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", &(0x7f0000000140)="983027fb361086936cc5913bd031a86050d5938155af55b2b097ebd3360a394196ab2721105dd2635d9fce702166845a07767bc425fabbfcc87c18913944fd05f8982113c509d2de972aab73009f557ceabce9e71a83084024767525d47c551d7c6ceb75e16b85730a2412e5ac4f29c4366c87c3d3b4da9e04ccc7b6f524139f6d34be3ffab891319a795cd7363ccfa2591529bb9dbfc4ab5af9d7eb34467834b7cef504507e7e0f01ac6e90e9d40823971cc46ed8cd319f65dcea7dd20db9f2d916675394e1a8409a5fc42d0e0115db742e561c665687298b775b45fbcab313f24ab4a040", 0x2}, 0x20) semctl$GETPID(r2, 0x0, 0xb, &(0x7f0000000500)=""/110) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) 19:35:23 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:23 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x400, 0x40000) setsockopt$inet_buf(r2, 0x0, 0x2d, &(0x7f0000000480)="0b773a5b03c6410e8c726fcc6a78bccf08d9a0e9ea43344a11c0a4fcdf433b5e4890a13e0e9e3b4bf3a01d5c533faceb8877a9261724c9f387cb51200b7f256ab781a91adc5372b045d1567e40203cce2c719eae44df2f7f11f9b49448aa42ca65bf70300e775da28ab240ba90fe85c3d3be399bdddd256996adf5c7423d01cd87c15ab0af98e2a0621263da166df51fbd632a5629ecdef97cb3c11d41b7", 0x9e) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000780)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x4c, r3, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2b0d}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) connect$l2tp(r1, &(0x7f0000000400)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) r4 = syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x0, 0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x101000, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='fd\x00') r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r6 = semget$private(0x0, 0xfefaa0f5b3d2c861, 0x0) semctl$SEM_INFO(r6, 0x3, 0x13, &(0x7f0000000540)=""/189) ioctl$sock_rose_SIOCADDRT(r2, 0x890b, &(0x7f0000000600)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3596, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={'rose', 0x0}, 0x3, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r5, 0x40505331, 0x0) r7 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0x81, 0x101000) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000880)='IPVS\x00') bind$vsock_stream(r4, &(0x7f00000003c0)={0x28, 0x0, 0x2710}, 0x10) sendmsg$IPVS_CMD_ZERO(r7, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xc8, r8, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x40}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'yam0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x40}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lapb0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r7, 0xc0305302, &(0x7f0000000080)={0x0, 0x20, 0x94, 0x741, 0x80, 0x8}) 19:35:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 19:35:23 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r2, 0xc0305710, &(0x7f0000000040)={0x1, 0x5, 0x8, 0x4}) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f00000001c0)=""/4096) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000180)=r1) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f00000000c0)) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)=r2) 19:35:23 executing program 1: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x0) sync_file_range(r0, 0x6, 0x8, 0x6) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xd1ee0000000000, 0x8180) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000040)) [ 780.624477][ T1912] block nbd1: Receive control failed (result -22) 19:35:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 780.712609][T31218] block nbd1: shutting down sockets 19:35:24 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) r2 = openat(r1, &(0x7f00000001c0)='./file0\x00', 0x2a00, 0x81) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000200)={0x7b, 0x0, [0x5, 0x2, 0xfffffffffffffffc, 0x4]}) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x280000, 0x0) setsockopt$inet6_dccp_int(r3, 0x21, 0x6, &(0x7f0000000040)=0x6, 0x4) r4 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000180)=r1) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101900) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, &(0x7f00000002c0)={{0x32, @multicast1, 0x4e24, 0x3, 'dh\x00', 0x6, 0x4, 0x2d}, {@rand_addr=0x20, 0x4e20, 0x10000, 0x5c, 0x120, 0x100000000}}, 0x44) 19:35:24 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x408800, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000240)=r2, 0x4) recvfrom(r1, &(0x7f0000000080)=""/213, 0xd5, 0x121, &(0x7f0000000180)=@un=@file={0x1, './file0\x00'}, 0x80) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:24 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000100)='asymmetric\x00', &(0x7f0000000000)=@chain={'key_or_keyring:', r0, ':chain\x00'}) keyctl$invalidate(0x15, r0) keyctl$link(0x8, r0, r0) 19:35:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000240), 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x408000, 0x0) 19:35:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 19:35:24 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x7, 0x4, 0x5}, @ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x280040) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) timer_create(0x6, &(0x7f0000000300)={0x0, 0x41, 0x4}, &(0x7f0000000340)=0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) timer_settime(r3, 0x1, &(0x7f00000003c0)={{r4, r5+30000000}}, &(0x7f0000000400)) write$FUSE_ENTRY(r0, &(0x7f0000000240)={0x90, 0xffffffffffffffda, 0x4, {0x3, 0x3, 0x0, 0xad5c, 0x5, 0x3, {0x4, 0xa674, 0x1, 0x7, 0x10001, 0xffffffffffff7fff, 0x9, 0x0, 0x75, 0x3, 0x10000, r1, r2, 0x7f8, 0x1f}}}, 0x90) listxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)=""/213, 0xd5) 19:35:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:24 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000180)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x80000001) 19:35:24 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000006c0)='./file0\x00', 0x0, 0x800010, &(0x7f0000000640)=ANY=[]) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x48, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000000580), 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005f42dd751c6974f6d04070044bdc225291e080fcabb855e95df18737a4a28b48a740b203a1859e12183e605d9f0af0e36ef62fdadf79a0f79dbde27301e4e0c9c59f6397b21f29d9d7432304670110b541aaa3a7e80c5c62207c3d58785ecfc9a4e13d1c5828e49c2b9accf5576f5ce90dd55308b30e226b47b7b5d"], 0x38) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') getpeername$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0}, &(0x7f0000000740)=0x14) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000540)=0x1, 0x4) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f0000000780)=0xe8) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000a40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6040}, 0xc, &(0x7f00000007c0)={&(0x7f00000009c0)={0x68, r2, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @dev={0xac, 0x14, 0x14, 0x26}}, @FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr="4f5429a9884aadc61e14da335dc6e557"}, @FOU_ATTR_PEER_V4={0x8, 0x8, @broadcast}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @local}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0x2}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000011}, 0x4) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f0000000500)={'U-', 0x8000}, 0x28, 0x3) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) setsockopt$inet_dccp_int(r0, 0x21, 0x10, &(0x7f0000000440)=0x81, 0x4) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000400)={0x81}) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000e40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000840)}}], 0x2, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x4b47, 0x0) r6 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$netrom_NETROM_N2(r6, 0x103, 0x3, &(0x7f0000000240)=0x3, &(0x7f0000000300)=0x4) chdir(&(0x7f0000000680)='./file0\x00') 19:35:24 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x33d, 0x41) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000080)={{0xb69d, 0x4}, {0x96b, 0xffffffffffffffff}, 0x5, 0x2, 0x1}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x40201, 0x0) sendto$llc(r1, &(0x7f0000000480)="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", 0x1000, 0x4000, &(0x7f0000000140)={0x1a, 0x5, 0x1, 0x7fffffff, 0xfff, 0xfffffffffffffffa, @local}, 0x10) bind$alg(r0, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-neon\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="99cec7bbed887f1449c73a553fec94248c32e27d04000000288a", 0x1a) socketpair(0x11, 0x1, 0x100000001, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$llc_int(r2, 0x10c, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x344) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x500, 0x0, 0x0) 19:35:24 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, 0x0) ioctl$sock_proto_private(r2, 0x89ec, &(0x7f0000000080)="fbcdd7a1de2791450f851776ac80d0f05a2cdaf2b89aaa65f10c30907bd637e4eac9cc43dc437341b362055e9c2674fdccbfd2665938f9edce2387f635040ae191764bf562502ac87d810195b73e8ab6f31a9b560ad8b2eebc576503e8c5297ac636d8b93ca482b2635f7fc9e7ec9c03e71854a266f039c6bbb3936caf1187a904abeaad409d5d3af7ec7eb471b71a76aa7fa4050bd534698b90e713bf4f8462c7fa4a159f4823b8d7428601a21b7d0e7ef62f0c90f667ed") 19:35:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 19:35:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:24 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) inotify_init() r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x8200) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0286404, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0, 0xc0, &(0x7f0000ffe000/0x1000)=nil, 0x9}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000180)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') 19:35:24 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) accept(r1, 0x0, &(0x7f0000000700)) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000480)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0xffff, 0x5, &(0x7f0000000300)=[{&(0x7f00000000c0)="3110772b2622c60b8eae55b05b0cfdf1e14a06827ce0b1460d22f67aa89eea8e44a70bef6f743c7e8cc51af6a0820385b17cae9577d123b31317149c7e4afd0a1e8227bf25555814759d51d05a1f60c2a8e141", 0x53, 0x200}, {&(0x7f0000000140)="48d2eb9dae900ef38f0770ce357ac5cc9dd0a2d6cf3406a42bf8a10e0d92938e04f775e093b1bb14b6b4e94c606f53d91be26a2311bac7a6d17c162ac40ff536a6bcd43da8fe9be0d17a91a4a9368a36717a409f064698edb3687c2803a028f37bb15fc295b17e989afb7ca3f199039fe2d56a89267812d392", 0x79, 0x2}, {&(0x7f00000001c0)="1d2e9794cfcab5447d755811885b571c1f66e25994f4ea829812d2eb01c8520742b1c4d0c4b766850113e84276fc3ed60c93a50234635d13c4b1cf31890bc0af6e7c96f66e6f29f4f6851f112cacb1ae1d9fafeb9e93d4d60033f5", 0x5b, 0x3}, {&(0x7f0000000240)="399a8c21", 0x4, 0x40}, {&(0x7f0000000280)="d6f2211871870177d69b921ec49c3cddf11f8ddc52f0dd0f2e41a41074269683ae316f848c5e77b87d388d54810e4607477d07d095cd5d57171c75da3b070f6de682b070ad6b529a3c47faf8d177e6ff59ebd3c54febad7f407be10737f5a0700ddd", 0x62, 0x6}], 0x20, &(0x7f0000000600)=ANY=[@ANYBLOB="636865636b3d7374726963742c686964652c6e6f726f636b2c756e686964095081d86869e8f81a5ac1711e80652c6e6f636f6d70726573732c696f636861727365743d6b6f69382d", @ANYRESDEC=r2, @ANYBLOB=',rootcontext=unconfined_u,fsname=:em1em0,seclabel,fscontext=system_u,defcontext=staff_u,fowner<', @ANYRESDEC=r3, @ANYBLOB=',rootcontext=unconfined_u,\x00']) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 19:35:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 19:35:25 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f00000000c0)=0xae96) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x24, &(0x7f0000000740)=0x200, 0x4) ioctl$int_out(r1, 0x5460, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps\x00') sendfile(r2, r3, 0x0, 0x80000001) bind$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x3a4, &(0x7f0000000180)}, 0x2000) 19:35:25 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000180)=r1) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000100)=@req3={0x5e600000, 0x401, 0x4a, 0x4, 0x3, 0x8e, 0xffffffffffff0000}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x101, 0x181000) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f0000000040)={0x2, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) [ 781.961858][T31812] Unknown ioctl -1073462520 19:35:25 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x2) r1 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000180)={@mcast1}, &(0x7f00000001c0)=0x14) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000080)={'icmp6\x00'}, &(0x7f0000000100)=0x1e) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000280)={'irlan0\x00', {0x2, 0x4e24, @empty}}) write$9p(r0, 0x0, 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000000)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) sendfile(r0, r2, 0x0, 0x10000) 19:35:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 19:35:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 19:35:25 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = dup(r0) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:25 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000100)={0x7, 0x322, &(0x7f0000000080)="255c430b2c0358dc27c9bb40c1dacdc3ccf38cea871b3d65df15efd187320041ddc135054e9a7ef24177753247a11bed75d711475067bc44f84afd5a94b841cb9faef1e64c31d232625102b34dbc49fc4a7f22b1a920cc72b97942618b93e02cbbee1ebe3a0e9da6", &(0x7f00000001c0)="ec3e039c6b40da507a99dab08b05199d4a205db1b646876eafd333bf17f8df02e27b4f058004ab604d9b08d6d80f4f2efc533ce7335cfca119598ad6725d200d72aff90df0ccfce72fbd17b8212c1a5a283e6d1e969fa2ca", 0x68, 0x58}) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000180)=r1) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x484020) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) r2 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0xffffffffffffff23, 0x0) getsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000300)=""/38, &(0x7f00000002c0)=0x26) [ 782.254059][T31812] Unknown ioctl -1073462520 19:35:25 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, r1}, 0x10) rt_sigaction(0x2f, &(0x7f0000000240)={&(0x7f00000001c0)="f20f5f61002667410f0f848d01000000a4660f78c0fe00c4437915d4003e43a5660f3a0b3248c4228501a575000000c4227925fec461d5ea89e700000045d86200", {0x4}, 0x10000000, &(0x7f0000000080)="c461f8296bd1f365654581675700800000c4027917d7c4837905c7fe660f73dc3ac4a2faf7d6440fae5b998f897c81dfc401f5f9a9710000002e26360faef0"}, &(0x7f0000000300)={&(0x7f0000000280)="c4c13dd300c4c179117500f0806566a1c401791310437978660fe494b6000800002e42839a000000000b2e6566410f50faf3430f1be6660f2da7410f0000", {}, 0x0, &(0x7f00000002c0)="c402b5aa6e0066450f3a0ff3d2660f6eea262ef34a0faeef46d9f6c46291aab7122bfe2bc401f5fd1a0f38020f67262e0fefe60f1a572a"}, 0x8, &(0x7f0000000340)) 19:35:25 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) r2 = dup(r0) setsockopt$inet_tcp_int(r2, 0x6, 0x25, &(0x7f0000000000)=0x20, 0x4) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 19:35:25 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000180)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) 19:35:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 782.476031][ T26] kauditd_printk_skb: 6 callbacks suppressed [ 782.476044][ T26] audit: type=1800 audit(1566934525.666:329): pid=31991 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16965 res=0 19:35:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x14, 0x4000040000002, 0x7701, 0x1}, 0x14}}, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/mixer\x00', 0x182, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000040)={{0x1, 0x3, 0xff, 0x2}, 0x4271, 0x4}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x3c, &(0x7f0000000100)=[@in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e22, 0xde34, @mcast2}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYBLOB="a6000000a5c7439eb2605d533f5160caf8c23b9b7d6741ba2e970fb96470891671b50ccbdb6062f718d447636f7bf5ea34c7585bc0be1ec434a78b94a72231fdf49c87030d10ad6d3b17acae7b6e2b8053ef53fffa0fa67be13873505bd1b0330300000000000000c4b2180101c262f2cd8861aa2ddf6d7898d730ece49e2a70aa1d8161c2be466acaa49fd0f97616519b2e18f0f82abd8e5ae058c92a8f0411e24c7a4d6411d3b2"], &(0x7f0000000440)=0xae) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000240)={r2, 0x7b, "eadf95dc6ac34c497aff3255266450304f82ad325c01e42054be06c1a4101253db5f92020787403b5ac68e50cac2bfe08f597b3da00494eb387dc502d3faf3486e603937823eca2feb7d0dc042ddf26a4561fd394f5b4b781ab2b11fc6a8ade49ba945521809dbf928a4a96ccd07b011538ceae55787ef214e501b"}, &(0x7f00000001c0)=0x83) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000300), &(0x7f0000000340)=0x4) [ 782.529639][ T26] audit: type=1804 audit(1566934525.705:330): pid=31991 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir374301028/syzkaller.FOJC6V/1108/file0" dev="sda1" ino=16965 res=1 19:35:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_DIRENT(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0036b60719d9e8e142b4d8b43d87ab873fef309848bd3f325c76849c2ecdb7597d245d224a07c5b1c7f1194ff29daf2b2bbdbd73a51d7944c28a1932842a76bd9ebe34e1466f1a13ae1c9a646257bca6ac443148cb05708c63edd683ce0441027c5edb34f17fa1ddb7d6c6f5ecc739"], 0x1) io_setup(0x2, &(0x7f0000000180)=0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x400000, 0x0) io_cancel(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x8, 0x1, r1, &(0x7f00000001c0)="78e4e3b4ca160bfef49bafbbe6a791121d752018509a0671e98b0cc072193e7c9ed90678bc3aa16da463549106b60066bd37b4a0b250a491d6f5c67ce7833f44c68223a7abf3e9280781d12f9b29fb8d054fcc85d27a13071654ea783e1fc8d3c12de908be84c7136ac3e3a38066bfde952dcff4e701188640ce8bf2edafcb655e0bae3ecb9d9d70a87ef0a134bdb8553427d97b99a0a8de079e64b779570f21df010faa46801b96307c", 0xaa, 0x90f, 0x0, 0x3, r3}, &(0x7f0000000340)) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000080)=0xc2, 0x4) recvmsg(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x2) readv(r1, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/163, 0xa3}], 0x1) dup3(r1, r0, 0x0) 19:35:25 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000000)={@host}) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000180)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) 19:35:25 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x81, 0x0) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0xffffffffffffff63) close(r1) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000140)={0x6, &(0x7f0000000100)=[{0x7, 0x11580f8b, 0x6, 0x8}, {0x7ff, 0x6, 0x7, 0x5}, {0x1, 0x4, 0x0, 0x100}, {0xb1, 0x6, 0x10001}, {0x1, 0x4, 0xfff, 0xf60}, {0x100, 0x2ba, 0xfffffffffffffffa, 0x7}]}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x101400, 0x0) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000080)=0x1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 19:35:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 19:35:26 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1f, 0x4000) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f00000000c0)={0x3, r1}) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0xaf01, 0x0) r3 = eventfd2(0x2, 0x2) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000180)=r3) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000200)={0xa, 0x1, 0x100000000, 0x3}, 0xa) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000100), &(0x7f00000001c0)=0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000080)) 19:35:26 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x400443c9, &(0x7f0000000280)={0xfffffd48, 0x0}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x10000, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) r3 = fcntl$getown(r1, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r1, 0x0, 0x6, &(0x7f0000000200)='wlan1\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r3, r2, 0x0, 0xe, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', r4}, 0x30) r5 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x101000) fcntl$addseals(r1, 0x409, 0x47e7968e11c9d2e4) sendmsg$nl_generic(r5, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80102000}, 0xc, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"/445], 0x16c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) 19:35:26 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200000, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000080)=0x3) 19:35:26 executing program 1: r0 = socket$packet(0x11, 0xa, 0x300) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getuid() mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x40000, &(0x7f00000001c0)={'trans=unix,', {[{@dfltgid={'dfltgid', 0x3d, r1}}, {@msize={'msize', 0x3d, 0x80000001}}], [{@obj_type={'obj_type', 0x3d, 'wlan1em0keyring'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '-'}}, {@euid_gt={'euid>', r2}}]}}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='\x00', 0x0, 0x8}, 0x10) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x10802, 0x0) ioctl$KDMKTONE(r3, 0x4b30, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff01c}, {0x80000006}]}, 0x10) 19:35:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 19:35:26 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x0, 0x4, 0x1, {0xa, 0x4e24, 0x3f1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}}}, 0x32) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) getpeername(r0, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000180)=0x80) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000000)={0x2}) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:26 executing program 0: ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xff, 0x101000) bind$rds(r0, &(0x7f0000000080)={0x2, 0x4e24, @empty}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000000c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) setreuid(r1, r2) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000040)={0x100000001, 0x2, 0x9, 0x80, 0xe, 0x100000000}) 19:35:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 19:35:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80441) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'batadv0\x00', 0x2}, 0x18) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f00000000c0)={0x1, 0x0, 0x100, 0x2, {0x1, 0x321, 0x4, 0x7}}) close(r2) 19:35:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600), 0x0, 0x10000}], 0x0, 0x0) 19:35:26 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000180)=r1) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x80000000, 0x20000) write$P9_RWRITE(r2, &(0x7f0000000040)={0xb, 0x77, 