280 [ 690.380738][T30319] ? logfc+0x710/0x710 [ 690.380753][T30319] legacy_get_tree+0xf9/0x1a0 [ 690.380764][T30319] ? btrfs_control_open+0x40/0x40 [ 690.380778][T30319] vfs_get_tree+0x8f/0x360 [ 690.403825][T30319] vfs_kern_mount+0xc2/0x160 [ 690.403840][T30319] btrfs_mount+0x3f0/0x1a70 16:14:44 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 690.403853][T30319] ? alloc_fs_context+0x49a/0x580 [ 690.403862][T30319] ? fs_context_for_mount+0x24/0x30 [ 690.403870][T30319] ? do_mount+0x1200/0x2730 [ 690.403877][T30319] ? ksys_mount+0xcc/0x100 [ 690.403884][T30319] ? __x64_sys_mount+0xbf/0xd0 [ 690.403894][T30319] ? do_syscall_64+0xfe/0x140 [ 690.403904][T30319] ? fs_parse+0x1bd/0x10a0 [ 690.403919][T30319] ? btrfs_resize_thread_pool+0x290/0x290 [ 690.403934][T30319] ? smack_fs_context_parse_param+0x16a/0x3b0 [ 690.432211][T30319] ? smack_fs_context_dup+0x2e0/0x2e0 16:14:44 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) [ 690.432226][T30319] ? check_preemption_disabled+0x47/0x280 [ 690.432245][T30319] ? vfs_parse_fs_string+0x1da/0x280 [ 690.432258][T30319] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 690.432272][T30319] ? trace_kfree+0xb2/0x110 [ 690.465946][T30319] ? vfs_parse_fs_string+0x1da/0x280 [ 690.465958][T30319] ? kfree+0x1d/0x120 [ 690.465969][T30319] ? vfs_parse_fs_string+0x1da/0x280 [ 690.465980][T30319] ? logfc+0x710/0x710 [ 690.465992][T30319] legacy_get_tree+0xf9/0x1a0 [ 690.466003][T30319] ? btrfs_resize_thread_pool+0x290/0x290 [ 690.466015][T30319] vfs_get_tree+0x8f/0x360 [ 690.466028][T30319] do_mount+0x1813/0x2730 [ 690.466044][T30319] ? check_preemption_disabled+0x47/0x280 [ 690.498634][T30319] ? copy_mount_string+0x30/0x30 [ 690.498649][T30319] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 690.498662][T30319] ? trace_kmalloc+0xcd/0x130 [ 690.527590][T30319] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 690.527601][T30319] ? copy_mount_options+0x5f/0x360 [ 690.527614][T30319] ? copy_mount_options+0x2c8/0x360 [ 690.527627][T30319] ksys_mount+0xcc/0x100 [ 690.536348][T30319] __x64_sys_mount+0xbf/0xd0 [ 690.557355][T30319] do_syscall_64+0xfe/0x140 [ 690.557374][T30319] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.557384][T30319] RIP: 0033:0x45c21a [ 690.557398][T30319] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 690.573193][T30319] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 690.573205][T30319] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 690.573211][T30319] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 690.573217][T30319] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 690.573224][T30319] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 690.573230][T30319] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:44 executing program 1 (fault-call:0 fault-nth:84): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:44 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:44 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:44 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:44 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:44 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:44 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:44 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:44 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:44 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:44 