0x2, 0x1}, 0xb) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f00000001c0)={0x0, @bt={0x7fffffff, 0xba9, 0x0, 0xd4eebf5d891d82c9, 0xc9f, 0x4b006c6d, 0x3, 0x3, 0x401, 0x70, 0x1000, 0x9, 0x400000000000, 0x2, 0x14, 0x1}}) 19:35:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000000)="11dca50d6c0bcfe47bf070") socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x418000, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000500)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}, &(0x7f0000000540)=0x10) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000080)=0x1c, 0x4) dup3(r1, r2, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x8188aea6, &(0x7f0000000100)={"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"}) dup2(r3, r0) 19:35:26 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r2 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x8, 0x200000) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r2, 0x810c5701, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000001c0)='em0\x00', 0xffffffffffffffff}, 0x30) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000240)={[], 0x3, 0x66, 0x8000, 0xf525, 0x5, r3}) 19:35:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="2c75bec0debc3577f8a3d704fe3eba80c13f092c93344e073aa67f16ae6a739f8b97668bb4b1aa354d94ee62c3924c07d3bbceac11f4865c57b5947a667187ca52a1b58c4b077c4fd308faae3c33cd7ad14ffd139078740a8d3b72799d7bec00be", 0x61}, {&(0x7f0000000080)="3f3b6ebc0f54f93cf8ece70d7bf1128575a9", 0x12}, {&(0x7f0000000140)="78bb2243c463390a5662935ea9f892bc5a", 0x11}, {&(0x7f0000000180)="acbaa7b7c3e9c85f389b5d0c7449263c527da575861732ae2a76a5d5f8125da2c8ca2dd1ac373e9a804296204d0931be656f04cc57c3253a231f850ee62ea5bf045cceee07f53d969b337da26489ffab950b4cecea5db0aff630bce8663e", 0x5e}, {&(0x7f0000000200)="9b6ddc6fc36cfec7897f445d880afe8e99627e40f61dd52cc1d1d655d8260b70b39233a788c5d732a7adb5176babc52b28c23f46071d965617f287a0665eacdc3a67878dafedcb823d9c23fc6054c0cf418ad271583f5490", 0x58}, {&(0x7f0000000280)="156deaae8e4b0363f2499393e96c33c92a181b8d3e4278c1516b94440d8601b095b9645844d0cd5f2f450edb33d42af63391e002bfcf7143de44c8d9758b76905d11755191f2a7cc4c9aa45ee78be73d77f9b623adc04c312536e8f8a73abe9d01e84e559f51b2094056388dbc1d313baf99429e04fe8af88c1c70f7cea5e4ce748c8b927a12ea326e37cb3f1609b3c3", 0x90}, {&(0x7f0000000340)="0dedc2187fa6871ab5d9990109628ea22377e6419e0a2dfa8af1ca7c7a4a93285c098ca6871a6456008e84f3c8cca309964e90d919a4867e8d9f54006e68f66762c20e2080ff5499ec9362f1f8382427b0995bd77e825199f8c138c730be658745780658", 0x64}, {&(0x7f00000003c0)="82b0cfdf17e6e9346bca7ba18e97c73e022ef6ca1104291b8ed1bbf0787822b3284fc96164d6a12e165a47bf04b7ca7efec89214c0a730ab68cecbe45b64c6bbf9c0866822bee49654724ec6a22d118b56bd60d1e32b24d778e7d95c454881d8e5abdb365ef0372536eaf127919c2f39c7606cb1c7f9107b85c941a00f1d4f539674fc782c8535ec922e85117a7b0a11921a3d66b65c8997d050f6b31d409402957537a8c50ef624db10c79479dc686fe6525137", 0xb4}], 0x8, &(0x7f0000000500)=[{0x1010, 0x10d, 0x7, "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"}, {0x1010, 0x84, 0x8f, "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"}, {0x30, 0x109, 0x9591, "157a3878478cccfdcfad5210e9b95521f62f98f372f42c43bcdf608cf6"}, {0x38, 0x1, 0x80000001, "258dce383d229d77377ba41d0ee2f5a187f72ff319feb79701f9be1def5f808bda"}, {0xb8, 0x29, 0x8, "aadcb6bdf08dbfb4f82d96acd8dafa77e46d21ae3341809d8550a4957cbf625a0248ed307002e68f62295533df7c0f5cb92253002f9fc3d0819d3de3b47ac6bee7def941031c671a093bf37be3de9a9ddf4955619829972a404b139bae36635732a5d80d165826ca2b43685dd23d1048719a0e908e6857ae560a64bb566be1ae2d17be07aa2f331d9d9fb456311849f305ac6fc2ec601dcac31f107a0dc2e457ef85"}, {0x1010, 0x10c, 0x101, "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"}], 0x3150}}, {{&(0x7f0000003680)=@rc={0x1f, {0x2, 0x8, 0x95e1, 0x4, 0x6, 0x8}, 0x4}, 0x80, &(0x7f0000003980)=[{&(0x7f0000003700)}, {&(0x7f0000003740)="97db3f89a343f48ae3ddedcdf3f29f6a195532050f0726b25abdec57fd4684d988ff67e8f0a7929237669da3c263a3bf3aa5fff9d4e4ff7049254bd6af915e4f31b251560eaa9327ac669a5b989b4a63dc9c48b3e6db998c11639af05db0973c958da6045cfcf1b655ea9a08c2c789b817f600f75d17e62c9058a9c154d06c49", 0x80}, {&(0x7f00000037c0)="823b8eec6a270f8e48cc5d0f328133969a930de54e628204aa85b352e06126b90b451abf4195a73efef9c2e307a31d63e1bf6db283947dcc4a92e89d89c0cefe41b7c962e2090824d963e513353baa9383c6343b03a14aabfd9207f357f5663bc9ad403b4946073cb3747e3d49eb0856d56f3a306db0f675ce886af61b544573b94a13490ed3a76ab97dee4d5da286e963654c988083188b215bec4de4ca5fc3225595a0cafd448545d93cabb4b8927542a6a28f5aa842e1380573dfa202a804b33767a87c2bd33d65dae0a7816527c83c3985347833842a998d788e2f22ac8da2f637c26fdf96ff56aeb5582f380bd9", 0xf0}, {&(0x7f00000038c0)="c59c1ebd6cdf2c48a6e0cd4846a2b2da869bf6d3cfbbcaffbc8aaf2ee4f90dfc5e29426b2a4d93389cc1b98a30ec4d1de6ffbd2748e58c019dfd68518787209984975a50439db613eddd5a1c46bafa0427127609f339623b4ffc9a362ad6fbe45f9e79a40a5b5cd2a9dca2fbdcfe5b3b0bcab274", 0x74}, {&(0x7f0000003940)="35d4a1cd7c854a7be668796d2a7064d452792dde0ce4a3dcd4b40e81f1413c407a0cedb33043eeba8b7f2f", 0x2b}], 0x5, &(0x7f0000003a00)=[{0x28, 0x0, 0xde, "420c72418d00f5fb721571dd52d67c4b57fa3bec02"}, {0x1010, 0x10f, 0x7fffffff, "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"}, {0x88, 0x105, 0x6, "1a65bf858201551c2fc1d60ba82a3aa39177f9491efcfd24aa9095d5000a83d3bdc02aa4fa6762ec9fda8bbc2ab6fe82f2c19fefa7f7ca7b9682c60c2535a7cd6fae2e067b7f22ba3eec32c7725400d1939cbd6a48de02e1560a8be0e484c3ebe3ca13446c120b18a4bf68641ef76f0b29"}, {0xd0, 0x11d, 0x100000001, "4795f14d74574a3b206011984b51d4ca8c72d0ba97f8ef347b05e91add59fb2c271c1ddc5e81d4c6d4898a1037ce638874db62bcea20db433382d4f8efa3b6fe97a1b9fd6c437d10938800c1dd710256b6a08d88264bacb3a55dab3200832e59f906826a93d4d0de86cdb4dfc217fbd24da863f3204b785547effb3ff6e21470f838b72e3137f745d81f3a84669ca6492422a6f085a3cc873c7a2ad22e3927f6168829bd04962fcc06ac4f6f21e0ae477143a6d718a2383086e57f5ca321"}, {0x20, 0x112, 0xd8, "743b64e9135217dfb357"}, {0x10, 0x10f, 0x400}, {0xf8, 0x119, 0x100, "bf9abcb5a0c514c6875899a5d97f876557bae09a5aac4750ecfb038a36f6d31e49336b7f8bc677cff11306136b146b1dcbaa259fde8b23fbbb829f23478988d572f60981acd20fd0f12b161af59224503fa5050e22bdea909472d83834a72e93b2f6420f2148701c01a5136698b1236003d2771dd2acbc263b7c3b376f01e986db5673f72423a94373e412bfb622610be32c458fc464cd6d5b0c5b005ce23ac2a666119e21d81d1ced522a25a86eddf41fb01c209fff16a5f6eb3c24ed1794ce705f17b9c77678ba7370534f7e6d2363b9d9aa60314489b27ae40e45657679150406"}], 0x12b8}}, {{&(0x7f0000004cc0)=@nfc_llcp={0x27, 0x0, 0x2, 0x7, 0x4, 0x637778dd, "b08e71db8cb71d88e8f28c77959bc6387483d5f02c520008c51e61f013e49799dc9e08f0dba2fb55b28c55e45658a027593526fdf88e86352653584f931d7a", 0x3e}, 0x80, &(0x7f0000005380)=[{&(0x7f0000004d40)="da8e4597b5d9e3369828260d37e4b9a3c3fc7d2de686b62e9ecf3cfdeb3f70795dc9c3e090060d4f1a6ab1d4d283719b1dc8f19d392ff7f6133327a47dee70f534ccf3504bc660504394937cf6ea95f36313", 0x52}, {&(0x7f0000004dc0)="a8cf17f77bdb9f16bc969f55b5552070bed5eabe6ea2b80266f4e08d8e22f5b5b7327e1287d1a0bcf17aa2609ae720707f3ddd0328205df3f018999bc15c039231166d045abebabd681144fcd40781af50d1aaae92d573ee91fb714f97f394a88e238fbe7d38b2da11f4d2936b5cdfc7169b99914e4c54ee9fdbe6b67c747fe6c67cc844f538384c04e14db705d381db222f31286c10b3bc019148406cf33e38e97d68cd0fed3e4fade15a422a769a926259dab08fc5210b9f2e1d087b545a5d3d317cdb72a7ad728e9e9a3e1da8c57ed381b9b8d5c60f1b", 0xd8}, {&(0x7f0000004ec0)="f8e88f3aaf82191462867f1cf29d2e973bfc541599f4b196195bbcaf7aefe57977e19f02213df2766a3826b8cd36909a0285d1dcdd6d1ba8502b230a32c8b2d8ae77fec63c7263e9515720c61905386cfd603bdf1cf1336db58289ba279848ed9a84be9164e3634f9cba4b8168d71c5d285f262971ed3e716e603cf87d64cf23e31ead249d9ca3fccf5601b2670e411791ee970a3a9e7a5fb3ac95cc814a700c8b5ae2d59a3a87efe90fbc6fb8a7788646e7c0fe3260ab8a0eaa6bb24e510ad440c8bceb9c579f8a0f57828275a9e98c968bf15fbbd72258d4f8ac84", 0xdc}, {&(0x7f0000004fc0)="128f2cda040c6dee11f83977b7ad8235c9e4", 0x12}, {&(0x7f0000005000)="2f4e6a837de337c60f63a28231d8fa47cd6eaf23b40e875265ff8bcb7d1f42c561ad7aa89b98acd37441314b11dbac73d652197d143f849c43db42c008bc7855db04738a9f91465d9c86da53977fb3b862939bb9788c280e4aa3410fa271578ecc49c17e54022cf24a8ba15535effe740e13e747a1dd2706a9978d7dba8dd50958c434a6e33036426cfdca80711bacffd2410536ec49ff53b4130425d9383e1de37387626a720f03185cefcfa6b3e44cc16d1d8de7844d51befbedd0a7737b5255d7178a170a6caf60d0401347a3eb522f48ceafe4cc6528", 0xd8}, {&(0x7f0000005100)="06a8474a6c3c6e014d1de4ca7113701b39248a2099eedf66e1d50cab8695fe21a57dec0ca21ba7077f60448d65568868ec4559c0d69fab17af79b61b84caf1b05a880559d569fd9fd790c5c24454f648cb37705e7baedf1648b789d7fc80569c737688753ed52f2dca0cd9608f3c71f94a3b5d16d6930c814efc473eb9ec3b2018714044318be44c548e3e9c4442bd7f3af831ac0610", 0x96}, {&(0x7f00000051c0)="04d31f1e907822dc5289059868c0aa01a35d8da1f68e11055e5990f6474a3b9edf0ae804", 0x24}, {&(0x7f0000005200)="cc0643f8896cede955610f54321b67ecb29cd7fe7a90475cd8b98b38290950c9ed30e193013ef5dbd20f703f74ea06e988556604df36b827b445638bd4867c2e69736ecc5d406eb93c0f21c4e28deb837925566ce808df6ad1a41e97327f5488ac28bb945a38683f198e6ad92cd0060aad005fc1a6dca296f18f1cb4460dcf0fafd40657f2374a352559e4696ad6d5c5f02344f0f52d0987", 0x98}, {&(0x7f00000052c0)="4737ee3e83de5628cf1a52d137ea40630de0", 0x12}, {&(0x7f0000005300)="2ba0508d82acc441250383910d11713ade8b2c354624fd90ff32340e4e1d8ebe52f16b88129f3a07016316910143ce88fd5a3af70eb38a8df9bdb1a69360c1c434b7fefddbeb823dbe4028fad07d384e19c2d6af6bfbbad4db2f2568858b5350304cb9fb5b1c08a761", 0x69}], 0xa, &(0x7f0000005440)=[{0x68, 0x101, 0x401, "c5b0dbe57d83b4aaa6fedc2f55a214253d7cb03676e80b7884a3162b705da46a5f0be47ca5f8d251fd9f85206d9e9e45a4a6860f7479f591105cb26374505b8f41d544b422b08f6f242e600d0856c755f6"}], 0x68}}, {{&(0x7f00000054c0)=@nl=@unspec, 0x80, &(0x7f0000005900)=[{&(0x7f0000005540)="207bb2167ef42daefbfccc14174ee25652bf58873a06f91af1bf0d85c96cdc6e386db02c642e56a593f9835aa70977a76976c2bef9b8b30df7ebe9a3df6d37e617acf3a929b444a16a91e9e8967a5d80384b03d4f13cad09b54eb8d940cde846574a41f20f3f1298c7255ae5f88c99c06db8b5a5edc9d3448294ad27e9fc353abd2d3dd30a184d4998a0b7374177838a77d8ad43787d09d0226edf54c0ab6bc17091ea873f695d36a07ece605b56986fc0d1", 0xb2}, {&(0x7f0000005600)="2375c984fa040dfbd787f888e1c8be63bf27e0da3dd86c761c7de2fda621b7a7df093e15cc801ef56b1e03e37da9da8c879b05b5da4290e1e244ad33b1de0497b868fb607cdd2c00585c550ff40e464ba2280596dd50a69e11462d18255be8cfa6a9731187d1539146b856c51f1c99f5f442093bb6a29b704de501c4a555b90cce00fac42b2b03af2fb69f63fdd1fb2738d24178d118baaae91a3846d953cf4bbfa5d4bd1fd7f6b7a52a31868f3e3b1f", 0xb0}, {&(0x7f00000056c0)="ee1fb88eae05be", 0x7}, {&(0x7f0000005700)="406efb97ee41aa0e5c48237b6af0e93dd2087725b413a89075f9b95227d58b4aafea984b3e50cd29aec9a87c560fb6ad1ed240097c3b0430bdfce37ffe5c2cf9a38ac2476bc04c", 0x47}, {&(0x7f0000005780)="2fe453f2aab7e0ae003e1c327b2b8e64cfc0", 0x12}, {&(0x7f00000057c0)="86bcb341a17d6708d50e56a5c5363fb9ad111d717bba39647e520b71459b6abcded9c6e233e97d90d37918ed587069a1997ca3555d6944e1de0091d7a75738856596236c881fd93c0dc65c1e22b45c588882ff532eb18defb77fa3a48ee63d7632bdbbdf999ac918b02f972c80a9986538f5b1494da344aee6dbbb72d45e17ac6b5399511d5e701d34684079829b3bb3f9efd2c4796ea0d08934ef459afc7cf1df177941184152c6fca482fb8a74f7793c74a49c513c823a2e6904529b23d367abfbccc02a32acff92345467f1393f817ef3d99eddeca9e1b611444406fc8e5aba82100eee133289bd0afdc9ccc655a76debb3c9d5df32", 0xf7}, {&(0x7f00000058c0)="789ec9a4c0ab605ccd77d3839fc72852786104fac96d", 0x16}], 0x7, &(0x7f0000005980)=[{0xe0, 0x107, 0x1, "294fae1867f08a9a7b4cdda843d213b7dd070cfca76618303f6989fc5f34d56e85c8303b9b0f2dc6cb27ee3ee5ebfb685e9fdf1a4d24f9e29369f91715793d789c05b2027a3f29df5c6dc75a70d5750fc291c9bb200c49437a9f50a35a40117a712edd49443c8d6ab24804c18b12db13ce2a6e0bbbb29f3b7a23f54e6edb0651bfafb4600fe2bf786dec7f27a1ddc635fdf0c19b0e780c6d83217d09689714cfe08c389dcff680739c4b00ad66321933093a87d139a72204926caa7d174dde3e82298018d54d3f9943b1aac8b9ad"}, {0xb8, 0x10d, 0x6, "376ff50151424cb80388d8529ce8dbe64ab8168a4142f03af409ba8dfe7e68d4f22ce72b303d220bcb88da85141c1ff2130adeb83fb789b5cc2438065c3739319316b6510e653fb592b53a3405a03129609cffb5bb7d7263b9c17873e71b49106be3fea219cd49bbbc749d9766d700659a60fb72ce256c1f02afdbbf5f1497b1a59995d245ac7b47baab2d4ea894e6ef7d2cf830241d732e69eadacf77c5e792ea"}, {0x80, 0x107, 0x1, "07afd3a1de1e285b535f0215caf929051c073ce20e35ee2afbdc37a74581541b3a66f459c958a5084d3a2d3900c3957978f27192803fcd17e0fae78821a5ed9220e7f325d2f93f63038adfe657c660dabddd7a08a712b907e48234fda8f262e6ea2962351236ba79c2bcfd"}, {0x28, 0x101, 0x3, "8d7838873a51b9ab4642d518dd2139f94a"}, {0x1010, 0x191509d90dbc64d5, 0x2, "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"}], 0x1250}}, {{&(0x7f0000006c00)=@nfc, 0x80, &(0x7f0000008000)=[{&(0x7f0000006c80)="af71ec6bd23d06aee947187086a4d23ce0b7a07787d543a33019588ec9b8041c8d0ddfdce5194d2e3f1a6843042575f2f84e7371780ad47c65994bd3a542d2836a01ad4c570f255f84897d7e740623dfbe60cdfd16ac9c76fa9a08fd8cd52a36d55dbbd31e27dea5d5afe759d91d80add76029393b22675671448c199b74a83ae75d1fc07bad0366f5f17c95", 0x8c}, {&(0x7f0000006d40)="5138ac0949b104e49cf467ca73f17adb6d48499505c3ece23c5f75b86e9d8cce63d696b741e6e0b045aa1562d07726fb999a54fb01f5af747d44e453ff5f79200a", 0x41}, {&(0x7f0000006dc0)="7a48960f82e9f9692e1ddbb092bcb62802902ad7480a3542eb312fa39559f019bb", 0x21}, {&(0x7f0000006e00)="fed5abb5a33ce087ae01bcd4741ba1ee8f1193bd967342a436e9651c23ad02766cb6b0a16357a9e67a9f7bde3ceceec7f8afc02ac412c63d99fd0440d5c01b35a637dd94caf4fbe41fe9a7793f02082a4e06ca75901f", 0x56}, {&(0x7f0000006e80)="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", 0x1000}, {&(0x7f0000007e80)="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", 0xfa}, {&(0x7f0000007f80)="cf4c1874b46d931136a2514775d47acbf27e84448e867d2028f8718aec6c7478e96cdaa6f9b673c961b503b97da80d54dbe0d5d9c677ac7687e6dff2cdf23b67081fc880817f0ac378f7e5c0ffdb7fc464af85086867ec7cd3", 0x59}], 0x7, &(0x7f0000008080)}}, {{&(0x7f00000080c0)=@nl=@kern={0x10, 0x0, 0x0, 0x100000}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008140)="0960c6", 0x3}, {&(0x7f0000008180)="0be14c803bbd85f89014e4e25026e6484986abab8cc919f8dbb31583d4f5869c52e4c0cf5c3cf6f1add2d2e6691f61eb9f5e093124388903e0366fa6242f1209f79339b68c0d92125816c4ecd19d28fbd2fee2582e42fb317cc363d8d841f11646bfc251d6c4f013b8494776a7b4ed537596f02b13", 0x75}, {&(0x7f0000008200)="8d37dfb572d1d9d966a766bc7d865531786494534b74a3ea4dd0653a592795f9e8426084e32f9e7182d60a28c334d6a64aeb9c01a99536429cbba5b48f8bc814c48ed4278d01abe97f484c01be5a8b6b69930474055e3359da82a6274ec240111582042d5ee0e8b24e0b495efa96bc789bf18022969a137acc961d5fdd807cc205a7d6dfc4818be61250e14d0d877ac56a927bb3bcd14985297a94a7fad5d4285850c222d8b39dd58765aac7557161a17afb8772a9abd4f16e8b5aab600fcaca423e94c90f27d7beb4177ab5453953bbc510338580cf1d1dac90200d17", 0xdd}], 0x3}}], 0x6, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x14, &(0x7f0000000100)={@mcast1, r1}, 0x14) 19:35:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 19:35:26 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f00000002c0)=[{{}, 0x11, 0x5}], 0x18) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000040)=""/182) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000100)) 19:35:26 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000040)=0x1c) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000000c0)=0x1000, 0x4) r2 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000180)=r2) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) 19:35:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600), 0x0, 0x10000}], 0x0, 0x0) 19:35:26 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x800, 0x0) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, 0x0) chdir(&(0x7f0000000080)='./file0\x00') 19:35:26 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0xfff) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c005ff5cfecee312e01a7b2971663b0a09e596a1cd5cbd27d4269dbfc8591c6593ac330d361b535d278a9b8a5c2b3f8cedf1fc99f368b2e78f5310891dcfcffffffffffffff9ea64d02dd0b02017f39e86657556441476369fa7893e0030dea217b25d75dc9cc75c7a77d5db995bc0c1e5861d2af035089d193d16a0b6f8e45be14a2a36b07fae22d9f476ab0edff5efccbb9f4073eee8fcb487f6c3a7a57d9045b6900000000000000"]) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f00000002c0)) 19:35:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x0) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f00000000c0)) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000d00306000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 19:35:26 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) syz_emit_ethernet(0xf0, &(0x7f0000000080)={@broadcast, @remote, [{[{0x9100, 0xffffffffb5498dd2, 0x2, 0x4}], {0x8100, 0x3, 0x9, 0x4}}], {@llc={0x4, {@llc={0x1808b2e506e0ae8d, 0xe, "03e4", "d1e9bd6c7fc602fe6106e39097e1e3edb370881d9865039cbb89fbc2c27d0943039f306f5e40ae177e76fbb91a993979971ec595e7c3b272172483607ded9d6c0abac6807102d58a019e00f08db891ad6fbf5b374a1aafb5b6e1ad1c55e206aa51b9de030162a53644970b0da420e395876f0002d6b4052e5cbb3e119c7047b038f063c52e2c569f33a1673fc4d7438d1af6fe1a3d3b2ae926fe6d86bc5d35a0087a37645621aee357ee35d8f48e4ecd22327e21dcda0b5eb1339d1d97806501cc4be0c8709ee5ef4ff0b7081511393fe2ade482f451"}}}}}, &(0x7f0000000000)={0x0, 0x2, [0x8f9, 0x77, 0x726, 0x6dd]}) 19:35:26 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000040)={0x32, @rand_addr=0x43000000, 0x4e21, 0x3, 'nq\x00', 0x17, 0x7fff, 0x5e}, 0x2c) r3 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x3) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000001c0)) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000180)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) 19:35:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 19:35:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600), 0x0, 0x10000}], 0x0, 0x0) 19:35:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3c0000001000010600"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000000012000c000100626f6e64000000000c070000000000"], 0x3c}}, 0x0) 19:35:27 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001200)='/proc/capi/capi20\x00', 0x523080, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000001240)=@default) r1 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 19:35:27 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getegid() r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40000, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000080)=0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000240)={0x1, 0x2, 0x4, 0x7fff, 0x4, 0x9, 0x6, 0xffff, 0x5, 0x7, 0x6, 0x9}) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x100, 0x0) kcmp(r3, r3, 0x6, r1, r1) timerfd_gettime(r2, &(0x7f0000000100)) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f0000000180)={0x6, 0x100, {0x51, 0x2, 0x5, {0xd7e5, 0x5}, {0x5, 0x7}, @period={0x5d, 0x240f, 0x4e, 0xffffffff, 0x8000, {0x1ff8, 0x20, 0x10001, 0xe3eb}, 0xa, &(0x7f0000000140)=[0x0, 0x8, 0x7, 0x6, 0xffffffffffff0000, 0x200, 0x8, 0xf023, 0xff, 0x782a169d]}}, {0x57, 0xfff, 0x7, {0x1, 0x6}, {0x1, 0x9}, @cond=[{0x1, 0x1, 0x7, 0x4, 0x7, 0x3}, {0x3, 0x29762024, 0x200, 0xff, 0x80000000, 0x4}]}}) 19:35:27 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x8) r2 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000180)=r2) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200000, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) [ 783.937160][ T390] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 783.947871][ T390] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 19:35:27 executing program 1: pipe(&(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r2, 0x11, 0x200001000000067, &(0x7f0000000280)=0x802, 0x4) bind$inet(r1, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) splice(r0, 0x0, r1, 0x0, 0xfffd, 0x0) 19:35:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 19:35:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 19:35:27 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000280)='/dev/snd/controlC#\x00', 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@ng={0x4, 0xb, "8ff09a31c81cc571dbebe645b5b744b3e4afef"}, 0x15, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:35:27 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0xc1) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f0000000140)={0x1, 0x0, 0x2080, {0x0, 0x6000, 0x1}, [], "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", "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"}) timer_create(0x5, &(0x7f00000021c0)={0x0, 0x4b4, 0x4, @tid=0xffffffffffffffff}, &(0x7f0000002200)=0x0) timer_delete(r3) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) socket$can_raw(0x1d, 0x3, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000080)={0x4, 0x1, 'client0\x00', 0xffffffff80000006, "12545d61c17e547b", "7445124f51ff7dd5e6b7ea24116456d202e9499d996d59a49a2d4ec7af15df2e", 0x200, 0x4}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000400)={0x2fc, r4, 0x508, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xce}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10a3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xe0c2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x25a340cf}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1ff}]}, @TIPC_NLA_LINK={0xbc, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x27e}]}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf1e}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER={0x110, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'erspan0\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'caif0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x320, @remote, 0x8b}}}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_LINK={0x20, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x4001}, 0x8850) splice(r3, 0x0, r1, 0x0, 0x32bde62c, 0x0) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12}, &(0x7f00009b1ffc)) fcntl$setpipe(r2, 0x408, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xb, 0x2010, r1, 0x0) tkill(r5, 0x1000000000013) 19:35:27 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000180)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) 19:35:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 19:35:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003c80)={&(0x7f0000003ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x19a3812c7cb981d0}]}}, &(0x7f0000003b80)=""/229, 0x2a, 0xe5, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x0}, {}]}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f00000001c0)={r1, 0x1, &(0x7f00000000c0)=[0x8], &(0x7f0000000100)=[0xf9], 0x20, 0x3, 0x50607f81, &(0x7f0000000140)=[0x9, 0x5f2d, 0x1], &(0x7f0000000180)}) 19:35:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 19:35:27 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x4000) r2 = syz_open_dev$swradio(0x0, 0x0, 0x2) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000140)=0x8) open(&(0x7f0000000280)='./bus\x00', 0x141040, 0x100000000) ftruncate(0xffffffffffffffff, 0x87ffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000180)={0x8, 0x1, 0x101}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socket$xdp(0x2c, 0x3, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$VIDIOC_QUERYSTD(r2, 0x8008563f, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0xf6ffffff, 0x0, 0xffffffeb) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x3ba, 0x20}, &(0x7f0000000100)=0xc) 19:35:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 19:35:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="283cb40000800000001800110000000000000000010400000000950000000000"], &(0x7f0000000080)='L\x00\x00\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xfffffffffffffffc}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$key(0xf, 0x3, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)='L\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000200)=r2) fadvise64(r0, 0x0, 0x94c5, 0x1) 19:35:27 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = open(&(0x7f0000000000)='./file0\x00', 0x400001, 0x10) ioctl$TIOCGPKT(r2, 0x80045438, &(0x7f0000000080)) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r2, 0x89e8) 19:35:27 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x9, 0x220400) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) r1 = fsopen(&(0x7f0000000340)='mqueue\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x5989f00efb878d78, 0x0) sendto$x25(r2, &(0x7f0000000040)="ace931c05c1493dfe5684c186f73d0dabab929512b41ebca3d092577dbbb05a5bbfd7b53f4b19d66dec23cf853a01cdf670b7ac9ae272714daa63128622ed65a68675c286c92297ce22b", 0x4a, 0x20004880, &(0x7f00000000c0)={0x9, @remote={[], 0x0}}, 0x12) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x6, 0x0, 0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) fsmount(r1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)={{0x107, 0x8, 0x6, 0x3b7, 0x1c3, 0x7, 0x98, 0x400}, "f70b489bc89d629829846246e7318e69fe15e46b866023da945838a7c070b6c1ad024eed8421eb8728094256e337d77ec3a76ee76b6adc598bdf4821281101035065376bb2cb1f0f0eb0552f3cbee1e719dd5a171230dfa94d7bafe1b58d0c55b1e664d7a9eaea7fdc89aef791ec08bc30e4cdf91857fdfe9b17088b44fd887acb755276b51f798a209098c2915790e3cba3704ec65c45024d492065e67a5a4837c81982073c163a1dc120c530579af62bb216", [[], [], [], [], []]}, 0x5d3) 19:35:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 19:35:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x21ff, 0x800) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0xfffffffffffffffa, 0xfffffffffffffff8, 0x9, 0x1}]}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="2400000031001d0100000004fbdbdf2502000500000000000c0001000000c1bbb8e1e867b039b65c33034ce169103907d7ae2a421d4d8116d50555f37f723eab7fa27e3b02c4a961517240b264849fd12a8d70d029fe2f066925e4a4336c342d407fca1d4d4697694bc40e5884c6b67ef7dd7c9f4d4714bb21c98905fd2944c13f26c224292df7f4f9a27b8f44edaba757c032e8fd1524e26f6e7273180e5ac0f3ac300c470eba1bf8febb68242782cc23d0f97d7d7dfc7200fcdd9a99b2a83dfa1a759081a240"], 0x24}}, 0x0) 19:35:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600), 0x0, 0x10000}], 0x0, 0x0) 19:35:27 executing program 0: truncate(&(0x7f0000000000)='./file0\x00', 0x2b) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x101800, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000140)) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000180)='silent\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000240)={0x320, r1, 0x300, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x86}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffffe}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffeffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffd}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA={0x78, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4d2d}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffff801}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}]}, @TIPC_NLA_BEARER={0x100, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x9, @mcast1, 0x10001}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x4, @remote}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x25}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9b26}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x8, @mcast1, 0x1ff}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x8, @rand_addr="742880cd2368f987ca8f407e234cc299", 0x1}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffffffff4591}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x40}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x3, @empty, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e22, @rand_addr=0x6}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4552}]}]}]}, 0x320}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) r2 = shmget(0x3, 0x2000, 0x1, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_INFO(r2, 0x3, &(0x7f0000000600)=""/193) r3 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) shmctl$IPC_INFO(r2, 0x3, &(0x7f0000000700)=""/255) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000800)={0x80000001, {{0x2, 0x4e22, @broadcast}}}, 0x88) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f00000008c0)=""/8) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000900)={0x7fff, "8f9caa3a342b7675e64c983903aa6e1978ae21b8f5a4ac99dd38b03000abf070", 0xf0cd32e925e58011}) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000940)=0x1) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000009c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000a80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x2400}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x24, r4, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7a854d9e}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000ac0)={0x1, 0x10000}) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000b00)) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000b40)={0x0, 0xfd, "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"}, &(0x7f0000000c80)=0x105) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000cc0)=@assoc_id=r5, &(0x7f0000000d00)=0x4) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000d40)="4f33e72040098b262271d9f593d4c3fa", 0x10) io_uring_register$IORING_UNREGISTER_BUFFERS(r0, 0x1, 0x0, 0x0) write$capi20_data(r0, &(0x7f0000000d80)={{0x10, 0x57, 0x87, 0x83, 0x100000000, 0x2}, 0xd2, "997d23b16c6688fd1a80e71876d9805b23320b10356552c5bc0f72bc69b2bf4b3bc549ea3c1727b3cdbe3b5cb7731ce0d4683a5db41db532bcf2e62fb39dda0f2ca439147f7185cc6a09b404827c71c576f95a57e60ff481dc92bc4e540e4379dc862df0f02f372b73afd3350ab85667c2e2577da56a42a5221396aa2b831418bad89594c8eb8daea6aa45b13fbf130f472965c9d70997ea5029afb2e45fc49c544ddc33071fcf7f5eb4688b8325668e16ed33d20f9dc096430f84ce15b241d74d08059c6ff1ce2a664b2470b139e852fe53"}, 0xe4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000e80)={'team0\x00', 0x0}) connect$packet(r0, &(0x7f0000000ec0)={0x11, 0x19, r6, 0x1, 0x20, 0x6, @broadcast}, 0x14) shmctl$IPC_INFO(r2, 0x3, &(0x7f0000000f00)=""/4096) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000001f00)) 19:35:27 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000180), 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x2}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000340)={r1}, 0x8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) pipe2(0x0, 0x800) r2 = memfd_create(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0) r3 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r4 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) r5 = dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r2, &(0x7f0000005200)=""/4096) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) quotactl(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) 19:35:27 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={'caif0\x00', {0x2, 0x4e24, @empty}}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x1}) 19:35:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 19:35:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000300)="8b69bde6d1d08d2f8679911f5cdbe4c4b5a5d768a0630207b1b3673e96a0c0459385b0f0dc6dedded5bf3b07007d0e26a29ab17733adcea2f7a1ad568b92aa137cad7852334f629f2a61f429274c0b9cfd6f7ceaa8087f4bb993c54b3be018182ac53d98a1c51329bd367763c1e4baf8ef6c1201c7d72fdf048101f5c0145d67af246494dab65105f5d800cc50f6aa9d6c89c07ed75abd8780231b02e64a190400000000000000b4e6c03e49c9c78688fc5f809f47e1801102000000c9df2788470bdfb8647a461406f92de57bc9749801e2de4dabbf2f648506610827f2c902e09e2f149a") r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file1\x00', 0x0) statx(r1, &(0x7f00000005c0)='./file1\x00', 0x1000, 0x0, &(0x7f0000000600)) 19:35:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600), 0x0, 0x10000}], 0x0, 0x0) 19:35:28 executing program 0: r0 = getpid() r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x3, 0x2) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)='\x00', &(0x7f00000001c0)='wlan1\x00', &(0x7f0000000200)='/dev/vsock\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='/dev/vsock\x00'], &(0x7f0000000340)=[0xffffffffffffffff, &(0x7f0000000300)='system\x00'], 0x1800) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x600, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x6, 0x6, 0x8d2a, 0x101, 0x0, 0x1, 0x2000, 0x4, 0x3f, 0xf71, 0x8000, 0x4, 0x401, 0x18000000000, 0x2, 0x7c, 0x7fff, 0x2, 0x400, 0x7, 0x1, 0x8cd, 0x2, 0x1, 0x2, 0x100000000, 0x4, 0x100000001, 0x7, 0x7ff, 0x6, 0x8, 0x5, 0x1c, 0x9b, 0xd1, 0x0, 0x80000000, 0x5, @perf_config_ext={0x5, 0x3}, 0x8, 0x3, 0x7fffffff, 0x3, 0x3, 0x6, 0x5}, r0, 0xc, r2, 0x1) getsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000380), &(0x7f00000003c0)=0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e21, 0x6, @remote, 0x1f}}, [0x100000000, 0x81, 0x1ff, 0xf2a, 0x20, 0x9, 0x9, 0x5, 0x1, 0x4, 0xffffffffffffff09, 0x100000001, 0x4, 0x0, 0x5]}, &(0x7f0000000580)=0x100) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000005c0)={r3, 0x3, 0x3, [0x4, 0x7, 0x9]}, 0xe) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000400)={0x3f, [0x3ff, 0x8000, 0x3, 0x100000000, 0x4, 0x8, 0xc6d, 0x23b3992c, 0x9, 0x7c, 0x8, 0x1, 0x4, 0x6, 0x6, 0xffffffffffffc40e, 0xed, 0x40, 0x9, 0x20000000, 0x30000000000000, 0x4, 0x20, 0xa61, 0x6, 0xd1, 0x5, 0x4, 0x2, 0x6, 0x3, 0x3, 0xf40, 0x7f, 0x5, 0xfffffffffffffff9, 0x7ff, 0x6d3cbf68, 0x4, 0x8, 0x1, 0x5, 0xea04, 0x0, 0xffff, 0xffff, 0x0, 0x40], 0xc}) mount(0x0, &(0x7f0000000680)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x813, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) 19:35:28 executing program 4: r0 = socket(0x2, 0x80002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'bond_slave_1\x00', &(0x7f0000000000)=@ethtool_pauseparam={0x12, 0xb4000000000000, 0xfff, 0x7}}) 19:35:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 19:35:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) close(r0) r2 = dup3(r1, r1, 0x80000) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000100)={{0x62, @broadcast, 0x4e20, 0x4, 'fo\x00', 0x2c, 0x99b0, 0x4b}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x2, 0x5814, 0x5, 0x80000000}}, 0x44) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000080)={0xcaf, 0x1, {0x874be5b97834f211, 0x3, 0x9613, 0x3}}) 19:35:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x200103, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socket$l2tp(0x18, 0x1, 0x1) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getpgid(0x0) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000180)) 19:35:28 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f0000000000)) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b40)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semtimedop(0x0, &(0x7f0000000040), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000100)=0x5) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f00000001c0)) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0x10002, 0x0) dup2(r2, r3) ioctl$PPPIOCSPASS(r4, 0x40107447, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x41e, 0x4, 0xffffffffffff3f3f, 0x2}, {0x1, 0x8, 0xfffffffffffffff9, 0xff}, {0x3f, 0x3, 0x3, 0x2000084}]}) ioctl$RTC_UIE_OFF(r4, 0x7004) r5 = pkey_alloc(0x0, 0x3) pkey_free(r5) 19:35:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600), 0x0, 0x10000}], 0x0, 0x0) 19:35:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff", 0x3f, 0x10000}], 0x0, 0x0) 19:35:28 executing program 0: semget$private(0x0, 0x4, 0x100) r0 = semget$private(0x0, 0x3, 0x400) semget(0x0, 0x4, 0x400) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x440b41, 0x0) r2 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000200)={{0x0, 0x3, 0x3, 0x7fff, 'syz0\x00', 0x4}, 0x4, 0x100, 0x5, r2, 0x3, 0x3ff, 'syz0\x00', &(0x7f00000001c0)=['-$vmnet1em0}ppp0{GPL]\x00', '\x00', '{&{md5sum\\#]vmnet1\x00'], 0x2a, [], [0x1, 0x7, 0x2, 0x8]}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000140)=[0x1, 0x2]) r3 = semget$private(0x0, 0x0, 0x8) semctl$SEM_INFO(r3, 0x3, 0x13, &(0x7f0000000000)=""/254) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000100)={@dev={0xac, 0x14, 0x14, 0x19}, @broadcast, 0x1}, 0x10) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) 19:35:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff", 0x3f, 0x10000}], 0x0, 0x0) 19:35:28 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f0000000000)) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b40)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semtimedop(0x0, &(0x7f0000000040), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000100)=0x5) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f00000001c0)) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0x10002, 0x0) dup2(r2, r3) ioctl$PPPIOCSPASS(r4, 0x40107447, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x41e, 0x4, 0xffffffffffff3f3f, 0x2}, {0x1, 0x8, 0xfffffffffffffff9, 0xff}, {0x3f, 0x3, 0x3, 0x2000084}]}) ioctl$RTC_UIE_OFF(r4, 0x7004) r5 = pkey_alloc(0x0, 0x3) pkey_free(r5) 19:35:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 19:35:28 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) poll(&(0x7f0000000040)=[{r0, 0x18}], 0x1, 0xaa7) r1 = open(&(0x7f0000000b40)='./file0\x00', 0x400040, 0x40) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000b80)={0x7fffffff, 0x2, 0x146, 0x10000}, 0x10) 19:35:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) r2 = syz_open_dev$radio(&(0x7f0000000540)='/dev/radio#\x00', 0x1, 0x2) sendto$isdn(r2, &(0x7f0000000440)={0x8, 0xb64, "e820dfc51e50612dd465962f49ec1defcad7f49d93d534678129467f847abec7bb513bc788cf5001205a7f10cd44cd19c551e3c117d00d1e9af1e11d2c545d2b214efad89fd63ccb5ea801"}, 0x53, 0x4000000, &(0x7f00000004c0)={0x22, 0x800, 0x100, 0x2, 0x81}, 0x6) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x46, 0x4, &(0x7f0000000340)=[{&(0x7f00000000c0)="79af223db6cfe0f527c31f747e352d36352a2ee8c83835e97ffd0ad8d63459f1dc8dfaf1f2c04e423c7edd94fe5e7c78d2b1d65156733d672c251a88fce8", 0x3e, 0x3}, {&(0x7f0000000100)="03f14210f37b5e9130ff1e2dce22c72fff4c60c0a239a4b8897267066b2334127961cff3237b5178561a9c09b2e54fc7c380015b0e2faf611740a0dfae518c1bab56d98b9bacf997046bfa56c7c85eee8e64c92a8382670f2a1b22f7d3ae76bee22ee8e16ea3e2df06ebdb2525cec21c74c0d89b0a9185154555de6ae359c6e3ab7968e40286ad1d22e466e69a7ef2d23a43de0b95076c9f3f911b06b21d1c3e", 0xa0, 0x1f}, {&(0x7f00000001c0)="8f5f02039f0a27e0ebd27d4dd1b0018857f8499fd82234f4382f79b7bcb4c844a6861fbe0d4a87d808692526858f57e81ccab8b67574b7e0c4f33f4a68e4d650591d6d2e71d1a32f079c504c8ef9a6736a8e4dc412dcdaaf61fd334119f695a768af39fe1f2b8bcaf5c162204b30cac589cef568d201fb2207a88a7aa0d33d9c6e2519dcd3f6a315fae9befc7170514789bc2d2749d6427e823eb3be163c5a6c5e30fc7b9d9335aaa40ba49d17ee90a5be8e9024ac48c16a8476b50f72ab9187483f2ca81038e19d2c1a14a1ac946d89f3192310be7ffad76dd76ef1a88c039e5d9dbdbfcd7488eb92b5b5343c602a34f3255491db4890", 0xf7, 0xeb}, {&(0x7f00000002c0)="8da70f50fd6e0ddea760ad1e41539435a81eff56a8dc23e87bc57b9985ab8c3ec17103643da38070bad4b61e40861d4417fa4029069ea2bc3101a5e0ffac9283c170ffa73958c9cdbdf6e8dde5d371ece4b317322ce98cf7d3d7f9cb", 0x5c, 0x8b}], 0x0, &(0x7f00000003c0)={[{@attr2='attr2'}, {@noalign='noalign'}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0x63, 0x63, 0x34, 0x39, 0x62, 0x34, 0x77], 0x2d, [0x2e1b7b96aa6483fc, 0x34, 0x37, 0x97a53910ae015de], 0x2d, [0x63, 0x38, 0x30, 0x66], 0x2d, [0x34, 0x35, 0x66, 0xf19c6ed8c7f8a63], 0x2d, [0x38, 0xb2172feb7694c07f, 0x62, 0x62, 0x66, 0x62, 0x66, 0x5c53af22dcce2916]}}}]}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff", 0x3f, 0x10000}], 0x0, 0x0) 19:35:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 19:35:29 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f0000000000)) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b40)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semtimedop(0x0, &(0x7f0000000040), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000100)=0x5) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f00000001c0)) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0x10002, 0x0) dup2(r2, r3) ioctl$PPPIOCSPASS(r4, 0x40107447, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x41e, 0x4, 0xffffffffffff3f3f, 0x2}, {0x1, 0x8, 0xfffffffffffffff9, 0xff}, {0x3f, 0x3, 0x3, 0x2000084}]}) ioctl$RTC_UIE_OFF(r4, 0x7004) r5 = pkey_alloc(0x0, 0x3) pkey_free(r5) 19:35:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\b\x00\x02\xff', @ifru_flags=0x800}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000100)=""/207) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 19:35:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f424852", 0x44, 0x10000}], 0x0, 0x0) 19:35:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000080)=0x7f) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x7, 0x3, 0x100000000, 0x100, 0x1ff}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000300)={r2, 0x10, &(0x7f0000000280)=[@in={0x2, 0x4e23, @loopback}]}, &(0x7f0000000340)=0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) close(r3) write$P9_RRENAMEAT(r1, &(0x7f00000000c0)={0x7, 0x4b, 0x1}, 0x7) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r6, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x2, 0x0, 0x0, 0xe1) [ 785.950276][ T1302] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 19:35:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) r2 = fcntl$getown(r0, 0x9) prlimit64(r2, 0xa, &(0x7f0000000000)={0xfffffffffffffff7}, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:29 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@fat=@tz_utc='tz=UTC'}]}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400000, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0x0, 0x3}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$getown(r0, 0x9) ptrace$getsig(0x4202, r2, 0xfffffffffffffff9, &(0x7f0000000180)) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d0104cfe67bf070") [ 785.994922][ T1367] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 19:35:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f424852", 0x44, 0x10000}], 0x0, 0x0) 19:35:29 executing program 0: prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x2, 0x4e22, @empty}, 0x10) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) sched_rr_get_interval(0x0, &(0x7f00000003c0)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x1) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000080), &(0x7f00000001c0)=0x60) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) close(0xffffffffffffffff) 19:35:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) [ 786.171628][ T1418] FAT-fs (loop4): bogus number of reserved sectors [ 786.215349][ T1418] FAT-fs (loop4): Can't find a valid FAT filesystem 19:35:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f424852", 0x44, 0x10000}], 0x0, 0x0) 19:35:29 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @local}}, 0x3951, 0xffffffff, 0x80000001, 0x81, 0xfff}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r1, 0x80000000000, 0x30}, 0xc) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r3) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) [ 786.327925][ T1418] FAT-fs (loop4): bogus number of reserved sectors [ 786.340594][ T1418] FAT-fs (loop4): Can't find a valid FAT filesystem 19:35:29 executing program 1: sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x8080) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x143000) syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r0, 0xab03) 19:35:29 executing program 0: socket$kcm(0x10, 0x7, 0x10) semget$private(0x0, 0x1, 0x2) 19:35:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 19:35:29 executing program 4: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec0, 0x0) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000380)={0xa0}, 0xa0) fcntl$setpipe(r2, 0x407, 0x0) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000080)={0x18}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) [ 786.596735][ T1628] block nbd1: shutting down sockets 19:35:29 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 786.634897][ T1628] block nbd1: shutting down sockets 19:35:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000616000)={0x2, 0x4e22, @multicast1}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x9, 0x227) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2c00, 0x0) ioctl$VIDIOC_S_EDID(r2, 0xc0285629, &(0x7f0000000100)={0x0, 0x40, 0xffffffff, [], &(0x7f00000000c0)=0x5c9}) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00009abffc)=0x5, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) 19:35:29 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="11dca50d5c0bcfe47bf070") sendmmsg(r0, &(0x7f0000000100), 0x5bd, 0x2400ffe0) 19:35:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) socket$isdn(0x22, 0x3, 0x23) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 19:35:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 19:35:30 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000240)=0x1) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000000)) r5 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@un=@abs, &(0x7f0000000140)=0x80, 0x80000) sendmsg$nfc_llcp(r5, &(0x7f0000000300)={&(0x7f0000000180)={0x27, 0x0, 0x1, 0x6, 0x9, 0x8, "bb7e08763336fa5fc8b6512ac8196d6a9e2b5c72354296ccf857fb8958c6da01fd346d98a40a46bd2f2cc5a2c278e291141f51ce2e72da348b492a8ab3b70a", 0x23}, 0xa2, &(0x7f0000000200)=[{&(0x7f0000000280)="c54043dd23bed89d94b9f102ffa6b29440c6951016d31016ba37bf6474c1389dece7656d856a2e028d7da550ee1e607f87a4eca6eeb79e6637414ce531eeb27666dc94", 0x3d}], 0x1, 0x0, 0x0, 0x8040}, 0x4000000) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x32e) 19:35:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x32) clock_gettime(0x0, &(0x7f00000006c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000027c0), 0x40004c3, 0x1ba, &(0x7f0000002940)={0x0, r3+10000000}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "992d5578e4374cd7b3a0a107bdacb153006b9d59979c5c2e83e52748d1ecc11134011c00f980a9d74b8b7e32e7109bbfce934b0effca5a785c2c531ed364c83e9ee4d211381c0d24f7d265ca9d37bcee166551c4fd403d1df5da43894c6eb35c67c5cc0827b47eb3d65256f71de157d78f608db0a15636382d8a9f1ec12ed4694d68089b65efe3cb497addb3a5e131f6dd74a83b71a18a5b51a2543312f2b842c6a637e6102d6379053dbe2f65e66a4f878dc67d90390fa457884c9400d3a3d253f5fa4412605c078be0edfab669f91f4fb33bc65b5c8d7524d089142d529af5c329a0db086124dc3d7bc53cee19757724c32051a9c419f89ab373117b09237b"}}}, 0x120) r4 = creat(&(0x7f0000000200)='./file0\x00', 0x20) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r4, 0xc10c5541, &(0x7f0000000240)={0x5, 0x1, 0x1, 0x0, 0x0, [], [], [], 0x6}) 19:35:30 executing program 4: r0 = request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='ip6gre\x00', 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate(0xc, r0, 0x0, 0x0, r1) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x8, 0x800) fcntl$setsig(r2, 0xa, 0x2e) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000005d00)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0xd07, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x6, @mcast1={0xff, 0x1, [0x0, 0x0, 0xfffd7f8d]}}]}}}]}, 0x48}}, 0x0) 19:35:30 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xd632, 0x58040) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000100)={[{0x8, 0x7, 0x9, 0x58e4cc9b, 0x2, 0x8001, 0x0, 0x5a7, 0x6, 0x2, 0x200, 0x89fe, 0x3}, {0x8, 0x6, 0xfff, 0x6, 0x0, 0x4, 0x3, 0x0, 0x101, 0x3, 0x1, 0x6, 0x1}, {0xfffffffffffffc01, 0x15, 0x10001, 0x33, 0x5a3, 0x0, 0xc000000000000000, 0xffff, 0x9, 0x7, 0x4, 0x4, 0x2}]}) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0xfffffffffffffe1c) close(r2) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x280000, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r3, 0xc0305602, &(0x7f0000000080)={0x0, 0x80000000, 0x2013}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0x40505331, 0x0) 19:35:30 executing program 0: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d48e56c969a3543034571923a2c0e75ecb55217584fce8cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1ba8116a4ae39f9429436c5e0eadfe"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000002c0)={0x15, 0x7e, &(0x7f0000000240)="214aeea365793e05c024efe9009c2a012479b18b3ec173924b0eb7a2e78d96ece00b715136e896b16a8e803f5e1966ca98e05d8535ad0513c8571f1a1f6029b30629df07b18cc248eded0edf9a3abce9eed2f1b7ac62228a53d69330a262e573854e0d356b1322e34bae04cbcd104417ec052b7ff625e529199e4a5e7201"}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2321212c0f0df81f47442a"], 0x10094) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRES32], 0x1037b) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000), 0xc) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="a5fd89583f8d155f"], 0x1a000) r2 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000140)={0x20000000}) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0'}, 0xb) 19:35:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 19:35:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 19:35:30 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) ioctl$FICLONE(r1, 0x40049409, r1) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000002880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x2, {0x7, 0x1f, 0x0, 0x0, 0x9}}, 0x50) 19:35:30 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000540)='net/mdp6\x00V\xe9\xb9\x80;\a\xec{z\x1b\"\xd0bQ\'=\xd6\xa0\xc5\xa1\x9d\xadiv\xc9\x8c#a\tH\xf3f=\x9e\xcf\x10/:f\x0e\x11\x13\x03\xd0g\x1b\xbd\xfe\xeb\xbf\xfe-\x94\xa8\xbc\xe4W\x9c\x9am\x04\xfe\x15M5\xc3G\xa0\x86J\xd8\xd0O\x11ae\xd4\v\xe6\xd9\x11\xeb\x95Z\x9c-#7#\xad\xf8\x9b\xfe\xdf\xb7@\x8e\x8cr\xcc\x02\xae%\xe4\xa2\x82\x95\x1e\xcd\x04C0\xba&Y\xc0<\xd2\xa7\x18vus\xd7\xb2G\xad\xe5\xec\x95\xef\x8dD\x8f\xdd\x89\xf6\xc4\x90\xda\xcc~\xa2x;\xcd\x82\xdb\x0e \xc0\x99kcHW]\xd3\xc9\xe7\xb4\x16\xd5\xf6\x8d\x83\xde\xa5\x17\xca\xf8\xb7\x84\x92\x01\x00@\xf9V\x0fa\x00\xaf\x16\xb7\x101\v\x92\xddaS$o\f\xcd>0\xf4\x98d\x90\x83Uu\x10\x80\xa0\t\xcd\x82D\xbdC\xd0\xe4\xf5A\xbb\xa4\xcf7|\xd19\xb2\xa1S?\xdal\xd0\xdbx\xa1\x91\xf3\x02\xb1\xe7G\x18^\xca!G\x95\xa8_\x9b!\xa9\x98\x9b\xc1M\x9a\xe5\xe4\xfd\xf2\x98\x90\xf4!\xf0\xdb\x1c\xd1\xddi\x814\x98\x95\xc0Nu\xfa,\xf4\"\xa9\xfc\x97qj~\xdd\xc7:\x05*\xe3\xaa\x80h\xacz\x14\xa9@') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 19:35:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff", 0x3f, 0x10000}], 0x0, 0x0) 19:35:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 19:35:30 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x101000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000000c0)) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000100)={'tunl0\x00', {0x2, 0x4e20, @local}}) close(r0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2, 0x0) 19:35:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000100)='./file0\x00') acct(0x0) accept$inet(r1, 0x0, &(0x7f0000000000)) 19:35:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000005c0)={'bond_slave_0\x00\x0e\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffa}}) 19:35:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 19:35:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VFIO_SET_IOMMU(r1, 0x3b66, 0x5) write$tun(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="cc"], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 19:35:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff", 0x3f, 0x10000}], 0x0, 0x0) 19:35:31 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x101000, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x10fd, 0xa0, 0x1, 0x100000001, 0x0, 0x8, 0x4c00, 0x4, 0x40000, 0xfd1, 0x0, 0x4, 0xee, 0x9, 0xf5a, 0x8, 0x6, 0x1, 0xffffffff, 0x2611, 0x5, 0x6f900f93, 0x9, 0x3, 0x1ff, 0x7, 0x200, 0xf2, 0x8001, 0x7fff, 0x2ff3, 0x5, 0x6, 0x0, 0x0, 0x8, 0x0, 0x12, 0x4, @perf_bp={&(0x7f0000000000), 0x6}, 0x4, 0x200, 0x200, 0x9, 0x6, 0xffffffffffffff40, 0x691d}, 0x0, 0x7, r2, 0x3) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:31 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit_group(0x1) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = semget(0x3, 0x3, 0x420) semop(r0, &(0x7f0000000000)=[{0x2, 0x0, 0x1000}, {0x6e05635571fee748, 0x1, 0x1800}, {0x0, 0x4}, {0x3, 0x100000000, 0x1000}, {0x1, 0x1, 0x800}, {0x1, 0x10000000000, 0xbb8c6c12f89c406d}], 0x6) madvise(&(0x7f00000f3000/0x1000)=nil, 0x1000, 0x8) clock_gettime(0x7, 0x0) 19:35:31 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40000, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={r2, 0x13, 0x1, 0x81, &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x3}, 0x20) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r3) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x82081, 0x0) ioctl$IOC_PR_RELEASE(r4, 0x401070ca, &(0x7f0000000080)={0x10000, 0x200}) 19:35:31 executing program 4: r0 = socket(0x18, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x1c, &(0x7f0000000000), 0x20a1562f) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x4000, 0x0) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000000100)={[0xf000, 0x2, 0x1000, 0x40fdf83a61031ca2], 0x9, 0x0, 0x80}) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000080)={[0x4000, 0x3000, 0xd000, 0x1], 0x3, 0x80, 0x7f}) [ 788.077205][ T26] audit: type=1804 audit(1566934531.220:331): pid=2359 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir437901318/syzkaller.aikZ21/724/file0" dev="sda1" ino=16973 res=1 [ 788.101373][ T2359] Process accounting resumed [ 788.137263][ T2359] Process accounting resumed 19:35:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000100)='./file0\x00') acct(0x0) accept$inet(r1, 0x0, &(0x7f0000000000)) 19:35:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 19:35:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) semget$private(0x0, 0x2, 0x2bbbf61bd4861da7) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@ipmr_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x80, 0x20}}, 0x1c}}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x101040, 0x0) bind$llc(r1, &(0x7f0000000080)={0x1a, 0x0, 0x9, 0x4, 0x0, 0x0, @random="6acac36e9e34"}, 0x10) 19:35:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff", 0x3f, 0x10000}], 0x0, 0x0) 19:35:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff", 0x3f, 0x10000}], 0x0, 0x0) 19:35:31 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x480000, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x8}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000001c0)={r2, 0x7a, "092e430576ca665bdbaba72ecd790b682ddac7601f3168c87479b00d9d3333f4ae2232f06eda8fe0d0c7749c8c087521357f0c73fbf8f5666e7d7b6552176c1e5ef0f5fa362b9ffb0e0b2c90f74334fa3b147da8d08902557856adf4b15298397883359678fa72eaff33a94a581ad82a351049fc99867fdc13fe"}, &(0x7f0000000280)=0x82) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000080)={0x4, 0x3, 0x2, 0xffffffffffff4212, 0x6, 0x10001, 0x7f}) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r3) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x24) [ 788.325451][ T26] audit: type=1804 audit(1566934531.468:332): pid=2521 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir437901318/syzkaller.aikZ21/725/file0" dev="sda1" ino=16946 res=1 19:35:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48}], 0x0, 0x0) 19:35:31 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0xfffffed5) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x5a) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x1ffffd, 0x0) 19:35:31 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200000, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000080)) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r2, 0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x188, 0x188, 0xb, [@struct={0x6, 0x9, 0x0, 0x4, 0x0, 0x6, [{0xb, 0x2, 0xc0}, {0xc, 0x3, 0x400}, {0x5, 0x5, 0x9}, {0x6, 0x3, 0x5}, {0xa, 0x2, 0xffffffffffffff47}, {0xa, 0x5, 0x5}, {0xf, 0x1, 0x3}, {0x7, 0x0, 0x8}, {0x3, 0x4, 0x6}]}, @enum={0xb, 0x8, 0x0, 0x6, 0x4, [{0x2, 0x40}, {0xb, 0x3}, {0xb, 0x1ff}, {0xf, 0xdaf6}, {0x6}, {0xd, 0x10001}, {0xc, 0x2}, {0xb, 0x4}]}, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0xd, 0x2}, {0x5, 0x1}, {0xd, 0x1}, {0x8, 0x5}, {0x8}, {0x7, 0x3}, {0x10, 0x2}, {0x1, 0x1}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x8}}, @const={0x1, 0x0, 0x0, 0xa, 0x5}, @struct={0x1ff, 0x4, 0x0, 0x4, 0x0, 0x9, [{0x9, 0x4, 0xaa}, {0x6, 0x5, 0x2}, {0x0, 0x0, 0x1}, {0x9, 0x1, 0x8}]}, @const={0x3, 0x0, 0x0, 0xa, 0x4}, @ptr={0xd}]}, {0x0, [0x0, 0x5f, 0x0, 0x61, 0x2e, 0x2e, 0x30, 0x2e, 0x30]}}, &(0x7f0000000300)=""/132, 0x1ab, 0x84}, 0x20) io_setup(0xffffffff00000001, &(0x7f0000000400)=0x0) io_destroy(r3) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) [ 788.459612][ T2529] Process accounting resumed 19:35:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000100)='./file0\x00') acct(0x0) accept$inet(r1, 0x0, &(0x7f0000000000)) 19:35:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x8100, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x802) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="fa0b00de11f9312c"], 0xb) ioctl$SG_SET_COMMAND_Q(r2, 0x2271, &(0x7f0000000100)=0x1) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e24, @multicast1}, 0x10) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:35:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f424852", 0x44, 0x10000}], 0x0, 0x0) 19:35:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48}], 0x0, 0x0) 19:35:31 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200800000000042) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045503, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff0bdbe}) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f00000001c0)="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", 0x1000}, {&(0x7f0000000000)="51fde472c3b0b8423e3c7fbd451476b8b52e73e1a2253fbf3a6ed1fd7293e1f370157810777766ee223ab456cc1f39abfa14aac27406e3d7c7b93d238672546388353696eeb1edc6838e9190c34a7c924c66d4d6646f81570b", 0x59}, {&(0x7f00000000c0)="e34f7447894f948540da9454a778d0d8068200fba467169bcd88cb3542bc9e5c7e", 0x21}, {&(0x7f00000011c0)="722fe1e0b72d34da613b8954f999ec631d382f5d317511dd39c896e4203b8b689e0df081b43668eabf9dd751baa93470b56f745f09b090c10b1c006740343b156ed202e99f1a6f16411b1b385caafde59884dece1e9250bc37b6b3bcbec91cb337894d21bd8c0cd24f586aa0fb129b3c5d9cfb24e57df949703f7df6506bfdc35d", 0x81}], 0x4, 0x4) [ 788.740449][ T26] audit: type=1804 audit(1566934531.885:333): pid=2725 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir437901318/syzkaller.aikZ21/726/file0" dev="sda1" ino=16976 res=1 19:35:31 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000780)=""/229) r3 = shmget(0x0, 0x3000, 0x1080, &(0x7f0000ff0000/0x3000)=nil) shmget(0x3, 0x3000, 0x0, &(0x7f0000ff0000/0x3000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff6000/0x4000)=nil) syz_init_net_socket$ax25(0x3, 0x5, 0xce) shmget(0x0, 0x4000, 0x10, &(0x7f0000ff0000/0x4000)=nil) prctl$PR_CAPBSET_READ(0x17, 0xe) add_key(0x0, &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)='/dev/zero\x00') shmget(0x0, 0x1000, 0x20, &(0x7f0000ff2000/0x1000)=nil) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000700)={{}, {0xfffffffffffffffc, 0x1000000}, 0x3, 0x0, 0xffffffffffffffff}) shmat(r3, &(0x7f0000ff6000/0x4000)=nil, 0x4000) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000180)=0x10000) setxattr$security_smack_transmute(&(0x7f0000000080)='\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000300)='TRUE', 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1) r4 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffa, 0x400000) ioctl$VIDIOC_ENUM_FMT(r4, 0xc0405602, &(0x7f00000000c0)={0x2, 0x2, 0x7, "3984fcbc2e8000000000000000f240a41f466dd01400", 0x33524742}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f424852", 0x44, 0x10000}], 0x0, 0x0) [ 788.781264][ T2725] Process accounting resumed 19:35:31 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x6, 0x0, 0x14) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r2 = gettid() migrate_pages(r2, 0x1, &(0x7f00000000c0)=0xc8, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x5, @mcast1, 0x200}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e24, 0x6, @rand_addr="cd0de07f8335894cc016f8f155c8ffde", 0x9}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x78) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) openat$cgroup_type(r1, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0xc0485661, 0x0) r5 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, 0x0, 0x0) 19:35:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48}], 0x0, 0x0) 19:35:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000080)={'bond_slave_1\x00', @ifru_data=&(0x7f0000000000)="f35f8ee4d1946110d4336404a65aa9ed0ad2f6e35c5678e137ee9ec28c2dcacb"}) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) getegid() [ 789.130977][ T2907] bond_slave_1: mtu greater than device maximum 19:35:32 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') socket$unix(0x1, 0x5, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="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"], 0x68}}, 0x0) pidfd_send_signal(r1, 0x1a, &(0x7f0000000080)={0x2, 0x6, 0xfffffffffffffeff}, 0x0) 19:35:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f424852", 0x44, 0x10000}], 0x0, 0x0) 19:35:32 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x2000000, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="38010000100013070000000000000000e00000020000000000000000000000000000762400"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0000000000000000000ffffffffffff0000000032000000fc000000000000000000ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000048000200656362286369706865725f6e756c6c2900"/240], 0x138}}, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f00000000c0)) 19:35:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000000)={0x20}) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x101200, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=0x0, &(0x7f0000000100)=0x4) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000140)=r4, 0x4) 19:35:32 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000080)={'bond_slave_1\x00', @ifru_data=&(0x7f0000000000)="f35f8ee4d1946110d4336404a65aa9ed0ad2f6e35c5678e137ee9ec28c2dcacb"}) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) getegid() [ 789.371698][ T3020] bond_slave_1: mtu greater than device maximum 19:35:32 executing program 5: syz_init_net_socket$ax25(0x3, 0x2, 0x8) 19:35:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 789.427758][ T3086] QAT: Invalid ioctl 19:35:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x100, 0x10) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000440)=""/94) capset(&(0x7f0000000080)={0x20071026}, &(0x7f00000000c0)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffe00, 0x4080) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) futex(&(0x7f0000000140)=0x2, 0x3, 0x0, &(0x7f00000001c0)={r2, r3+10000000}, &(0x7f0000000200)=0x2, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000400)) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000240)={0x0, 0x2}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000002c0)={r5, 0x31}, 0x8) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getpeername(r4, &(0x7f0000000300)=@can={0x1d, 0x0}, &(0x7f0000000380)=0x80) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20010000, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100], r6, r1, 0xfffffffffffffffd}, 0x3c) [ 789.466941][ T3021] QAT: Invalid ioctl 19:35:32 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xa927, 0x2, 0x0, 0xffffffffffffffff}) r2 = dup(r1) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000640)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000000780)=0xe8) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = fcntl$getown(r0, 0x9) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000940)=[0xee00]) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000980)=0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000b40)=0x0) shutdown(r1, 0xa1bcfe7c0e59dcb9) getresuid(&(0x7f0000000b80)=0x0, &(0x7f0000000bc0), &(0x7f0000000c00)) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d00)={0x0}, &(0x7f0000000d40)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80)={0x0, 0x0}, &(0x7f0000000dc0)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000e00)={0x0, 0x0, 0x0}, &(0x7f0000000e40)=0xc) r18 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000e80)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000f80)=0xe8) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r1, &(0x7f00000011c0)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000100)="cd2c05f25a4e042671b54cc5b016ff8b1501e06f667d020fe6f885bf6d1443df0b21eff0373540eb27cd90d926c5a748dc062c90561cad2a5159183c6e287c1009d60159d3e5dccba8af7a03ebc495b07a4e1c5067dbb60157a43c941c92c64f78894e77f0954b54b573b05251cd793114c02ed0fd49b7150c29b93bc5d0dbd87c4684f9442334063ebcba93043d8dba0c74d67667c3b2a4d361034e46d8b9a5bf64a650417c1a16b87c455962cc4bcc3ac281491e741fc033d5626c8f46c54eb1ad2ed07f0946a3a590491e8de40cb644649a2b6da7489f39493599725c28393dd7ea2044e1fddb10933686a5322b12c79d12e7f83e5701f9", 0xf9}, {&(0x7f0000000000)="2913abd0ff87903eb5e2070388699f277599a14dd45f773a6d69bbb50882945d59163343ddc886026a513e5a5c7505ceff0e9bbe9e52e833e42775", 0x3b}, {&(0x7f0000000200)="44d4ef77b28ebbea5c4767c9f315c774265fb105017feeae26b3608bdaa77065481ef905d1cccc77b6aa77b6eec7e522253e7a0afd646f0b8e92def2d837aa7375d19d441621fba8e633d9c37ad3f51b1df14bcb11e55718f2311dfcdd3fbd1f52229f2d46dd061c5e6ea7b5d44f6fa2ed065c3a73e48739f25bb24925400cfe706bec10e06ba5f3d508d23325147d10a36f4c0fcafad8fd6e45c8715e0ea284f610060f5d456ddbb09da3c6f7d73340e6ad084fba28f06aa95fda7a7d43304eabaf9653adc9799aa99de92b7464d7872f1ee04ce0470d3ca91e73aaaf275fc0425bf11ee4266e48f2a64d3523e8954e", 0xf0}, {&(0x7f0000000340)="f6a44250325ca8547ad79fd712b78622328c2ba405b7385f90a4fda249f656c2abc35e9ba464d6aa562d8af35326f14651ffceabf3a0810164b24b5cbd2bf935f890e6ceace71c287ac5d5c06ae29253bdea08855ffbc6c71fde00053a4d9b97458df22728383c5086eecc2c0e578b1ac8db1abc5871c617f9c886ee38233de634dec02c226cc5495db72bf4ab370998228aec6dd5b1e3f0fd9edbb4bc50c2396542f42cd3c4d2528a49323e374c694028e747415df6b269fd779cca5d17fa4e93c969ba43511860566acb38368f2c", 0xcf}, {&(0x7f0000000440)="798d97baebdbf49035bf76a70e7ce11fe78bfae3c71208eba73a39f4bf65a69b91f53c0c2928b94e55b7a9dfcf3ffdd4298b09735f4d95d45c31cae78cd5f730e1193b52a18a5255e8320d995db94d4554c8b6edb077b7919e273d851f6a6d7cc3e62ce31ab9b25ab6f4927b9b8be89ed32d232e0eeabc19bbcef01a840f683b6eaf54af526e66d4224bc538e1a1ef7b885a6d92e0ed3d4008f14a0e3d1349d448dd846fa005449bb640536d09911b47c9c9e20cd252f1a138eb37571c43b800aa38e2cde37b38259c4e19eab1149587faf7fc6790d5c834484e298eee064f873d9c12069d96cc5d3e4d5c289734520e3f5f348f", 0xf4}, {&(0x7f0000000540)="3c34bb1d7fb7289471d08518b1f9ce34a6da6d263ceb67f9a67bb37ff26c3400359c342fe1931e5d4dc5db6102b6fb381d69b7dda940ce2fa0738f6482d49a86c8f1daadb9e5df", 0x47}], 0x6, &(0x7f0000001080)=[@rights={{0x20, 0x1, 0x1, [r1, r0, r2, r1]}}, @rights={{0x1c, 0x1, 0x1, [r1, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r3, r4, r5}}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, r8}}}, @rights={{0x30, 0x1, 0x1, [r2, r0, r1, r2, r0, r0, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r9, r10, r11}}}, @cred={{0x1c, 0x1, 0x2, {r12, r13, r14}}}, @cred={{0x1c, 0x1, 0x2, {r15, r16, r17}}}, @cred={{0x1c, 0x1, 0x2, {r18, r19, r20}}}], 0x130, 0x20004000}, 0x4008000) 19:35:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 19:35:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x0, 0x0, 0x0) mq_getsetattr(r1, 0x0, &(0x7f0000356000)) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40800, 0x0) splice(r2, &(0x7f0000000080), r0, &(0x7f00000000c0), 0x4, 0x9) 19:35:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='b\\rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:32 executing program 4: syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e20000890782b15b8cc9aa98d595f03ebef046b71466a635b284299ccdfb731211b72cf04b23819f0e7eae379842778d9902cefb5a8d67eda228452887122052ce232459c0496969a3353852fb74dd12e94137fdd1a07c185d58ecce25c2cfe99641ed99cc428d048fb60843807877d55b04e186701dd321f3cca52027e74aec50eb4bd8c82b56dbef3d7153b5ff6dbcc4cfa6b51af5bb25c15463bc91d8a853f"], 