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:45 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 690.933313][T30344] FAULT_INJECTION: forcing a failure. [ 690.933313][T30344] name failslab, interval 1, probability 0, space 0, times 0 [ 690.988649][T30344] CPU: 0 PID: 30344 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 690.996675][T30344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.006735][T30344] Call Trace: [ 691.010033][T30344] dump_stack+0x1d8/0x2f8 [ 691.014368][T30344] should_fail+0x608/0x860 [ 691.018788][T30344] ? setup_fault_attr+0x2b0/0x2b0 [ 691.023827][T30344] __should_failslab+0x11a/0x160 [ 691.028772][T30344] should_failslab+0x9/0x20 [ 691.033276][T30344] kmem_cache_alloc_trace+0x5d/0x2c0 [ 691.038560][T30344] ? kobject_uevent_env+0x2cd/0x1260 [ 691.043849][T30344] ? dev_uevent_filter+0xb0/0xb0 [ 691.048787][T30344] kobject_uevent_env+0x2cd/0x1260 [ 691.053908][T30344] kobject_uevent+0x1f/0x30 [ 691.058413][T30344] __loop_clr_fd+0x544/0x8e0 [ 691.063013][T30344] lo_ioctl+0x11a7/0x2400 [ 691.067349][T30344] ? __read_once_size_nocheck+0x10/0x10 [ 691.072892][T30344] ? match_held_lock+0x280/0x280 [ 691.077831][T30344] ? lo_release+0x1f0/0x1f0 [ 691.082333][T30344] ? match_held_lock+0x280/0x280 [ 691.087273][T30344] ? __bfs+0x550/0x550 [ 691.091342][T30344] ? __bfs+0x550/0x550 [ 691.095415][T30344] ? trace_lock_acquire+0x190/0x190 [ 691.100607][T30344] ? __bfs+0x550/0x550 [ 691.104685][T30344] ? match_held_lock+0x280/0x280 [ 691.109637][T30344] ? match_held_lock+0x280/0x280 [ 691.114579][T30344] ? __lock_acquire+0xcf7/0x1a40 [ 691.119511][T30344] ? __bfs+0x550/0x550 [ 691.123590][T30344] ? __lock_acquire+0xcf7/0x1a40 [ 691.128538][T30344] ? __lock_acquire+0xcf7/0x1a40 [ 691.133492][T30344] ? trace_lock_acquire+0x190/0x190 [ 691.138707][T30344] ? __read_once_size_nocheck+0x10/0x10 [ 691.144252][T30344] ? unwind_next_frame+0x415/0x870 [ 691.149370][T30344] ? rcu_lock_release+0x9/0x30 [ 691.154145][T30344] ? stack_trace_save+0x1e0/0x1e0 [ 691.159170][T30344] ? rcu_lock_release+0x26/0x30 [ 691.164028][T30344] ? is_bpf_text_address+0x398/0x3b0 [ 691.169310][T30344] ? stack_trace_save+0x1e0/0x1e0 [ 691.174332][T30344] ? __kernel_text_address+0x9a/0x110 [ 691.179734][T30344] ? unwind_get_return_address+0x4c/0x90 [ 691.185364][T30344] ? arch_stack_walk+0x98/0xe0 [ 691.190135][T30344] ? stack_trace_save+0x111/0x1e0 [ 691.195165][T30344] ? lo_release+0x1f0/0x1f0 [ 691.199671][T30344] blkdev_ioctl+0x917/0x2c10 [ 691.204270][T30344] ? tomoyo_path_number_perm+0x587/0x740 [ 691.209901][T30344] ? trace_hardirqs_off+0x74/0x80 [ 691.214923][T30344] ? quarantine_put+0xb7/0x1f0 [ 691.219684][T30344] ? tomoyo_path_number_perm+0x587/0x740 [ 691.225323][T30344] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 691.230602][T30344] ? __kasan_slab_free+0x19d/0x1e0 [ 691.235724][T30344] ? __kasan_slab_free+0x12a/0x1e0 [ 691.240828][T30344] ? kasan_slab_free+0xe/0x10 [ 691.245502][T30344] ? kfree+0xae/0x120 [ 691.249481][T30344] ? tomoyo_path_number_perm+0x587/0x740 [ 691.255111][T30344] ? tomoyo_file_ioctl+0x23/0x30 [ 691.260048][T30344] ? security_file_ioctl+0x6d/0xd0 [ 691.265164][T30344] ? __x64_sys_ioctl+0xa3/0x120 [ 691.270006][T30344] ? do_syscall_64+0xfe/0x140 [ 691.274680][T30344] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.280755][T30344] ? kasan_check_write+0x14/0x20 [ 