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000040)={0x0}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f00000000c0)={r1, 0x80000, r2}) 19:35:32 executing program 5: rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x9, 0x100) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000340)={0xb, 0x10, 0xfa00, {&(0x7f0000000140), r2, 0x1}}, 0x18) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) recvmsg(r3, &(0x7f00000002c0)={0x0, 0x39f, 0x0}, 0x0) 19:35:32 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x4008556c, 0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000080)={0x5, 0x40, "726d5b326459ab3f124d2cea87f87aecd3b16df0bcba8490", {0x1926000, 0x4}, 0x6}) 19:35:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) r2 = accept4(r0, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x7e, "a95dd8647950d70f78304344f72974df4ae52f574a5fa9516c4a0c006a874b7027dee89f16c440c345f33f9f7818db6cfcf687298a158c7d1fb23d11062f4319474675fee5b7d575360499efc511652e94977bc7d57adebef6547d1332c4a09f4e65d5f6ed4c323534826493818bc8f721176f27885cf6373eeb89c489df"}, &(0x7f00000001c0)=0x86) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000200)=@assoc_id=0x0, &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000280)={r3, 0x200, 0xfffffffffffffff9, 0xff, 0x4, 0x9, 0x4, 0x100000000000000, {r4, @in={{0x2, 0x4e20, @local}}, 0x101, 0x5, 0x0, 0x1, 0x80000001}}, &(0x7f0000000340)=0xb0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 19:35:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f00000001c0)="46f0a748c8a54b5f9317d162916c7fd2bd3747d0cdd0eeb14540d6920a76e9ccc8e765a4c9836d82f5c46cb85d246e5ab95043a6300a11b5ea1ab02412d755130f039becddc709bcfea63b466c7bf1e9e535d5f62d45f37c2750aa3453854e43de72b483e26799f809581b62d675c2975179436cf625fdda8ecf400b47ecaacfda2454ece9382422afba1a34d5cb4465116d953fca4ba556ec27d6ba9bf8cc99e40ae5bc77cc7c392dcca92faab4c64edca43e49b5ce1c591a6d9e372561f465364318f030308eb26669d6f1ab6bdf7dbf82319d59003f33e4c934bf7154768de384f1162f9ee777", 0x5a, 0x10, &(0x7f0000000140)={0xa, 0x4e23, 0x20000000000003, @loopback}, 0x368) r2 = accept4(r0, 0x0, 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000100)=[r3]) shutdown(r2, 0x1) sendmsg$netlink(r2, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000000180)={0x10}, 0x10}], 0x1}, 0x0) 19:35:33 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = semget$private(0x0, 0x1, 0x400) semctl$GETZCNT(r1, 0x2, 0xf, &(0x7f0000000000)=""/133) setsockopt$sock_attach_bpf(r0, 0x29, 0x18, 0x0, 0x3d) 19:35:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btr%s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:33 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000200)=0x100000000) r2 = dup(r1) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x7, 0xff9, 0x6, 0x801, 0x4, 0x400f11a}) r3 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xd8, 0x88800) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x8b, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r4, 0x7}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) r5 = semget(0x2, 0x4, 0x4) semctl$GETALL(r5, 0x0, 0xd, &(0x7f0000000000)=""/117) 19:35:33 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x440001) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x4, {0x1, 0x4a, 0x6, 0x6}}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 19:35:33 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x1000000000a}}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="020b00010200000000005e40040000003a2fda727010ad9c734645c215c51fadd146e7e5a3b2cb58ce0f534819847bdaa28febca04dea926b12100e204cc4f44e61a68c4bbc2167d76610e0f16d339802fad9fd0adb9fe3fa84ed7502e551b810c8cbab0a044681e7cb9d19616c212971429dc8ad3965864f8868c92215388897a30c589a765c8805eefc2fe64be827f8268ad07d638879bb31c29696370a64c3f7c85a6f3b888debf96ef302895c51491d718cfd9f49d5b1ad189dd393119cb495bcc2120000000000000006b"], 0x10}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) recvmmsg(r2, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 19:35:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btr\\s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:33 executing program 1: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x6, &(0x7f0000000000)={@empty}, 0x200002ac) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xd, 0x10400) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0x973, @local, 0x3ff}}, 0x7, 0x8, 0xfffffffffffffeff, 0x1ff}, &(0x7f0000000140)=0x98) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000002c0)={@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @default, @bcast]}, {&(0x7f00000001c0)=""/187, 0xbb}, &(0x7f0000000280), 0xd}, 0xa0) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r1, 0x5, 0x2, 0x80000000}, 0x10) 19:35:33 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x100) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, 0x0) 19:35:33 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) socket$inet6(0xa, 0x2, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x40000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160\x00'}, 0x58) accept4$alg(r1, 0x0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000001a40)) r2 = getpid() fcntl$getownex(r0, 0x10, 0x0) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000240)) ptrace$pokeuser(0x6, r2, 0x0, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000100)) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x8dffffff00000000, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x9, 0x1) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x101080, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x9) 19:35:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 19:35:33 executing program 5: ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0xffffffffffffff59}]}) unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000000140)={0x90, 0x0, 0x8, {0x2, 0x1, 0x5e, 0x0, 0x7fffffff, 0x8, {0x0, 0x2, 0x7fff, 0x5, 0xa8, 0x20, 0x8000, 0x12ea, 0x2, 0x0, 0x1, r1, r2, 0x7, 0x1}}}, 0x90) 19:35:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000001c00)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="9c0a0000c2f28b4db4b30631e00db7ad12c7c7d52ccb9cf043c639b7bf88d98d3d3da351bd46241050251e4ae35daa361fd626d79daf4025933d231598ac879db86f08a11ade5c1425b7d96502ed05f99c46db36c4e366662052caaba2ffdeffa676fab8e8066247782b803ce0d3f643ea36ffb2f880a4e60d288268c4b168c11fdcab134babb34af9c8d92153d7a06c6cd16b623ac539386e7b90a12fc5a73f18c32fa3207bf8e5f498fc22c1b28c578b1f5c955875fc4a27a7c7914ec85b5fb7f0a1d04754b87221164cff955a6a3fbd9ff30e2bef448ae1afa54aedc0841658bdc7114ef8da7747041aad24eb3419fe61629259f17bbf805aede8fcc8c0a22255b3245dc2961bcde436f0322b333794645c204d10cc550009a77fdfc9f48cdf6934ad5ae8f8ca865fdbff505f30dfdfde499b17f7c0f1bbf2e30d79b38000efb40f1a7d71f5f5d5993851a88c1e11163d6ce307bf27d048aafb62760d7162ea2a196c8ee79f3bb5ec6e0c517e1eb94e5c26601f7a7ec8945df1902fdbdc91f62be10c9b1282494386f87dada96f4f0df9146096bbcc4498a03c9f186633f3f2dd1b1fd731713bed204065e33bc8207435ccaeeeea0fb287ad9d00bab8c432a9cbcf6a4f8d6e85e0b2e78629ee4e044c279b2c6b99121ec031e432d2c980e4cecbf8a7cab6ec70e45fce91a6c5c9b883ca1713d2f9f560f28008b5cb88f9e991eb106af122438120515b2ab9ddd8424ecc3d31fdf24de062fe9f181dc4988f27ad4b1c166130708730d0b5a5ac2a139c1c37a452335947a3a3df498c1693223e9749c89aa78ad30000e7a0b825fc4329253aa5f84e5dd1adf42a0004d7f49f0832b02fd5920cdc8c4edcdc702eba8329b2ff45372ad7e201eea42d942b0b5bf7f2ade4a7438aceeeb3a8d4eed912fb671c027ebbdb381587679c902a344727bf169b2f3ef2cff1fc72053f8d1e5fcf3acd13df033d98928db8cce364c23b6e966feeb4b4513187de07e97ed3b1fcae68a97ec7ebf4747bae631aac3892b06de0f73be6d81ee30ce79a5237097336ecb63a2d326d03ef5aec7500fd564d05e27bb26e378fcadee9f8eea2ca6757e08409ed8068e0ee6d6a29e8e3aaf2143d9033ef9d8486b6646ef7aefe34738803562f1abb760c5bec12202d7abd7629c382d1632e869d2caba14bbe500334c0309284a02aa3b916670a2dd2a6e46879c81e98dd4a98688e692ab5e3e55d2c370f88046552fe3fa2e70de533cebca565bb9aed5e5f592d2ff55e41dcedf48dc40aeb3a408dc5db683446c1d1c022886fda01b077377ff0b0d10eafbfb8441d48465e642cf9a2ee66cb189cf8d57c4cfe804afa5439a1c6a2784d7ffbc41e62837b89cabdcf0d2f3219c6e5cf981959af42f2d94ab519da6d3db701a7e1c855a7e1be67f557d1a2a4637bac23396b9e3d6728c9d25a0564de3fdd7b2cdae4391e6e791748605d219e7d669796ee5d822b8a8a4fd858d0f64e744d1c116f0d99411989b8ce1c091d98d425a0dbe1d0fef36dd22127c2862df8cbd171eebe21822ae2464de8770080928d9d2154731c8c2da9c17d950b1cc5fc97885c89fc5fc241bb16ebd60f478ab56fcc2955fc0221c5c73636508269606f126f3eb5e97468d07857b62502b28d8777990221257a0b20e748838308286d653b1904a872794784b20327eb1d2fce4e827e02dac0bd1c12e84f90155bcf34fb42576679d445aa0782a9fcf99971cc9e85793c232959496ddf727c78a17751b90008798da486f36babaa0fdcc971f51383c51f9e370bfc9dcea1d4022496c471965feeb162c789fe0da1f5ddb15d42fd71cd9548103ea6748d04e806fd15ae53265b6d8114c10f7edaf334ce9f43c46bc922b137bda79f4aaefa80f4b4f42701a5bbbff212ea4334df240c4e5a2f8a1c53b74672ec146f87225df8bc2006cb5e7c858bc41eda746db2b3affefeec0a3266c1703f33ef74ffd1ee06885a95fdef23667a27896f8a241bf650f2c68ec54c81329cb9725f9d2b534abbe5ac9fde3828c25753255a3a3bb36be9ad26c23ed47069ecaa8ddaf210a34be1718385be38783862e737ecf42b9aedb4e3139b711c09288b35357aaa65a16f075b53c7a0c2fdc7552a18b61e545919b2093d7cdf86ffc1da3ab02df5cd6d5c22465cba22c7213285d7e2555443fb33cdcea513fd908a3258c32eafc5094807f62f7e78ffbb4bf0c95a6672c222fe58c2b8142c47c8190c2b059a6d715271b43ee9e87ab10223cbc993ff134f810816efd8c557988b7d51dff95eb128aa5da8f66653bf0ec9facfe421572533dd013aa6591a41a548c4141b7a22a106fef7028b08cef43a7e8083d2e04ccc308d888abd2291782ed114c3415bf78862f7f63c1e1378f487901ef3215adaf59f7f71a13232e52c326bd54a16ca6fb287e4fd3100f5c9ecbed65cccf2e80a501bae268e21f0b80e3a2d04a18d5eea58b1bc61d13d364d730b838b47dd75a99d4a23bc58950a0de04f175bffe87ba424d7059cdd9dbb31aae21ba0036a4cb3f7b1a8d195473f762b08a445240d4594ff673c928b48299dda0e40e8f1ac2c08d8b648b245018fa04b1784348714f2b3afe0a1957bd0633065e648d0929ad08c8dd91dfd8091085bdd8d35c74269019efcb01d22dd19146f8ac82feb6b0342c0e7af354c5385a7c396bd80978f17f560fe9ac0e2ea40a36ec895cca43295303c321fe0f12cd02b4c925f03a132bb9087ec16df87097e7116b97ad38dd4b654463bbd411b038b79420210da4765650d6f4a7dc2dd6a5d5239b18baff1610f35a5e31f3a97ad2ffee1d41f2597cd0b26d87e4fed9d2d177c86b5fd5d937fc817cd747dccb2b2c303c412c08db6270150d547c99e6d773d41a9ec1977dab2530dd5de608a71868bc47d707e52848caef826a50854f4b206cbc4346481dda70c4432892b0229466f5bc40ef618687426e1a6b33e57b8baa15557410d144b8ab22da9d1033abb48840ee010ebe509aacd4afd815a477a1fc6edc27da5ae684c194c56f23fab50f0abbe276c1b5361432e32f186f0f83d42820420c351087160e97d6722209918a5a354d0b691afd8cf382f9dae8490943015b8a5fe9583cf6ac5baa3d66d1ff577e144c9af45f7256dcd14056fe61aea116adf3851cb0aaa2c86bc33a2287ffc83c47894def94fc30ddc31d6abe2173c23b5fdf31b52a0a96aad58f3090cd8785a4fa9f5b4871220d4dbc0a0306c7409d0c53bf74ca3de80d882db4675c73b3fa0a9236ddc58efc2f17cc2bf5dc25dbb727b54b13c46db1e7675b84842542fe316a3bed9ff6169226a05f69de4458cd3667dbccfcf92825f46e9d07ff1d7fab04dc4af35a65968143406565280d7a0175903b6b8c22b8be974f78042af2a2cdcc25e3c19cb22ead27592ae4cbd2ed1379919489936ac03440d6f370aa8cea33d3ed223503848869086539d2d48c4b615e908d3bab6fe624272a0c4bc77cc81112538719633335dc5396c64b753f490fc0e8b51cf92de306229af8dfbb4a5326d70b92e75f6d1639ac121e6bace630b693d2733402aaa9d82593d1964f68cd4430c4e0290531ff3d264fa35450ae894e2f6cc66636f8815e6d72822fc5d7288789449083d0826eb43e5e6f126c437a4a69df2e2d4f88c4a51d12621a6df985a0beb705d28d161dea82a9c4d379730f15cfb932a74d75cf4e8eb82d36b1ab1f83f966a41cf8f5c48aa6197bf17498f4572ed8f6e9c4f1e341a6742dc34b20a4827a21d81263714af18986c1d264a031edfe28d23717d4dff92dfb9c43877bf5818a6f4de56904e14776aef16eb4800865dde70975b5ef9d15c56ff8dec12ec11765d32"], &(0x7f0000000040)=0xaa4) 19:35:33 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fcntl$setpipe(r0, 0x407, 0x100) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xffff, 0x4000) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r2 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000080)=0x10000, &(0x7f00000000c0)=0x4) 19:35:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 19:35:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 19:35:34 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x100000001, 0x5, 0x2, 0x0, 0x0, 0xffff, 0x1, 0x1, 0x7, 0x3, 0x8, 0x84, 0x8, 0x9, 0xd168, 0x8, 0x5, 0xffff, 0x101, 0xb02f, 0x2, 0x2, 0x7, 0x10001, 0x8, 0x7, 0xfffffffffffffffb, 0x8, 0x5, 0x70e2e6dc, 0x1f, 0x100000001, 0x9, 0x3, 0x1, 0x3c, 0x0, 0x17ed, 0x4, @perf_bp={&(0x7f0000000000), 0xc}, 0x20000, 0xffffffff, 0x7, 0x7, 0x4, 0x71, 0xfffffffffffff000}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x22000, 0x0) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:34 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) io_setup(0x80, 0x0) io_submit(0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ax25_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getresgid(0x0, 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x1, 0x2) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000380)={0x5, 0x1f, 0x7fff, 0x10000, 0x19, 0x9, 0x1000, 0x8, 0x3, 0x9, 0x1f, 0x49}) setxattr$system_posix_acl(0x0, &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, &(0x7f0000000200)={0x0, 0x3}) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mkdir(&(0x7f0000000040)='./file1\x00', 0x10) mount$overlay(0x0, 0x0, &(0x7f0000000340)='overlay\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) gettid() ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, &(0x7f0000000140)={0x4, 0x1, 0x54, 0x0, 0x9, 0x34, 0xc}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x9, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4, 0x7, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7fff, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6dd, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x8, 0x0, 0x18, 0x1, 0x0, 0x4, 0x1, 0xffffffff, 0x0, 0x80, 0x1, @perf_bp={&(0x7f0000000080)}, 0xf87c3545a26a24, 0x0, 0x8, 0x5, 0x180000000000000, 0x0, 0x8}, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:35:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 791.257329][ T3941] overlayfs: lowerdir is in-use as upperdir/workdir [ 791.281196][ T3952] overlayfs: workdir and upperdir must reside under the same mount 19:35:34 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000005440)=[{{0x0, 0xfffffffffffffe0f, 0x0, 0x2c7}}], 0x37057be971acaa1, 0x10) poll(&(0x7f0000000080)=[{r0, 0x8688}], 0x1, 0x80000001) close(r0) 19:35:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') fchmod(r0, 0x0) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) 19:35:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48}], 0x0, 0x0) 19:35:34 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) close(r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000180)) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000140)={0x1, 0xb5, &(0x7f0000000080)="d2d669df3112caa597c1272e5039b9dc72b5b82c20d7f241afd3435ff56c67f182a35901d5c75571d66a20b45c2a2bf7f419fc75123aa537744c0d6b9c955eb07cfa193f8f355c622e158df662dfdf3feadcef201a62075f1756949eb28a62f503b9e847a08348fd9ea5032d3e3b759e2afbdddcb08f32c089e85f4bbe60903ce1e6d89d0b19b6cdc9503e7d62b548f1bb9ae24f92289812e55703a4c1ec891b76800804e5358bec573f5f574edd081196e4f000ab"}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:34 executing program 5: ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x6000, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x78) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x303, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) bind$ax25(r0, &(0x7f00000002c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5}, [@default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) 19:35:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:34 executing program 1: r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) r2 = dup2(r1, r0) ioctl$PIO_SCRNMAP(r2, 0x4b41, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$rose(r3, &(0x7f00000000c0)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, 0x1c) 19:35:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48}], 0x0, 0x0) 19:35:34 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0xfee9) close(r1) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x200, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x90000, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, 0x0) [ 791.646135][ T4071] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 791.656982][ T4071] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 791.668948][ T4071] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 19:35:34 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000080)=0x4) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000140)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) fsmount(r1, 0x1, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0xc0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 19:35:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 791.698625][ T4071] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:35:35 executing program 4: r0 = socket$kcm(0x11, 0x0, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x29, 0x0, 0x0) recvmsg(r0, &(0x7f000000cec0)={0x0, 0x0, 0x0}, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x02') kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, r0, &(0x7f0000000000)={r4, r3, 0x7}) 19:35:35 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r0) r2 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x101, 0x98000) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f00000001c0)={0x31}) r3 = fcntl$dupfd(r0, 0x406, r0) setsockopt$inet6_dccp_buf(r3, 0x21, 0x2, &(0x7f0000000080)="239b17e1921e31c90efc5cf65903f49e9dfe34c764dae61fd2a84e771afdad05ec923e2d0ffaf7d4b2688a09d19dd08f27e26d6fba068fd36f881619963a18d1f8f3ec71b608e963826db81dbba4ec2967624459e9b15ac49ac929beb609c9c458ad27e42ff59cbbd3d1625317e17a5e56a18fa3393352ab3b6765cc3fcef6731e9a4a7b84768f7b85435fd153012c55182afb50bb42d66a46277f8e8b56bddf831ee4baf82907d61afaaeec4949c6a418dac1021226361658ebd016e6bfa66f39b18b155d", 0xc5) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r3, 0xc0305710, &(0x7f0000000000)={0x0, 0x30000, 0xffffffffffffffff, 0x9}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0x40505331, 0x0) 19:35:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48}], 0x0, 0x0) 19:35:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) socket$isdn(0x22, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000001c0)=0xc9, 0x4) clock_gettime(0x0, &(0x7f0000004b00)) listen(r2, 0xfc0004) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4}, 0xb) recvmmsg(r3, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x500, 0x0, &(0x7f0000004a80)={0x77359400}) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 19:35:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0xfffffffffffffffe) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000140)=ANY=[@ANYBLOB="020b000000000000040103040100c2040001000101060000000000000401ffc529342bf1c8a8b4fd6dd2d628f71626b43ef88101e227b3740494872fc8cbe5b8b4362a66fb5fb92755c88d1a0f3c902c89e284e8a888f6000100010400000000c910fe800000000089aec375b520676faf0da017d3e46dc03c91ab6d97b533c98a985afc125f98388627ba1b500cfa2902508861a98032a9993b8a8a42534be06e6da778be8309de00b5014898254c9b71d97b9b2c3e095c9e79b03086ac333fd0e895"], 0x68) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='&\x00') sendmmsg(r1, &(0x7f0000007e00), 0x136a88c8311572c, 0x11) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x1, 0x0) write$apparmor_current(r2, &(0x7f0000000100)=@hat={'changehat ', 0x2, 0x5e, ['}!em1!trustedprockeyring\x00', '%\x00']}, 0x38) 19:35:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:35 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x80000001) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200080, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x4, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8010}, 0x40000) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x20000000000006}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) sendfile(r1, r3, 0x0, 0x10000) finit_module(r3, &(0x7f00000001c0)='\x00', 0x2) 19:35:35 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x400000) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000080)) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) bind$vsock_dgram(r2, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:35 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf\\\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:35 executing program 5: syz_emit_ethernet(0x3e, &(0x7f00000000c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaaaa0800450000300000000000029078ac7014bbac1414001184907800000200450000060000000000000000ac1014aaac141400f3d7c06afe5f5bbac5fe634002dc4fa5d4c58d260f40698cba127873c6bf31263dd0dc365ee578d2136839273de3170548f0b23ec62b9c0a5f27a6863507c4cf80279d4338aa45b24baabbfc9bb2484b26372e70e09f9bea"], 0x0) [ 792.724363][ T4356] FAULT_INJECTION: forcing a failure. [ 792.724363][ T4356] name failslab, interval 1, probability 0, space 0, times 0 [ 792.792915][ T4356] CPU: 0 PID: 4356 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 792.800840][ T4356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 792.810914][ T4356] Call Trace: [ 792.814215][ T4356] dump_stack+0x172/0x1f0 [ 792.818555][ T4356] should_fail.cold+0xa/0x15 [ 792.823161][ T4356] ? fault_create_debugfs_attr+0x180/0x180 [ 792.828967][ T4356] ? page_to_nid.part.0+0x20/0x20 [ 792.833988][ T4356] ? ___might_sleep+0x163/0x280 [ 792.838841][ T4356] __should_failslab+0x121/0x190 [ 792.843772][ T4356] should_failslab+0x9/0x14 [ 792.848273][ T4356] __kmalloc+0x2e0/0x770 [ 792.852520][ T4356] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 792.858849][ T4356] ? fput_many+0x12c/0x1a0 [ 792.863285][ T4356] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 792.869538][ T4356] ? strnlen_user+0x1ed/0x2e0 [ 792.874214][ T4356] ? __x64_sys_memfd_create+0x13c/0x470 [ 792.879749][ T4356] __x64_sys_memfd_create+0x13c/0x470 [ 792.879764][ T4356] ? switch_fpu_return+0x1fa/0x4f0 19:35:36 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000200)='/dev/video#\x00', 0x2, 0x2) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = accept(r1, &(0x7f00000004c0)=@nfc, &(0x7f0000001500)=0x6e) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000440)=@assoc_value={0x0, 