691.285699][T30344] ? do_raw_spin_lock+0x143/0x3a0 [ 691.290744][T30344] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 691.296561][T30344] ? rcu_lock_release+0x9/0x30 [ 691.301332][T30344] ? tomoyo_path_number_perm+0x5f0/0x740 [ 691.306965][T30344] ? trace_lock_acquire+0x190/0x190 [ 691.312170][T30344] ? tomoyo_check_path_acl+0x180/0x180 [ 691.317622][T30344] ? ksys_mount+0xea/0x100 [ 691.322039][T30344] block_ioctl+0xbd/0x100 [ 691.326371][T30344] ? blkdev_iopoll+0x100/0x100 [ 691.331135][T30344] do_vfs_ioctl+0x7d4/0x1890 [ 691.335732][T30344] ? ioctl_preallocate+0x240/0x240 [ 691.340857][T30344] ? fget_many+0x30/0x30 [ 691.345102][T30344] ? tomoyo_file_ioctl+0x23/0x30 [ 691.350036][T30344] ? security_file_ioctl+0xa1/0xd0 [ 691.355149][T30344] __x64_sys_ioctl+0xe3/0x120 [ 691.360521][T30344] do_syscall_64+0xfe/0x140 [ 691.365026][T30344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.370916][T30344] RIP: 0033:0x459637 [ 691.374811][T30344] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 691.394414][T30344] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 691.402825][T30344] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 0000000000459637 [ 691.410792][T30344] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 691.418760][T30344] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 691.426733][T30344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 691.434730][T30344] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 16:14:45 executing program 1 (fault-call:0 fault-nth:85): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0edfffffe0000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:14:45 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:45 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:45 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:45 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:45 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) 16:14:45 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x1, 0x5, 0x80000000, 0x5}, {0x200, 0x6, 0x6, 0x6}, {0x31}}) 16:14:45 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") dup2(r0, r1) 16:14:45 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 16:14:45 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 691.629026][T30368] FAULT_INJECTION: forcing a failure. [ 691.629026][T30368] name failslab, interval 1, probability 0, space 0, times 0 16:14:45 executing program 5: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) [ 691.707412][T30368] CPU: 0 PID: 30368 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 691.715429][T30368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.725482][T30368] Call Trace: [ 691.728780][T30368] dump_stack+0x1d8/0x2f8 [ 691.733113][T30368] should_fail+0x608/0x860 [ 691.737528][T30368] ? setup_fault_attr+0x2b0/0x2b0 [ 691.742558][T30368] __should_failslab+0x11a/0x160 [ 691.747497][T30368] ? bio_alloc_bioset+0x172/0x670 [ 691.752518][T30368] should_failslab+0x9/0x20 [ 691.757023][T30368] __kmalloc+0x7a/0x310 [ 691.761185][T30368] bio_alloc_bioset+0x172/0x670 [ 691.766046][T30368] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 691.771765][T30368] ? bio_chain_endio+0x110/0x110 [ 691.776702][T30368] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 691.776714][T30368] ? btrfs_alloc_device+0xc2/0x610 [ 691.776728][T30368] btrfs_alloc_device+0xee/0x610 [ 691.776741][T30368] ? kasan_check_read+0x11/0x20 [ 691.776752][T30368] ? btrfs_init_new_device+0x4290/0x4290 [ 691.776766][T30368] ? blkdev_put+0x2c8/0x3b0 [ 691.776780][T30368] close_fs_devices+0x503/0x9b0 [ 691.776801][T30368] btrfs_close_devices+0x33/0x130 [ 691.792362][T30368] btrfs_mount_root+0x969/0x1120 [ 691.792381][T30368] ? btrfs_control_open+0x40/0x40 [ 691.802845][T30368] ? vfs_parse_fs_string+0x1da/0x280 [ 691.802859][T30368] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 691.802869][T30368] ? trace_kfree+0xb2/0x110 [ 691.802880][T30368] ? vfs_parse_fs_string+0x1da/0x280 [ 691.802889][T30368] ? kfree+0x1d/0x120 [ 691.802902][T30368] ? vfs_parse_fs_string+0x1da/0x280 [ 691.802914][T30368] ? logfc+0x710/0x710 [ 691.802927][T30368] legacy_get_tree+0xf9/0x1a0 [ 691.812257][T30368] ? btrfs_control_open+0x40/0x40 [ 691.812272][T30368] vfs_get_tree+0x8f/0x360 [ 691.812289][T30368] vfs_kern_mount+0xc2/0x160 [ 691.812300][T30368] btrfs_mount+0x3f0/0x1a70 [ 691.812315][T30368] ? alloc_fs_context+0x49a/0x580 [ 691.822238][T30368] ? fs_context_for_mount+0x24/0x30 [ 691.822247][T30368] ? do_mount+0x1200/0x2730 [ 691.822255][T30368] ? ksys_mount+0xcc/0x100 [ 691.822264][T30368] ? __x64_sys_mount+0xbf/0xd0 [ 691.822275][T30368] ? do_syscall_64+0xfe/0x140 [ 691.822293][T30368] ? fs_parse+0x1bd/0x10a0 [ 691.832566][T30368] ? btrfs_resize_thread_pool+0x290/0x290 [ 691.832583][T30368] ? smack_fs_context_parse_param+0x16a/0x3b0 [ 691.832595][T30368] ? smack_fs_context_dup+0x2e0/0x2e0 [ 691.832607][T30368] ? check_preemption_disabled+0x47/0x280 [ 691.832625][T30368] ? vfs_parse_fs_string+0x1da/0x280 [ 691.832637][T30368] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 691.832647][T30368] ? trace_kfree+0xb2/0x110 [ 691.832657][T30368] ? vfs_parse_fs_string+0x1da/0x280 [ 691.832665][T30368] ? kfree+0x1d/0x120 [ 691.832675][T30368] ? vfs_parse_fs_string+0x1da/0x280 [ 691.832695][T30368] ? logfc+0x710/0x710 [ 691.832708][T30368] legacy_get_tree+0xf9/0x1a0 [ 691.970140][T30368] ? btrfs_resize_thread_pool+0x290/0x290 [ 691.970157][T30368] vfs_get_tree+0x8f/0x360 [ 691.970171][T30368] do_mount+0x1813/0x2730 [ 691.970183][T30368] ? check_preemption_disabled+0x47/0x280 [ 691.970201][T30368] ? copy_mount_string+0x30/0x30 [ 691.978920][T30368] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 691.978932][T30368] ? trace_kmalloc+0xcd/0x130 [ 691.978945][T30368] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 691.978954][T30368] ? copy_mount_options+0x5f/0x360 [ 691.978966][T30368] ? copy_mount_options+0x2c8/0x360 [ 691.978979][T30368] ksys_mount+0xcc/0x100 [ 692.034400][T30368] __x64_sys_mount+0xbf/0xd0 [ 692.038994][T30368] do_syscall_64+0xfe/0x140 [ 692.043535][T30368] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.049429][T30368] RIP: 0033:0x45c21a [ 692.053320][T30368] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 692.072933][T30368] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 692.081344][T30368] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 692.089314][T30368] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 692.097282][T30368] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 16:14:45 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00\x01\xa1\x1a\xb0\xc8\xa9\xf3%\'I2\x0e\x9b\x1d\xcc\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 692.105251][T30368] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 692.113219][T30368] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 692.139494][T30368] ------------[ cut here ]------------ [ 692.144990][T30368] kernel BUG at fs/btrfs/volumes.c:1270! [ 692.163116][T30368] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 692.169204][T30368] CPU: 0 PID: 30368 Comm: syz-executor.1 Not tainted 5.2.0-rc7+ #13 [ 692.177172][T30368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.187239][T30368] RIP: 0010:close_fs_devices+0x99d/0x9b0 [ 692.192866][T30368] Code: d7 f2 fe 48 8b 5d b0 e9 66 ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 7c 83 48 89 df e8 8d d7 f2 fe e9 76 ff ff ff e8 c3 ad b9 fe <0f> 0b e8 bc ad b9 fe 0f 0b 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 [ 692.212562][T30368] RSP: 0018:ffff8880936af648 EFLAGS: 00010246 [ 692.218628][T30368] RAX: ffffffff82bc042d RBX: ffff88808da76128 RCX: 0000000000040000 [ 692.226591][T30368] RDX: ffffc90007fee000 RSI: 000000000003ffff RDI: 0000000000040000 [ 692.234555][T30368] RBP: ffff8880936af6e0 R08: ffff8880984aaf00 R09: fffffbfff1178ed9 [ 692.242515][T30368] R10: fffffbfff1178ed9 R11: 1ffffffff1178ed8 R12: ffff88808da76040 [ 692.250481][T30368] R13: ffff88808da76130 R14: ffff8880a08e5180 R15: ffff88808f515b38 [ 692.258446][T30368] FS: 00007f6e067e7700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 692.267368][T30368] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 692.273941][T30368] CR2: 0000000000758080 CR3: 000000009911a000 CR4: 00000000001406f0 [ 692.281908][T30368] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 692.289877][T30368] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 692.297841][T30368] Call Trace: [ 692.301144][T30368] btrfs_close_devices+0x33/0x130 [ 692.306168][T30368] btrfs_mount_root+0x969/0x1120 [ 692.311107][T30368] ? btrfs_control_open+0x40/0x40 [ 692.316135][T30368] ? vfs_parse_fs_string+0x1da/0x280 [ 692.321417][T30368] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 692.327134][T30368] ? trace_kfree+0xb2/0x110 [ 692.331637][T30368] ? vfs_parse_fs_string+0x1da/0x280 [ 692.336922][T30368] ? kfree+0x1d/0x120 [ 692.340902][T30368] ? vfs_parse_fs_string+0x1da/0x280 [ 692.346184][T30368] ? logfc+0x710/0x710 [ 692.350249][T30368] legacy_get_tree+0xf9/0x1a0 [ 692.354921][T30368] ? btrfs_control_open+0x40/0x40 [ 692.359941][T30368] vfs_get_tree+0x8f/0x360 [ 692.364360][T30368] vfs_kern_mount+0xc2/0x160 [ 692.368951][T30368] btrfs_mount+0x3f0/0x1a70 [ 692.373455][T30368] ? alloc_fs_context+0x49a/0x580 [ 692.378471][T30368] ? fs_context_for_mount+0x24/0x30 [ 692.383665][T30368] ? do_mount+0x1200/0x2730 [ 692.388192][T30368] ? ksys_mount+0xcc/0x100 [ 692.392600][T30368] ? __x64_sys_mount+0xbf/0xd0 [ 692.397355][T30368] ? do_syscall_64+0xfe/0x140 [ 692.402017][T30368] ? fs_parse+0x1bd/0x10a0 [ 692.406422][T30368] ? btrfs_resize_thread_pool+0x290/0x290 [ 692.412147][T30368] ? smack_fs_context_parse_param+0x16a/0x3b0 [ 692.418201][T30368] ? smack_fs_context_dup+0x2e0/0x2e0 [ 692.423561][T30368] ? check_preemption_disabled+0x47/0x280 [ 692.429267][T30368] ? vfs_parse_fs_string+0x1da/0x280 [ 692.434538][T30368] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 692.440238][T30368] ? trace_kfree+0xb2/0x110 [ 692.444726][T30368] ? vfs_parse_fs_string+0x1da/0x280 [ 692.449989][T30368] ? kfree+0x1d/0x120 [ 692.453954][T30368] ? vfs_parse_fs_string+0x1da/0x280 [ 692.459233][T30368] ? logfc+0x710/0x710 [ 692.463302][T30368] legacy_get_tree+0xf9/0x1a0 [ 692.467965][T30368] ? btrfs_resize_thread_pool+0x290/0x290 [ 692.473669][T30368] vfs_get_tree+0x8f/0x360 [ 692.478072][T30368] do_mount+0x1813/0x2730 [ 692.482383][T30368] ? check_preemption_disabled+0x47/0x280 [ 692.488173][T30368] ? copy_mount_string+0x30/0x30 [ 692.493096][T30368] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 692.498807][T30368] ? trace_kmalloc+0xcd/0x130 [ 692.503471][T30368] ? kmem_cache_alloc_trace+0x222/0x2c0 [ 692.508998][T30368] ? copy_mount_options+0x5f/0x360 [ 692.514099][T30368] ? copy_mount_options+0x2c8/0x360 [ 692.519284][T30368] ksys_mount+0xcc/0x100 [ 692.523512][T30368] __x64_sys_mount+0xbf/0xd0 [ 692.528091][T30368] do_syscall_64+0xfe/0x140 [ 692.532604][T30368] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.538481][T30368] RIP: 0033:0x45c21a [ 692.542361][T30368] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 692.562217][T30368] RSP: 002b:00007f6e067e6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 692.570622][T30368] RAX: ffffffffffffffda RBX: 00007f6e067e6b40 RCX: 000000000045c21a [ 692.578596][T30368] RDX: 00007f6e067e6ae0 RSI: 0000000020000100 RDI: 00007f6e067e6b00 [ 692.588065][T30368] RBP: 0000000000000001 R08: 00007f6e067e6b40 R09: 00007f6e067e6ae0 [ 692.596017][T30368] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 692.603975][T30368] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 692.611941][T30368] Modules linked in: [ 692.620570][T30368] ---[ end trace 7c0aee230551065e ]--- [ 692.623435][ T3879] kobject: 'loop1' (000000003d460465): kobject_uevent_env [ 692.631925][T30368] RIP: 0010:close_fs_devices+0x99d/0x9b0 [ 692.636082][ T3879] kobject: 'loop1' (000000003d460465): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 692.644811][T30368] Code: d7 f2 fe 48 8b 5d b0 e9 66 ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 7c 83 48 89 df e8 8d d7 f2 fe e9 76 ff ff ff e8 c3 ad b9 fe <0f> 0b e8 bc ad b9 fe 0f 0b 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 [ 692.652285][ T3879] kobject: 'loop4' (0000000081195849): kobject_uevent_env [ 692.669158][T30368] RSP: 0018:ffff8880936af648 EFLAGS: 00010246 [ 692.678112][ T3879] kobject: 'loop4' (0000000081195849): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 692.682134][T30368] RAX: ffffffff82bc042d RBX: ffff88808da76128 RCX: 0000000000040000 [ 692.700544][T30368] RDX: ffffc90007fee000 RSI: 000000000003ffff RDI: 0000000000040000 [ 692.709043][T30368] RBP: ffff8880936af6e0 R08: ffff8880984aaf00 R09: fffffbfff1178ed9 [ 692.717788][T30368] R10: fffffbfff1178ed9 R11: 1ffffffff1178ed8 R12: ffff88808da76040 [ 692.726013][T30368] R13: ffff88808da76130 R14: ffff8880a08e5180 R15: ffff88808f515b38 [ 692.734272][T30368] FS: 00007f6e067e7700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 692.743668][T30368] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 692.750501][T30368] CR2: 000000000070e158 CR3: 000000009911a000 CR4: 00000000001406e0 [ 692.758614][T30368] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 692.766921][T30368] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 692.774981][T30368] Kernel panic - not syncing: Fatal exception [ 692.782136][T30368] Kernel Offset: disabled [ 692.786453][T30368] Rebooting in 86400 seconds..