0xffff}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000001740)=ANY=[@ANYRES64=0x0, @ANYRES32=r3, @ANYRES16=r0, @ANYRESHEX=r0, @ANYRES64=r0, @ANYPTR, @ANYRESDEC=r2, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f0000001540)=ANY=[@ANYPTR, @ANYPTR64, @ANYRES32=r0, @ANYRESDEC=r0, @ANYRES32=r2, @ANYPTR, @ANYRESHEX=r3, @ANYBLOB="e6a8671051a0a4d4082ce519bbfe786bb07d1158b64dd7c3cd2e9c0fe181557a58aabc3fb2b11fbbe4ecda6cba9ef3ef35c0f032dd53b543a7e6faa323f55e3c974158eb58658616066969d3580148a3545487c112302ad2704510bbb8b3fca9e42ed955d9"], @ANYRES16=0x0, @ANYRES32=r3, @ANYRESOCT=r0], @ANYRESDEC=0x0], 0x9) alarm(0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000140)={r3}, 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000080)={r4, 0xffffffffffffff68, 0xc1}, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)="e151e4f029787aae0584a3ec8a7003e042bfd49ef111cef0de956cafb6095352cfbbd36cb8c1ee9eee0ca570a77cdb86a98953d8238e44f0de3eff9b909c821cf1803e22e265d4b57756a161f6afbef8e66cb0659e1ef759a8e7cf254bb81f9bddf76c89d77df19e7ee46d33a5fd10bc2900a56f116b8c8945dd1cc4c9594934d0986def0567817847f6ce1b2f2b331dc46caea0ed867b8f898011f29a9bd103d0b0d7c7171b016b37d50d00de2f24cd54b6bb9eaf4e8da152862a52d322113db73e98199a05d7b44e5484403b763a5f04df801fd0887b74d1a4e1c94b2290378162afccca65160bda71102da1c43d9c2933", &(0x7f0000000340)=""/193) 19:35:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x22c2, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000300)=0xf000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={r3, r4, r5}, 0xc) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x401, 0x40) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x6, 0x6b5f8e0704099932) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x40000, 0x120) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r6, 0x40505331, 0x0) 19:35:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x400000) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000080)) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) bind$vsock_dgram(r2, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) [ 792.879777][ T4356] ? memfd_fcntl+0x1580/0x1580 [ 792.879791][ T4356] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 792.879808][ T4356] ? trace_hardirqs_off_caller+0x65/0x230 [ 792.906932][ T4356] ? trace_hardirqs_on+0x67/0x240 [ 792.911964][ T4356] do_syscall_64+0xfd/0x6a0 [ 792.916471][ T4356] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 792.922354][ T4356] RIP: 0033:0x459879 [ 792.926247][ T4356] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 792.945856][ T4356] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 792.954306][ T4356] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 792.962278][ T4356] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 792.970253][ T4356] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 792.978235][ T4356] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f901b50c6d4 19:35:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:36 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000140)=0x4) r1 = socket$inet(0x2, 0x2, 0x4000000000000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x8, 0x4100) ioctl$TCXONC(r3, 0x540a, 0x1f6) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000040)={0x9f}) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000040)=0x200000a, 0x2db) syz_emit_ethernet(0x2a, &(0x7f0000359fd5)={@link_local={0x1, 0x80, 0xc2, 0x400000000000000, 0x43050000}, @empty=[0x1c008848, 0x0, 0x14, 0x0, 0x0, 0x8847000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) [ 792.986207][ T4356] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:35:36 executing program 1: syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f00000000c0)=0x1, 0x4) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000040)={@local, @multicast2}, &(0x7f0000000080)=0x8) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000000)={'tunl0\x00', @ifru_flags}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000140)={0x21, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x4, 'lblcr\x00', 0x2d, 0x3, 0x33}, 0x2c) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) 19:35:36 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:36 executing program 4: r0 = socket(0x1, 0x1, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$NBD_DO_IT(r1, 0xab08) 19:35:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 793.172537][ T4572] FAULT_INJECTION: forcing a failure. [ 793.172537][ T4572] name failslab, interval 1, probability 0, space 0, times 0 [ 793.213487][ T4572] CPU: 1 PID: 4572 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 793.218014][ T4576] block nbd4: NBD_DISCONNECT [ 793.221415][ T4572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 793.221421][ T4572] Call Trace: [ 793.221444][ T4572] dump_stack+0x172/0x1f0 [ 793.221467][ T4572] should_fail.cold+0xa/0x15 [ 793.235997][ T4576] block nbd4: Send disconnect failed -107 [ 793.236095][ T4572] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 793.240163][ T4570] block nbd4: Disconnected due to user request. [ 793.243685][ T4572] ? fault_create_debugfs_attr+0x180/0x180 [ 793.243698][ T4572] ? page_to_nid.part.0+0x20/0x20 [ 793.243713][ T4572] ? ___might_sleep+0x163/0x280 [ 793.243732][ T4572] __should_failslab+0x121/0x190 [ 793.254591][ T4570] block nbd4: shutting down sockets [ 793.260041][ T4572] ? shmem_destroy_inode+0x80/0x80 [ 793.260057][ T4572] should_failslab+0x9/0x14 [ 793.260074][ T4572] kmem_cache_alloc+0x2aa/0x710 [ 793.277684][ T4576] block nbd4: NBD_DISCONNECT 19:35:36 executing program 4: faccessat(0xffffffffffffffff, 0x0, 0x21, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000080)={0x2, 0x0, [], {0x0, @reserved}}) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000400), 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000540)={0x0, 0xfffffffffffffffe}) r2 = socket$inet(0x2, 0x2, 0x0) dup3(r2, r0, 0x80000) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000000)={0x6, 0x0, 0xee74}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) [ 793.281997][ T4572] ? __alloc_fd+0x487/0x620 [ 793.282012][ T4572] ? __kasan_check_read+0x11/0x20 [ 793.282027][ T4572] ? shmem_destroy_inode+0x80/0x80 [ 793.282039][ T4572] shmem_alloc_inode+0x1c/0x50 [ 793.282059][ T4572] alloc_inode+0x68/0x1e0 [ 793.287522][ T4576] block nbd4: Send disconnect failed -107 [ 793.292158][ T4572] new_inode_pseudo+0x19/0xf0 [ 793.292171][ T4572] new_inode+0x1f/0x40 [ 793.292184][ T4572] shmem_get_inode+0x84/0x7e0 [ 793.292209][ T4572] __shmem_file_setup.part.0+0x7e/0x2b0 [ 793.297433][ T4576] block nbd4: Disconnected due to user request. [ 793.301781][ T4572] shmem_file_setup+0x66/0x90 [ 793.301799][ T4572] __x64_sys_memfd_create+0x2a2/0x470 [ 793.301813][ T4572] ? memfd_fcntl+0x1580/0x1580 [ 793.301834][ T4572] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 793.306927][ T4576] block nbd4: shutting down sockets [ 793.311234][ T4572] ? trace_hardirqs_off_caller+0x65/0x230 [ 793.311247][ T4572] ? trace_hardirqs_on+0x67/0x240 [ 793.311264][ T4572] do_syscall_64+0xfd/0x6a0 [ 793.311279][ T4572] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 793.311292][ T4572] RIP: 0033:0x459879 [ 793.416575][ T4572] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 793.436173][ T4572] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 793.444574][ T4572] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 793.452522][ T4572] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 19:35:36 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x80000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) fcntl$setlease(r1, 0x400, 0x3) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000100}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, r3, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x410}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffffffffffffb}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x8050}, 0x4000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="fdc5376659966b0ace78f1fec4a27a0dd5bb47cc41ebfb3e46eec8b0d868df5e0db2723207b5b49627870b900f5f153112b82baecc31d82b5ddff2eab5321268a37acb2753f01b73df3e0400351f8e7a1283add4bc56f70a77cd2ec0852ac582d70232877a923f242a62fc926c33aaee0d92a96d52e5569911d84ea2c5a321d48337bd80ecf8056161b6156469a52ba502eb017757c0b900ccc7932f24a77f"], 0x1) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x0, 'rdma'}]}, 0x6) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x100000001, 0x44600) openat$vimc0(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video0\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'pids'}]}, 0xa00) 19:35:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) r1 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000280)=',vboxnet0vboxnet0-ppp0@/mime_type\x00', 0xfffffffffffffffa) add_key(0x0, 0x0, &(0x7f0000000080)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, r1) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000240)={'ipddp0\x00', {0x2, 0x4e21, @loopback}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETS(r2, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x20000}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000040)={0x20, 0x3ff}) 19:35:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TCSETX(r2, 0x5433, &(0x7f0000000080)={0x16, 0x5, [0x7, 0x3, 0xf7, 0x7, 0x1], 0x9}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000000c0)={0xc99, 0x7, 0xffffffffffffff7f, 0x6, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r3, @in={{0x2, 0x4e21, @broadcast}}, 0x20, 0x5}, &(0x7f0000000200)=0x90) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 793.460478][ T4572] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 793.468432][ T4572] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f901b50c6d4 [ 793.476390][ T4572] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:35:36 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20800, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f0000000080)=""/4096) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0xa4}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f0000000080)={r3}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r4, r0, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, 0xffffffffffffffff, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000280)={'IDLETIMER\x00'}, &(0x7f0000000400)=0x1e) 19:35:36 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x680040, 0x0) ioctl$VIDIOC_S_CROP(r0, 0xc0845657, &(0x7f0000000100)) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000000)) [ 793.703330][ T4798] FAULT_INJECTION: forcing a failure. [ 793.703330][ T4798] name failslab, interval 1, probability 0, space 0, times 0 [ 793.721874][ T4691] IPVS: ftp: loaded support on port[0] = 21 [ 793.763926][ T4798] CPU: 1 PID: 4798 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 793.771862][ T4798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 793.781921][ T4798] Call Trace: [ 793.785222][ T4798] dump_stack+0x172/0x1f0 [ 793.789565][ T4798] should_fail.cold+0xa/0x15 [ 793.794161][ T4798] ? fault_create_debugfs_attr+0x180/0x180 [ 793.794178][ T4798] ? page_to_nid.part.0+0x20/0x20 [ 793.794191][ T4798] ? ___might_sleep+0x163/0x280 [ 793.794214][ T4798] __should_failslab+0x121/0x190 [ 793.809839][ T4798] should_failslab+0x9/0x14 [ 793.809858][ T4798] kmem_cache_alloc+0x2aa/0x710 [ 793.809869][ T4798] ? lock_acquire+0x190/0x410 [ 793.809885][ T4798] ? current_time+0x6b/0x140 [ 793.819286][ T4798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 793.819299][ T4798] ? timespec64_trunc+0xf0/0x180 [ 793.819315][ T4798] __d_alloc+0x2e/0x8c0 [ 793.819339][ T4798] d_alloc_pseudo+0x1e/0x70 [ 793.828815][ T4798] alloc_file_pseudo+0xe2/0x280 [ 793.828829][ T4798] ? alloc_file+0x4d0/0x4d0 [ 793.828849][ T4798] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 793.828869][ T4798] __shmem_file_setup.part.0+0x108/0x2b0 [ 793.828890][ T4798] shmem_file_setup+0x66/0x90 [ 793.839672][ T4798] __x64_sys_memfd_create+0x2a2/0x470 [ 793.839688][ T4798] ? memfd_fcntl+0x1580/0x1580 [ 793.839702][ T4798] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 793.839716][ T4798] ? trace_hardirqs_off_caller+0x65/0x230 [ 793.839726][ T4798] ? trace_hardirqs_on+0x67/0x240 [ 793.839749][ T4798] do_syscall_64+0xfd/0x6a0 19:35:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f00000004c0), 0x400000000000251, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000040)=0x3, 0x4) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x4000) setsockopt$inet_buf(r1, 0x0, 0x11, &(0x7f0000000100)="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", 0x1000) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) io_setup(0x0, &(0x7f0000001100)=0x0) io_getevents(r2, 0x1, 0x4, &(0x7f0000001140)=[{}, {}, {}, {}], 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f00000011c0)) 19:35:37 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) mq_unlink(&(0x7f0000000100)='eth0\x00') close(r1) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$TIOCGSOFTCAR(r3, 0x5419, &(0x7f0000000080)) ioctl$TCFLSH(r2, 0x540b, 0x3) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x84c7) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f0000000240)=""/106) ioctl$SIOCAX25DELFWD(r3, 0x89eb, &(0x7f00000000c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}) close(r0) [ 793.849057][ T4798] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 793.849067][ T4798] RIP: 0033:0x459879 [ 793.849082][ T4798] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 793.849088][ T4798] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 793.858411][ T4798] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 793.858419][ T4798] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 793.858427][ T4798] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 793.858435][ T4798] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f901b50c6d4 [ 793.858442][ T4798] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:35:37 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2a) 19:35:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:37 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="c0dca5055e0bcfec7bf070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000180)='\x00'}, 0x30) r2 = gettid() kcmp(r1, r2, 0x0, r0, r0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') write$rfkill(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x6}, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xc, 0x0}, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000540), &(0x7f0000000700)=0xfee4) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000440)=0x4018) ioctl$BLKGETSIZE64(r3, 0x80081272, &(0x7f00000006c0)) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$VIDIOC_S_CROP(r3, 0x4014563c, &(0x7f0000000340)={0x5, {0x3, 0xfff, 0x8, 0x20}}) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYRES16=0x0, @ANYBLOB='\\'], 0x2}}, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f00000007c0)={0x0, 0x3a3, 0x8001, 'queue0\x00', 0xf1716ab}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) 19:35:37 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = dup(r0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @broadcast}}}, &(0x7f0000000000)=0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0xfffffffffffffff7, 0x8000, 0x5, 0x5, r2}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x22, 0x0, 0x617) 19:35:37 executing program 1: r0 = io_uring_setup(0xa4, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x3c045bae18209969) [ 794.298424][ T4927] IPVS: ftp: loaded support on port[0] = 21 [ 794.373228][ T4930] FAULT_INJECTION: forcing a failure. [ 794.373228][ T4930] name failslab, interval 1, probability 0, space 0, times 0 [ 794.417632][ T4930] CPU: 0 PID: 4930 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 794.425560][ T4930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 794.425567][ T4930] Call Trace: [ 794.425588][ T4930] dump_stack+0x172/0x1f0 [ 794.425607][ T4930] should_fail.cold+0xa/0x15 [ 794.425622][ T4930] ? __kasan_check_read+0x11/0x20 [ 794.425636][ T4930] ? fault_create_debugfs_attr+0x180/0x180 [ 794.425647][ T4930] ? page_to_nid.part.0+0x20/0x20 [ 794.425663][ T4930] ? ___might_sleep+0x163/0x280 [ 794.425680][ T4930] __should_failslab+0x121/0x190 [ 794.425696][ T4930] should_failslab+0x9/0x14 [ 794.425707][ T4930] kmem_cache_alloc+0x2aa/0x710 [ 794.425721][ T4930] ? rwlock_bug.part.0+0x90/0x90 [ 794.425732][ T4930] ? __d_instantiate+0x82/0x470 [ 794.425752][ T4930] ? lock_downgrade+0x920/0x920 [ 794.458804][ T4930] __alloc_file+0x27/0x340 [ 794.458820][ T4930] alloc_empty_file+0x72/0x170 [ 794.458834][ T4930] alloc_file+0x5e/0x4d0 [ 794.458849][ T4930] alloc_file_pseudo+0x189/0x280 19:35:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 794.458863][ T4930] ? alloc_file+0x4d0/0x4d0 [ 794.458877][ T4930] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 794.458897][ T4930] __shmem_file_setup.part.0+0x108/0x2b0 [ 794.458913][ T4930] shmem_file_setup+0x66/0x90 [ 794.458929][ T4930] __x64_sys_memfd_create+0x2a2/0x470 [ 794.458947][ T4930] ? memfd_fcntl+0x1580/0x1580 [ 794.547211][ T4930] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 794.553294][ T4930] ? trace_hardirqs_off_caller+0x65/0x230 [ 794.559024][ T4930] ? trace_hardirqs_on+0x67/0x240 19:35:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 794.564233][ T4930] do_syscall_64+0xfd/0x6a0 [ 794.568750][ T4930] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 794.574637][ T4930] RIP: 0033:0x459879 [ 794.578535][ T4930] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 794.598323][ T4930] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 794.606744][ T4930] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 19:35:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 794.614720][ T4930] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 794.622702][ T4930] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 794.630674][ T4930] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f901b50c6d4 [ 794.638643][ T4930] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:35:37 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x81, 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) 19:35:37 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4ed1, 0x440) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @remote, @dev}, &(0x7f0000000080)=0xc) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6, @local}, 0x10) 19:35:37 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000}, 0x0, 0xffffffffffffffff, r0, 0x0) readv(r0, &(0x7f00000024c0)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f00000000c0)={0x7, 0xcaef54c, 0x1, 0x5ecc7528, 0x2, 0x9}) 19:35:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) close(r0) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000280)) 19:35:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x02', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 794.902064][ T5106] FAULT_INJECTION: forcing a failure. [ 794.902064][ T5106] name failslab, interval 1, probability 0, space 0, times 0 19:35:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x200100) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x1, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x400, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x8a001, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, 0x0) [ 794.963132][ T5162] QAT: Invalid ioctl [ 794.984603][ T5106] CPU: 0 PID: 5106 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 794.992531][ T5106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 795.002589][ T5106] Call Trace: [ 795.005900][ T5106] dump_stack+0x172/0x1f0 [ 795.010251][ T5106] should_fail.cold+0xa/0x15 [ 795.014859][ T5106] ? fault_create_debugfs_attr+0x180/0x180 [ 795.020677][ T5106] ? page_to_nid.part.0+0x20/0x20 [ 795.025711][ T5106] ? ___might_sleep+0x163/0x280 [ 795.030611][ T5106] __should_failslab+0x121/0x190 [ 795.035578][ T5106] should_failslab+0x9/0x14 [ 795.040093][ T5106] kmem_cache_alloc+0x2aa/0x710 [ 795.044952][ T5106] ? memcg_kmem_put_cache+0x3e/0x50 [ 795.050148][ T5106] ? kmem_cache_alloc+0x314/0x710 [ 795.055173][ T5106] security_file_alloc+0x39/0x170 [ 795.055187][ T5106] __alloc_file+0xde/0x340 [ 795.055200][ T5106] alloc_empty_file+0x72/0x170 [ 795.055213][ T5106] alloc_file+0x5e/0x4d0 [ 795.055226][ T5106] alloc_file_pseudo+0x189/0x280 [ 795.055243][ T5106] ? alloc_file+0x4d0/0x4d0 [ 795.055261][ T5106] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 795.089693][ T5106] __shmem_file_setup.part.0+0x108/0x2b0 [ 795.089710][ T5106] shmem_file_setup+0x66/0x90 [ 795.089727][ T5106] __x64_sys_memfd_create+0x2a2/0x470 [ 795.089741][ T5106] ? memfd_fcntl+0x1580/0x1580 [ 795.089755][ T5106] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 795.089769][ T5106] ? trace_hardirqs_off_caller+0x65/0x230 [ 795.089780][ T5106] ? trace_hardirqs_on+0x67/0x240 [ 795.089797][ T5106] do_syscall_64+0xfd/0x6a0 [ 795.089812][ T5106] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 795.089823][ T5106] RIP: 0033:0x459879 [ 795.089842][ T5106] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 795.162508][ T5106] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 795.166990][ T5165] QAT: Invalid ioctl [ 795.170999][ T5106] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 19:35:38 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x100000000, 0x98000) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x2, 0x0, 0x0, 0x76}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000300)) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r0, &(0x7f0000000140)="85b4d5616408206a5c618a8b457a9aa174e48c5b5c241bd6c7b73461eae8402cb48c06e4f34a210474da0ee9b9eb09acbc4c17a34b2c59830e83b36d37dc9b87b9785949327d2bafde1ade178a057ffddd3923f04f1ee670d4b2cd61cbbc323f15e084424f97a428fdc52a0a80ceabc52efb7f83c37f1e7c179f65cf399cc760f334af25d61ac28907e090bb2ea2edce86cec597adced5e67c038fbfa0495c7300ff4527753eb67b061d6bcd4c27c5ef8c7014bd1797631a28eb777dd44ad298d81a193c6afab8ce441932cb611978bc59d9ccc40de68c3bbe55bf7b27557783445160dabd1d89a690528d75", &(0x7f0000000240)=""/116}, 0x18) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x25dfdbff, 0x1040}, 0xc) 19:35:38 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000180)=""/246) r1 = socket$caif_seqpacket(0x25, 0x5, 0x5) listen(r1, 0x1) ioctl$EVIOCGREP(r0, 0x4004743c, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0xa0) getsockopt$inet6_tcp_int(r1, 0x6, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 795.171006][ T5106] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 795.171014][ T5106] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 795.171020][ T5106] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f901b50c6d4 [ 795.171035][ T5106] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:35:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_UIE_ON(r2, 0x7003) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:38 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:38 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) r3 = gettid() openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x200, 0x0) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000500"/120], 0x78) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x86, 0x1, 0x2, "17551487c3be903a76c1736669756808", "7b75b41935c234f2d61ee877ccba60630db3e9f41dea7029dd30c643867aabf1e074b8fbbe1fa512153b2be6493563138ed4bc8e4b3d69abd38ebfd52e30dd23d9710e4bebd249018d6ca1db467256a1d8d3b3a89a18a3adc9fbc52c889d3b38705c7e37bfeaff4781eb2641d8cdeb7dd3"}, 0x86, 0x3) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:35:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x03', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:38 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000009031, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) munlock(&(0x7f0000927000/0x4000)=nil, 0x4000) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sync_file_range(r0, 0x6, 0x38f, 0xce5a9161e011c511) [ 795.350266][ T5282] FAULT_INJECTION: forcing a failure. [ 795.350266][ T5282] name failslab, interval 1, probability 0, space 0, times 0 [ 795.440931][ T5288] syz-executor.5 (5288) used obsolete PPPIOCDETACH ioctl [ 795.465770][ T5282] CPU: 1 PID: 5282 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 795.473709][ T5282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 795.484028][ T5282] Call Trace: [ 795.487386][ T5282] dump_stack+0x172/0x1f0 [ 795.491742][ T5282] should_fail.cold+0xa/0x15 [ 795.496350][ T5282] ? fault_create_debugfs_attr+0x180/0x180 [ 795.502165][ T5282] ? unwind_get_return_address+0x61/0xa0 [ 795.507807][ T5282] ? profile_setup.cold+0xbb/0xbb [ 795.512848][ T5282] ? ___might_sleep+0x163/0x280 [ 795.517718][ T5282] __should_failslab+0x121/0x190 [ 795.522674][ T5282] should_failslab+0x9/0x14 [ 795.527188][ T5282] __kmalloc+0x2e0/0x770 [ 795.531439][ T5282] ? mark_held_locks+0xf0/0xf0 [ 795.536207][ T5282] ? stack_trace_save+0xac/0xe0 [ 795.541149][ T5282] ? stack_trace_consume_entry+0x190/0x190 [ 795.546956][ T5282] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 795.554294][ T5282] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 795.560019][ T5282] tomoyo_realpath_from_path+0xcd/0x7b0 [ 795.565576][ T5282] ? tomoyo_path_perm+0x1cb/0x430 [ 795.570610][ T5282] tomoyo_path_perm+0x230/0x430 [ 795.575466][ T5282] ? tomoyo_path_perm+0x1cb/0x430 [ 795.580491][ T5282] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 795.586561][ T5282] ? __fget+0x35d/0x560 [ 795.590722][ T5282] ? __kasan_check_read+0x11/0x20 [ 795.595744][ T5282] ? __kasan_check_read+0x11/0x20 [ 795.600769][ T5282] ? __fget+0xa3/0x560 [ 795.604845][ T5282] ? lock_acquire+0x190/0x410 [ 795.609526][ T5282] ? do_sys_ftruncate+0x282/0x550 [ 795.614562][ T5282] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 795.620803][ T5282] tomoyo_path_truncate+0x1d/0x30 [ 795.625825][ T5282] security_path_truncate+0xf2/0x150 [ 795.631108][ T5282] do_sys_ftruncate+0x3d9/0x550 [ 795.635971][ T5282] __x64_sys_ftruncate+0x59/0x80 [ 795.640916][ T5282] do_syscall_64+0xfd/0x6a0 [ 795.645436][ T5282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 795.651326][ T5282] RIP: 0033:0x459847 [ 795.655233][ T5282] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 795.674839][ T5282] RSP: 002b:00007f901b50ba88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 795.683259][ T5282] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459847 [ 795.691234][ T5282] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 795.699255][ T5282] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 795.707237][ T5282] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 795.715211][ T5282] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:35:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x201, 0x0) write$P9_RMKNOD(r2, &(0x7f0000000080)={0x14, 0x13, 0x2, {0x68, 0x1, 0x8}}, 0x14) 19:35:39 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x7, 0x0) fstat(r0, &(0x7f0000000000)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000240)='/dev/snd/timer\x00', 0x0, 0xc2e80) pipe2(&(0x7f0000000340), 0x4000) prctl$PR_SET_DUMPABLE(0x4, 0x3) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=0xfffffffffffffffd, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @multicast1}, 0xf) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x2}) listen(0xffffffffffffffff, 0x10001) r1 = socket$key(0xf, 0x3, 0x2) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) syncfs(r1) [ 795.932459][ T5282] ERROR: Out of memory at tomoyo_realpath_from_path. 19:35:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x05', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000080)={r0, 0x0, 0x400000000007f, 0x2000010000, 0x20003}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:39 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) r3 = gettid() openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x200, 0x0) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000500"/120], 0x78) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x86, 0x1, 0x2, "17551487c3be903a76c1736669756808", "7b75b41935c234f2d61ee877ccba60630db3e9f41dea7029dd30c643867aabf1e074b8fbbe1fa512153b2be6493563138ed4bc8e4b3d69abd38ebfd52e30dd23d9710e4bebd249018d6ca1db467256a1d8d3b3a89a18a3adc9fbc52c889d3b38705c7e37bfeaff4781eb2641d8cdeb7dd3"}, 0x86, 0x3) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:35:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x06', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 796.218998][ T5509] IPVS: ftp: loaded support on port[0] = 21 19:35:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x10d, 0x7, 0x10000, "c7c6eaecfb51f889f298e619b569011f", "4ae30101594cf86a17f003296a9b019a1165931be0ccacf855326017c2c9773478bd110021d23a84c8b1a86555b5a7d09dec460bf3985dc4ae06a8158d8f05fe5a4ffc607513eb68aa7831957f1935098614c0d810f334e8e6799e3c498fc8da5916eaa6ff7f6f0478ef42aa7cba62a0a8d5fe66f021adca457fb01d5f91e3b372828b96b6d1dac57a1d362ef3004d8dd7aeff7860c6111949ee892bdba6a21d055a7ea8c7b00bb2aa0820ae2ed599e37b3d0a7ec47cce86913c0e9ef0596257992b88435ac8129df0069638215582a933401e11d619906dd79112415e9344b7eb2ffb26a6d8d9dcf654985a3179ecdaf9eed1443eda738e"}, 0x10d, 0x3) [ 796.477824][ T5622] FAULT_INJECTION: forcing a failure. [ 796.477824][ T5622] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 796.491053][ T5622] CPU: 0 PID: 5622 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 796.491063][ T5622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 796.491067][ T5622] Call Trace: [ 796.491087][ T5622] dump_stack+0x172/0x1f0 [ 796.491106][ T5622] should_fail.cold+0xa/0x15 [ 796.491128][ T5622] ? fault_create_debugfs_attr+0x180/0x180 [ 796.491141][ T5622] ? is_bpf_text_address+0xac/0x170 [ 796.491161][ T5622] ? __kasan_check_read+0x11/0x20 [ 796.538918][ T5622] should_fail_alloc_page+0x50/0x60 [ 796.544145][ T5622] __alloc_pages_nodemask+0x1a1/0x900 [ 796.549533][ T5622] ? __bpf_address_lookup+0x310/0x310 [ 796.554910][ T5622] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 796.560900][ T5622] ? __alloc_pages_slowpath+0x2520/0x2520 [ 796.566662][ T5622] ? kernel_text_address+0x73/0xf0 [ 796.572913][ T5622] ? fault_create_debugfs_attr+0x180/0x180 [ 796.578720][ T5622] cache_grow_begin+0x90/0xd20 [ 796.583492][ T5622] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 796.589821][ T5622] __kmalloc+0x6b2/0x770 [ 796.594065][ T5622] ? mark_held_locks+0xf0/0xf0 [ 796.598833][ T5622] ? stack_trace_save+0xac/0xe0 [ 796.603685][ T5622] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 796.609405][ T5622] tomoyo_realpath_from_path+0xcd/0x7b0 [ 796.614977][ T5622] ? tomoyo_path_perm+0x1cb/0x430 [ 796.614995][ T5622] tomoyo_path_perm+0x230/0x430 [ 796.615014][ T5622] ? tomoyo_path_perm+0x1cb/0x430 [ 796.629881][ T5622] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 796.635945][ T5622] ? __fget+0x35d/0x560 [ 796.640107][ T5622] ? __kasan_check_read+0x11/0x20 [ 796.645138][ T5622] ? __kasan_check_read+0x11/0x20 [ 796.650170][ T5622] ? __fget+0xa3/0x560 [ 796.654246][ T5622] ? lock_acquire+0x190/0x410 [ 796.658915][ T5622] ? do_sys_ftruncate+0x282/0x550 [ 796.663937][ T5622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 796.670195][ T5622] tomoyo_path_truncate+0x1d/0x30 19:35:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x4000, 0x0) recvfrom$netrom(r2, &(0x7f00000000c0)=""/85, 0x55, 0x40002100, &(0x7f0000000140)={{0x3, @bcast, 0x6}, [@default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default]}, 0x48) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) finit_module(r1, &(0x7f0000000000)='\x00', 0x2) 19:35:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\a', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 796.675227][ T5622] security_path_truncate+0xf2/0x150 [ 796.680508][ T5622] do_sys_ftruncate+0x3d9/0x550 [ 796.680523][ T5622] __x64_sys_ftruncate+0x59/0x80 [ 796.680537][ T5622] do_syscall_64+0xfd/0x6a0 [ 796.680554][ T5622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 796.680563][ T5622] RIP: 0033:0x459847 [ 796.680576][ T5622] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 796.680583][ T5622] RSP: 002b:00007f901b50ba88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 796.680595][ T5622] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459847 [ 796.680602][ T5622] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 796.680610][ T5622] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 796.680617][ T5622] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 796.680632][ T5622] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 797.013547][ T5511] IPVS: ftp: loaded support on port[0] = 21 19:35:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1010010}, 0xc, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="90020050", @ANYRES16=r4, @ANYBLOB="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"], 0x290}, 0x1, 0x0, 0x0, 0x20004004}, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000040)=@generic={0x3}) 19:35:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r2 = dup(r0) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000080)=""/4096) 19:35:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmmsg(r2, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000300)="53a855f17f0d6dbd3b2c56801fc96ffacbe20f01c88a9c776f5dd3ad9aae4d4354733cc6b78cfa099b9d287fabb08f57892ab4e7fae775346913a87bb8bbcef75f883b4db3a5761ae11ed9c82b8c4630b83108eb445a939814b019b3a418635e6764d655f7986834ade66c1bdad47e6bb519d7e818170c915f1fa41cb71e7156b02b9d05b575971e068dfcc8a57e52de58763eb7f4f2823627fb89e7f393f0fa3cc03e47fc7ad7a806e78d8f8a", 0xad}], 0x0, 0x0, 0x36a}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000500)="1d9483399730c1271e38242afeba9b", 0xf}, {&(0x7f0000000040)="e5", 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0), 0x2bb}}], 0x3, 0x40) 19:35:40 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) r3 = gettid() openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x200, 0x0) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000500"/120], 0x78) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x86, 0x1, 0x2, "17551487c3be903a76c1736669756808", "7b75b41935c234f2d61ee877ccba60630db3e9f41dea7029dd30c643867aabf1e074b8fbbe1fa512153b2be6493563138ed4bc8e4b3d69abd38ebfd52e30dd23d9710e4bebd249018d6ca1db467256a1d8d3b3a89a18a3adc9fbc52c889d3b38705c7e37bfeaff4781eb2641d8cdeb7dd3"}, 0x86, 0x3) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:35:40 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) fchmod(r0, 0x0) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xf8, 0x3) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'yam0\x00', r1}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5000000013000100"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000300016002c000100280003000000000000000000050000000000000000004000"/56], 0x50}}, 0x0) 19:35:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 797.948246][ T5978] FAULT_INJECTION: forcing a failure. [ 797.948246][ T5978] name failslab, interval 1, probability 0, space 0, times 0 19:35:41 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket(0x8, 0x800, 0x3) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r0, 0x406, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000c40)={0xffffffffffffffff}) pipe(&(0x7f0000000c80)={0xffffffffffffffff}) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000d80)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000d40)={&(0x7f0000000cc0)={0x7c, r2, 0xe00, 0x70bd2d, 0x25dfdbff, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x4}, @NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}]}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xe539}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xa8e}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r7, 0x80047437, &(0x7f0000000140)) setsockopt$inet_tcp_buf(r8, 0x6, 0x21, &(0x7f0000000080)="4cb0561ec9d6122869a5ecee3b445e5017bee3596d5b832d41daa57371c8de5e977c571e99c60978f8ee94808a6d02cfdccc1df2ed4a07a13b5464ef108453f1e8892d408293c103bdf1e2c3696ddcb281a7fd01617e4a9e37b830f0f09a6e4951fed1beed4338e13961270073f189f4339785578e934af6d3cc51652cc4", 0x7e) setsockopt$netlink_NETLINK_TX_RING(r8, 0x10e, 0x7, &(0x7f0000000100)={0x9, 0xf2, 0x94f, 0x6170a3d6}, 0x10) close(r7) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) [ 798.022207][ T5978] CPU: 1 PID: 5978 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 798.030140][ T5978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 798.040285][ T5978] Call Trace: [ 798.043585][ T5978] dump_stack+0x172/0x1f0 [ 798.047929][ T5978] should_fail.cold+0xa/0x15 [ 798.052526][ T5978] ? __kasan_check_read+0x11/0x20 [ 798.057554][ T5978] ? fault_create_debugfs_attr+0x180/0x180 [ 798.063366][ T5978] ? __kasan_check_write+0x14/0x20 [ 798.068492][ T5978] ? lock_downgrade+0x920/0x920 [ 798.073357][ T5978] ? ___might_sleep+0x163/0x280 [ 798.078212][ T5978] __should_failslab+0x121/0x190 [ 798.083153][ T5978] should_failslab+0x9/0x14 [ 798.087660][ T5978] __kmalloc+0x2e0/0x770 [ 798.091906][ T5978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 798.098170][ T5978] ? simple_dname+0xd1/0x1f0 [ 798.102762][ T5978] ? tomoyo_encode2.part.0+0xf5/0x400 [ 798.108150][ T5978] tomoyo_encode2.part.0+0xf5/0x400 [ 798.113351][ T5978] tomoyo_encode+0x2b/0x50 [ 798.117764][ T5978] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 798.123560][ T5978] ? tomoyo_path_perm+0x1cb/0x430 [ 798.128582][ T5978] tomoyo_path_perm+0x230/0x430 [ 798.133423][ T5978] ? tomoyo_path_perm+0x1cb/0x430 [ 798.138451][ T5978] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 798.144524][ T5978] ? __fget+0x35d/0x560 [ 798.148677][ T5978] ? __kasan_check_read+0x11/0x20 [ 798.153698][ T5978] ? __kasan_check_read+0x11/0x20 [ 798.158721][ T5978] ? __fget+0xa3/0x560 [ 798.162792][ T5978] ? lock_acquire+0x190/0x410 [ 798.167463][ T5978] ? do_sys_ftruncate+0x282/0x550 19:35:41 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) r3 = gettid() openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x200, 0x0) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000500"/120], 0x78) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x86, 0x1, 0x2, "17551487c3be903a76c1736669756808", "7b75b41935c234f2d61ee877ccba60630db3e9f41dea7029dd30c643867aabf1e074b8fbbe1fa512153b2be6493563138ed4bc8e4b3d69abd38ebfd52e30dd23d9710e4bebd249018d6ca1db467256a1d8d3b3a89a18a3adc9fbc52c889d3b38705c7e37bfeaff4781eb2641d8cdeb7dd3"}, 0x86, 0x3) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 798.172500][ T5978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 798.178741][ T5978] tomoyo_path_truncate+0x1d/0x30 [ 798.183773][ T5978] security_path_truncate+0xf2/0x150 [ 798.189065][ T5978] do_sys_ftruncate+0x3d9/0x550 [ 798.193915][ T5978] __x64_sys_ftruncate+0x59/0x80 [ 798.198857][ T5978] do_syscall_64+0xfd/0x6a0 [ 798.203364][ T5978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 798.209256][ T5978] RIP: 0033:0x459847 [ 798.213143][ T5978] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 798.232743][ T5978] RSP: 002b:00007f901b50ba88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 798.241149][ T5978] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459847 [ 798.249115][ T5978] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 798.257078][ T5978] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 798.265038][ T5978] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 798.273004][ T5978] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:35:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="c0dca5055e0bcfec7bf070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) recvfrom$rose(r1, &(0x7f0000000000)=""/11, 0xb, 0x0, &(0x7f0000000080)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x1, @null}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000440)=0x4018) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000740)={0x3, 0x0, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000540), 0x4) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000480)='{{nodev\x00') ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 19:35:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) sync_file_range(r1, 0x4ff4, 0x4, 0x2) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000000)=0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)) r2 = syz_open_pts(r1, 0x4000000000000005) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) writev(r0, &(0x7f0000000500)=[{&(0x7f00000001c0)="89", 0x1}], 0x1) ioctl$TCXONC(r3, 0x540a, 0x1) 19:35:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:41 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r2 = getpgrp(0xffffffffffffffff) r3 = getuid() fstat(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={r2, r3, r4}, 0xc) [ 798.533842][ T5978] ERROR: Out of memory at tomoyo_realpath_from_path. 19:35:41 executing program 1: ioctl$VIDIOC_SUBDEV_S_FMT(0xffffffffffffffff, 0xc0585605, &(0x7f0000000200)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x20c82, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000140)={0xfffffffffffffd4c}, 0x38c) dup3(r0, r1, 0x0) accept$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x17, 0x1ff, 0x2, 0x7, 0x109, r1, 0x6, [], r2, 0xffffffffffffffff, 0x4, 0x2}, 0x3c) 19:35:41 executing program 3 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:41 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0x94, "fd1b66c77c84a4c4a4d316d6fe8854326f698c7ea3ba8df49743fb3628a4a93766e4dcd38fd0a5da55dbe5f55e71829764fdb011d4b15d0f9ece84b8c3e2fada049575e553640be2bc7e11afc526eb027700f4affca4c327fca5b34501ba1698b8467ff789b1716dee76e04ddae4aa3fac9438827d1cf485471f41862d65032b015666b474bdd0c336afd75e79d01009c0f6b5c2"}, &(0x7f0000000140)=0x9c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000180)={r3, 0xef, "9bd676beaeb5f0172c85f9e1af83f65ae5e6990b09e7ece0293caa6fbc14e0d57f1ecfad08313a07a0912a59fcdf50723e416ba80ec67182b8768aea3dcd0b5b35ab79575399d045327a43a346a43a36ba1a9380dcf4027fe727f85b57e2b58bef74a92543ac2f3cc0cc13d2a15c959ac1e22eb7c5fe5b61f67b6605ff35b594b43f425f28fc591320b3a16db704e18d6789ccf06ac02900c6fa2ed2a65b220b071ac5c69b1901a12529568dce9bb9d883cfe3848513282a11d1ea53b13e2be8a4fa22688a0cbb5ba1245f70617cad15d7e876fc73974d3fc38aa2edadc916153f864f3a4ba525c04d6f6fa695e18b"}, &(0x7f0000000280)=0xf7) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) [ 798.743012][ T6309] FAULT_INJECTION: forcing a failure. [ 798.743012][ T6309] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 798.835881][ T6309] CPU: 0 PID: 6309 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 798.843822][ T6309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 798.853882][ T6309] Call Trace: [ 798.857190][ T6309] dump_stack+0x172/0x1f0 [ 798.861530][ T6309] should_fail.cold+0xa/0x15 [ 798.866133][ T6309] ? fault_create_debugfs_attr+0x180/0x180 [ 798.871962][ T6309] ? ___might_sleep+0x163/0x280 [ 798.876829][ T6309] should_fail_alloc_page+0x50/0x60 [ 798.882040][ T6309] __alloc_pages_nodemask+0x1a1/0x900 [ 798.887591][ T6309] ? ima_match_policy+0x825/0x1270 [ 798.892794][ T6309] ? __kasan_check_read+0x11/0x20 [ 798.897824][ T6309] ? __alloc_pages_slowpath+0x2520/0x2520 [ 798.903555][ T6309] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 798.909809][ T6309] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 798.916055][ T6309] alloc_pages_vma+0x1bc/0x3f0 [ 798.920822][ T6309] shmem_alloc_page+0xbd/0x180 [ 798.925582][ T6309] ? shmem_swapin+0x1a0/0x1a0 [ 798.930254][ T6309] ? xas_start+0x166/0x560 [ 798.934680][ T6309] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 798.940401][ T6309] ? __vm_enough_memory+0x17e/0x3a0 [ 798.945599][ T6309] shmem_alloc_and_acct_page+0x165/0x990 [ 798.951243][ T6309] shmem_getpage_gfp+0x598/0x2680 [ 798.956272][ T6309] ? current_time+0x6b/0x140 [ 798.960865][ T6309] ? shmem_unuse_inode+0x1010/0x1010 [ 798.966144][ T6309] ? lock_acquire+0x190/0x410 [ 798.970817][ T6309] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 798.977056][ T6309] ? iov_iter_fault_in_readable+0x22c/0x450 [ 798.982959][ T6309] shmem_write_begin+0x105/0x1e0 [ 798.987908][ T6309] generic_perform_write+0x23b/0x540 [ 798.993186][ T6309] ? timespec64_trunc+0x180/0x180 [ 798.998218][ T6309] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 799.006279][ T6309] ? current_time+0x140/0x140 [ 799.010957][ T6309] ? __kasan_check_write+0x14/0x20 [ 799.016070][ T6309] ? down_write+0xdf/0x150 [ 799.020489][ T6309] __generic_file_write_iter+0x25e/0x630 [ 799.026118][ T6309] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 799.031844][ T6309] generic_file_write_iter+0x356/0x620 [ 799.037311][ T6309] ? __generic_file_write_iter+0x630/0x630 [ 799.043114][ T6309] ? aa_path_link+0x460/0x460 [ 799.047788][ T6309] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 799.053508][ T6309] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 799.059745][ T6309] ? iov_iter_init+0xee/0x210 [ 799.064420][ T6309] new_sync_write+0x4d3/0x770 [ 799.069098][ T6309] ? new_sync_read+0x800/0x800 [ 799.073858][ T6309] ? mark_held_locks+0xf0/0xf0 [ 799.078624][ T6309] ? common_file_perm+0x238/0x720 [ 799.083647][ T6309] ? vfs_write+0x485/0x5d0 [ 799.088061][ T6309] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 799.094301][ T6309] __vfs_write+0xe1/0x110 [ 799.098629][ T6309] vfs_write+0x268/0x5d0 [ 799.102873][ T6309] ksys_pwrite64+0x183/0x1c0 [ 799.107473][ T6309] ? __ia32_sys_pread64+0xf0/0xf0 [ 799.112500][ T6309] ? fput+0x1b/0x20 [ 799.116316][ T6309] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 799.122389][ T6309] __x64_sys_pwrite64+0x97/0xf0 [ 799.127248][ T6309] do_syscall_64+0xfd/0x6a0 19:35:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:42 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000100)=0x400000000008000, 0xffba) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x360, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000080)=0x2, 0x4) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) getpriority(0x0, r1) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 799.131777][ T6309] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 799.137673][ T6309] RIP: 0033:0x4137c7 [ 799.141578][ T6309] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 799.161445][ T6309] RSP: 002b:00007f901b50ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 799.169865][ T6309] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004137c7 [ 799.177849][ T6309] RDX: 0000000000000048 RSI: 0000000020000600 RDI: 0000000000000004 19:35:42 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r2 = dup2(r1, r0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000000080)={0x5, r3}) [ 799.185871][ T6309] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 799.193857][ T6309] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 799.201831][ T6309] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:35:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) r3 = gettid() openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x200, 0x0) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000500"/120], 0x78) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x86, 0x1, 0x2, "17551487c3be903a76c1736669756808", "7b75b41935c234f2d61ee877ccba60630db3e9f41dea7029dd30c643867aabf1e074b8fbbe1fa512153b2be6493563138ed4bc8e4b3d69abd38ebfd52e30dd23d9710e4bebd249018d6ca1db467256a1d8d3b3a89a18a3adc9fbc52c889d3b38705c7e37bfeaff4781eb2641d8cdeb7dd3"}, 0x86, 0x3) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:35:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:44 executing program 3 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:44 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x4003) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYRESOCT=0x0], 0x17) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000180)={0x401, 0x81, 0x0, 0x2733, 0x74, 0x6}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$FICLONE(r1, 0x40049409, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000100)='/dev/uinput\x00'], 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000680)=[&(0x7f0000000600)='\x00']) 19:35:44 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x3, 0x0, {0xa, 0x4e21, 0x7, @empty, 0x8}}}, 0x3a) close(r1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000000c0)="5502d0bcbad120f1df3e2bc42ea2022aee714558d31e9ea01ccfb4239f5d31be52a46bf0257baeabce3c89bdfd804357f3f029acaed5141aa7acd739766935a87801f9e09174b118b6dbf4bcd8653c5ce5e2aa4b99e3ac2088a0421cf95de3e8b89fe2be2a84f16744c4613ce576216bd83bbef18acf7130ae9919f013329cd3631befd51e519dd653be0d26eafed3833eedb38cbd5465b723bca54e0583ef3703bb268095cf419b9b2bce118fc5b9ab933a90fdc5cb385c4434247b804b5b2e87979dd212c1e7fdb67001ecf29db52676432e44a8054d", 0xd7, r0}, 0x68) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x40000) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) 19:35:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fallocate(r1, 0x0, 0x80000000, 0x37b) [ 801.422195][ T6545] FAULT_INJECTION: forcing a failure. [ 801.422195][ T6545] name failslab, interval 1, probability 0, space 0, times 0 [ 801.455896][ T6545] CPU: 0 PID: 6545 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 19:35:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 801.463828][ T6545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 801.473894][ T6545] Call Trace: [ 801.477196][ T6545] dump_stack+0x172/0x1f0 [ 801.481543][ T6545] should_fail.cold+0xa/0x15 [ 801.486138][ T6545] ? fault_create_debugfs_attr+0x180/0x180 [ 801.491952][ T6545] ? page_to_nid.part.0+0x20/0x20 [ 801.496987][ T6545] ? ___might_sleep+0x163/0x280 [ 801.501850][ T6545] __should_failslab+0x121/0x190 [ 801.506867][ T6545] should_failslab+0x9/0x14 [ 801.511367][ T6545] kmem_cache_alloc+0x2aa/0x710 [ 801.516231][ T6545] getname_flags+0xd6/0x5b0 19:35:44 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = open(&(0x7f0000000180)='./file0\x00', 0x82, 0x80) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f00000001c0)=0x1) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x12b) getsockopt$nfc_llcp(r3, 0x118, 0x2, &(0x7f0000000080)=""/197, 0xc5) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) [ 801.520736][ T6545] getname+0x1a/0x20 [ 801.524635][ T6545] do_sys_open+0x2c9/0x5d0 [ 801.529066][ T6545] ? filp_open+0x80/0x80 [ 801.533311][ T6545] ? fput+0x1b/0x20 [ 801.537123][ T6545] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 801.543195][ T6545] __x64_sys_open+0x7e/0xc0 [ 801.547712][ T6545] do_syscall_64+0xfd/0x6a0 [ 801.552220][ T6545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 801.558112][ T6545] RIP: 0033:0x413761 19:35:44 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x4003) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYRESOCT=0x0], 0x17) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000180)={0x401, 0x81, 0x0, 0x2733, 0x74, 0x6}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$FICLONE(r1, 0x40049409, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000100)='/dev/uinput\x00'], 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000680)=[&(0x7f0000000600)='\x00']) [ 801.562008][ T6545] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 801.581878][ T6545] RSP: 002b:00007f901b50ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 801.590384][ T6545] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 801.598357][ T6545] RDX: 00007f901b50bb0a RSI: 0000000000000002 RDI: 00007f901b50bb00 [ 801.606684][ T6545] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 801.614662][ T6545] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 801.622762][ T6545] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:35:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:44 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x1, 0x46) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x1) socket$l2tp(0x18, 0x1, 0x1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) r3 = gettid() openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x200, 0x0) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000500"/120], 0x78) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x86, 0x1, 0x2, "17551487c3be903a76c1736669756808", "7b75b41935c234f2d61ee877ccba60630db3e9f41dea7029dd30c643867aabf1e074b8fbbe1fa512153b2be6493563138ed4bc8e4b3d69abd38ebfd52e30dd23d9710e4bebd249018d6ca1db467256a1d8d3b3a89a18a3adc9fbc52c889d3b38705c7e37bfeaff4781eb2641d8cdeb7dd3"}, 0x86, 0x3) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:35:44 executing program 3 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:44 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0xb481f92111eaa260) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:44 executing program 5: socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101002, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x81}]) [ 801.932138][ T6876] FAULT_INJECTION: forcing a failure. [ 801.932138][ T6876] name failslab, interval 1, probability 0, space 0, times 0 [ 802.014457][ T6876] CPU: 1 PID: 6876 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 802.022393][ T6876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 802.032447][ T6876] Call Trace: [ 802.035753][ T6876] dump_stack+0x172/0x1f0 [ 802.040084][ T6876] should_fail.cold+0xa/0x15 [ 802.044670][ T6876] ? fault_create_debugfs_attr+0x180/0x180 [ 802.050475][ T6876] ? page_to_nid.part.0+0x20/0x20 [ 802.055775][ T6876] ? ___might_sleep+0x163/0x280 [ 802.060626][ T6876] __should_failslab+0x121/0x190 [ 802.065563][ T6876] should_failslab+0x9/0x14 [ 802.070061][ T6876] kmem_cache_alloc+0x2aa/0x710 [ 802.074913][ T6876] getname_flags+0xd6/0x5b0 [ 802.079411][ T6876] getname+0x1a/0x20 [ 802.083296][ T6876] do_sys_open+0x2c9/0x5d0 [ 802.087714][ T6876] ? filp_open+0x80/0x80 [ 802.091961][ T6876] ? fput+0x1b/0x20 [ 802.095766][ T6876] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 802.101830][ T6876] __x64_sys_open+0x7e/0xc0 [ 802.106329][ T6876] do_syscall_64+0xfd/0x6a0 [ 802.110832][ T6876] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 802.116720][ T6876] RIP: 0033:0x413761 [ 802.120613][ T6876] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 802.140215][ T6876] RSP: 002b:00007f901b50ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 802.148712][ T6876] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 802.156765][ T6876] RDX: 00007f901b50bb0a RSI: 0000000000000002 RDI: 00007f901b50bb00 19:35:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 802.164724][ T6876] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 802.172686][ T6876] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 802.180650][ T6876] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:35:45 executing program 1: open$dir(0x0, 0x0, 0x128) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x400, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000001c0)={0x5, 0xffffffffb96a5c8d, 0xfff, 0x5c2, 0xf, 0x5788, 0x800, 0x81, 0x1f, 0x39}) r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) chdir(&(0x7f00000000c0)='./file0\x00') setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x80, 0x4) creat(0x0, 0xffffffffffdffffe) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x10000) write$apparmor_current(r2, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[], 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f00000003c0)={0x0, @null, @rose={'rose', 0x0}, 0x1, 'syz0\x00', @null, 0xd0f, 0x8, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x1) sendfile(r2, r3, 0x0, 0x8000fffffffe) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) 19:35:45 executing program 5: pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000580)=[@in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e20, @broadcast}], 0x40) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000080)={'syz1\x00'}, 0x45c) r2 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000500)='syz1\x00', 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000700)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x820}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x68, r3, 0x20a, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x200, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x84}, 0x20000000) keyctl$clear(0x7, r2) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_CREATE(r1, 0x5501) 19:35:45 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x2, 0x4, 0x4, {0xa, 0x4e20, 0x6d, @rand_addr="e7a0b2e16648b18ead5cf729808ed1b0", 0xe1e}}}, 0x22) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:45 executing program 3 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 802.423280][ T7070] FAULT_INJECTION: forcing a failure. [ 802.423280][ T7070] name failslab, interval 1, probability 0, space 0, times 0 [ 802.436002][ T26] audit: type=1804 audit(1566934545.454:334): pid=6999 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir437901318/syzkaller.aikZ21/753/bus" dev="sda1" ino=16554 res=1 [ 802.465293][ T7070] CPU: 1 PID: 7070 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 802.473218][ T7070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 802.483276][ T7070] Call Trace: [ 802.483300][ T7070] dump_stack+0x172/0x1f0 [ 802.483319][ T7070] should_fail.cold+0xa/0x15 [ 802.483342][ T7070] ? fault_create_debugfs_attr+0x180/0x180 [ 802.501326][ T7070] ? page_to_nid.part.0+0x20/0x20 [ 802.504856][ T7005] input: syz1 as /devices/virtual/input/input43 [ 802.506354][ T7070] ? ___might_sleep+0x163/0x280 [ 802.506370][ T7070] __should_failslab+0x121/0x190 [ 802.506386][ T7070] should_failslab+0x9/0x14 [ 802.506398][ T7070] kmem_cache_alloc+0x2aa/0x710 [ 802.506416][ T7070] ? memcg_kmem_put_cache+0x3e/0x50 [ 802.512762][ T7005] input: failed to attach handler leds to device input43, error: -6 [ 802.517474][ T7070] ? kmem_cache_alloc+0x314/0x710 [ 802.517492][ T7070] security_file_alloc+0x39/0x170 [ 802.517506][ T7070] __alloc_file+0xde/0x340 [ 802.517523][ T7070] alloc_empty_file+0x72/0x170 [ 802.527032][ T7070] path_openat+0xef/0x4630 [ 802.527047][ T7070] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 802.527058][ T7070] ? kasan_slab_alloc+0xf/0x20 [ 802.527074][ T7070] ? kmem_cache_alloc+0x121/0x710 [ 802.537072][ T7070] ? getname_flags+0xd6/0x5b0 [ 802.537085][ T7070] ? getname+0x1a/0x20 [ 802.537100][ T7070] ? do_sys_open+0x2c9/0x5d0 [ 802.537110][ T7070] ? __x64_sys_open+0x7e/0xc0 [ 802.537130][ T7070] ? do_syscall_64+0xfd/0x6a0 [ 802.550164][ T7070] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 802.550180][ T7070] ? __kasan_check_write+0x14/0x20 [ 802.550194][ T7070] ? up_write+0x9d/0x280 19:35:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) r3 = gettid() openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x200, 0x0) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000500"/120], 0x78) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x86, 0x1, 0x2, "17551487c3be903a76c1736669756808", "7b75b41935c234f2d61ee877ccba60630db3e9f41dea7029dd30c643867aabf1e074b8fbbe1fa512153b2be6493563138ed4bc8e4b3d69abd38ebfd52e30dd23d9710e4bebd249018d6ca1db467256a1d8d3b3a89a18a3adc9fbc52c889d3b38705c7e37bfeaff4781eb2641d8cdeb7dd3"}, 0x86, 0x3) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 802.550216][ T7070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 802.574602][ T7070] ? generic_file_write_iter+0x3b9/0x620 [ 802.574624][ T7070] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 802.584418][ T7070] ? __generic_file_write_iter+0x630/0x630 [ 802.584432][ T7070] ? aa_path_link+0x460/0x460 [ 802.584449][ T7070] ? kmem_cache_alloc+0x58e/0x710 [ 802.593162][ T7070] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 802.593177][ T7070] do_filp_open+0x1a1/0x280 [ 802.593192][ T7070] ? may_open_dev+0x100/0x100 [ 802.602412][ T7070] ? lock_downgrade+0x920/0x920 [ 802.602425][ T7070] ? rwlock_bug.part.0+0x90/0x90 [ 802.602442][ T7070] ? __alloc_fd+0x35/0x620 [ 802.684263][ T7070] ? __kasan_check_read+0x11/0x20 [ 802.689267][ T7070] ? do_raw_spin_unlock+0x57/0x270 [ 802.694358][ T7070] ? _raw_spin_unlock+0x2d/0x50 [ 802.699210][ T7070] ? __alloc_fd+0x487/0x620 [ 802.703697][ T7070] do_sys_open+0x3fe/0x5d0 [ 802.708106][ T7070] ? filp_open+0x80/0x80 [ 802.712328][ T7070] ? fput+0x1b/0x20 [ 802.716119][ T7070] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 802.722171][ T7070] __x64_sys_open+0x7e/0xc0 [ 802.726658][ T7070] do_syscall_64+0xfd/0x6a0 [ 802.731162][ T7070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 802.737030][ T7070] RIP: 0033:0x413761 [ 802.740900][ T7070] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 802.760484][ T7070] RSP: 002b:00007f901b50ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 19:35:45 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0xa00, 0x0) getsockopt$ax25_int(r2, 0x101, 0xa265a239e279446c, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 802.768894][ T7070] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 802.776850][ T7070] RDX: 00007f901b50bb0a RSI: 0000000000000002 RDI: 00007f901b50bb00 [ 802.784902][ T7070] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 802.792854][ T7070] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 802.800821][ T7070] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 802.834896][ T7005] input: syz1 as /devices/virtual/input/input44 19:35:45 executing program 3 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 802.883490][ T7005] input: failed to attach handler leds to device input44, error: -6 19:35:46 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0xfffffffffffffffe, 0x9, 0x1, {0xb, @pix_mp={0x100000000, 0xfffffffffffffffa, 0x33524742, 0x9, 0x1, [{0x4d, 0x5}, {0x0, 0x8}, {0x4, 0x1f}, {0xfe94, 0x200}, {0x1, 0x1}, {0x3ff, 0x7fff}, {0x8, 0x7}, {0x3, 0x4}], 0x1, 0x1, 0x0, 0x1, 0x2}}}) ioctl$VIDIOC_REQBUFS(r0, 0x40045612, &(0x7f0000000040)={0xb}) readv(r0, &(0x7f0000001440)=[{&(0x7f0000000000)=""/26, 0x1a}], 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f0000000100)={0x1, 0x1, [0x100000000, 0xff, 0x2, 0x4, 0x1497c2f8, 0x7, 0xf5]}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@rand_addr=0x91f, 0x4e22, 0x1, 0x4e20, 0x0, 0x2, 0xa0, 0x80, 0x2c, r1, r2}, {0x3, 0x3ff, 0x4, 0x7, 0x40, 0x637, 0x8, 0x11bc7bc3}, {0x3f, 0x3, 0x7, 0x1ff}, 0x1f, 0x6e6bb3, 0x1, 0x1, 0x1, 0x2}, {{@in=@remote, 0x4d3, 0x33}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x1b}, 0x3504, 0x0, 0x1, 0x100000001, 0x4, 0x6, 0x4}}, 0xe8) 19:35:46 executing program 2: socket$inet_sctp(0x2, 0x5, 0x84) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x0, 0x0, 0x0, 0x1, {0xa, 0x4e23, 0x6290, @loopback}}}, 0x4e) close(r0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x20000, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0xe, &(0x7f00000000c0)="e4444f0d83152f688c2683bf0d0b30e08980ac8bb380bc38d74981abe0560da8b2c023408ecef4d43f6941cfd781fde194ee585a57", 0x35) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000100)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) [ 803.032060][ T7216] FAULT_INJECTION: forcing a failure. [ 803.032060][ T7216] name failslab, interval 1, probability 0, space 0, times 0 19:35:46 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000340)='/dev/radio#\x00', 0x2, 0x2) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000280)={0x7, 0x1e, 0x3, 0x0, 0x11}) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x18) syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x141000, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f00000000c0)=@srh={0x11, 0x2, 0x4, 0x1, 0x4, 0x10, 0xf3b, [@rand_addr="1319e097e664f08c2312f46a7386d592"]}, 0x18) write$P9_RMKNOD(r4, &(0x7f0000000080)={0x14, 0x13, 0x1, {0x10, 0x0, 0x4}}, 0x14) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0xffffffcb) sendmsg$netlink(r3, &(0x7f0000000240)={&(0x7f00000001c0)=@proc={0x10, 0x0, 0x25dfdbfb, 0x8000000}, 0xc, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x90}, 0xdc0efb4261ce1325) ioctl(r4, 0x8, &(0x7f0000000200)="00000001") dup3(r3, r1, 0x80000) [ 803.122218][ T7216] CPU: 1 PID: 7216 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 803.130318][ T7216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 803.140462][ T7216] Call Trace: [ 803.143767][ T7216] dump_stack+0x172/0x1f0 [ 803.148193][ T7216] should_fail.cold+0xa/0x15 [ 803.152796][ T7216] ? is_bpf_text_address+0xd3/0x170 [ 803.158007][ T7216] ? fault_create_debugfs_attr+0x180/0x180 [ 803.163824][ T7216] ? page_to_nid.part.0+0x20/0x20 [ 803.168844][ T7216] ? ___might_sleep+0x163/0x280 [ 803.173680][ T7216] __should_failslab+0x121/0x190 [ 803.178601][ T7216] should_failslab+0x9/0x14 [ 803.183087][ T7216] kmem_cache_alloc+0x2aa/0x710 [ 803.187918][ T7216] ? stack_trace_save+0xac/0xe0 [ 803.192747][ T7216] ? stack_trace_consume_entry+0x190/0x190 [ 803.198535][ T7216] __alloc_file+0x27/0x340 [ 803.202930][ T7216] alloc_empty_file+0x72/0x170 [ 803.207671][ T7216] path_openat+0xef/0x4630 [ 803.212065][ T7216] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 803.218022][ T7216] ? kasan_slab_alloc+0xf/0x20 [ 803.222764][ T7216] ? kmem_cache_alloc+0x121/0x710 [ 803.227763][ T7216] ? getname_flags+0xd6/0x5b0 [ 803.232417][ T7216] ? getname+0x1a/0x20 [ 803.236461][ T7216] ? do_sys_open+0x2c9/0x5d0 [ 803.241115][ T7216] ? __x64_sys_open+0x7e/0xc0 [ 803.245781][ T7216] ? do_syscall_64+0xfd/0x6a0 [ 803.250438][ T7216] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 803.256486][ T7216] ? __isolate_free_page+0x4c0/0x4c0 [ 803.261751][ T7216] ? up_write+0x9d/0x280 [ 803.265973][ T7216] ? __kasan_check_read+0x11/0x20 [ 803.270978][ T7216] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 803.276327][ T7216] ? __kasan_check_read+0x11/0x20 [ 803.281326][ T7216] ? __alloc_pages_nodemask+0x578/0x900 [ 803.286849][ T7216] ? cache_grow_end+0xa4/0x190 [ 803.291593][ T7216] ? __kasan_check_read+0x11/0x20 [ 803.296599][ T7216] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 803.302299][ T7216] do_filp_open+0x1a1/0x280 [ 803.306778][ T7216] ? may_open_dev+0x100/0x100 [ 803.311442][ T7216] ? lock_downgrade+0x920/0x920 [ 803.316271][ T7216] ? rwlock_bug.part.0+0x90/0x90 [ 803.321189][ T7216] ? __alloc_fd+0x35/0x620 [ 803.325595][ T7216] ? __kasan_check_read+0x11/0x20 [ 803.330595][ T7216] ? do_raw_spin_unlock+0x57/0x270 [ 803.335686][ T7216] ? _raw_spin_unlock+0x2d/0x50 [ 803.340523][ T7216] ? __alloc_fd+0x487/0x620 [ 803.345019][ T7216] do_sys_open+0x3fe/0x5d0 [ 803.349781][ T7216] ? filp_open+0x80/0x80 [ 803.354003][ T7216] ? fput+0x1b/0x20 [ 803.357792][ T7216] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 803.363834][ T7216] __x64_sys_open+0x7e/0xc0 [ 803.368314][ T7216] do_syscall_64+0xfd/0x6a0 [ 803.372798][ T7216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 803.378679][ T7216] RIP: 0033:0x413761 [ 803.383445][ T7216] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 803.403033][ T7216] RSP: 002b:00007f901b50ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 803.411424][ T7216] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 803.419373][ T7216] RDX: 00007f901b50bb0a RSI: 0000000000000002 RDI: 00007f901b50bb00 [ 803.427320][ T7216] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 803.435269][ T7216] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 803.443492][ T7216] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 803.536724][ T26] audit: type=1804 audit(1566934546.565:335): pid=7111 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir437901318/syzkaller.aikZ21/753/bus" dev="sda1" ino=16554 res=1 19:35:46 executing program 1: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) r1 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x0, 0x2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x7, 0xe6fd377f8e515158, r1, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)={0x7, 0x9}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000500), &(0x7f00000002c0)=0x237) recvfrom(r0, &(0x7f0000000300)=""/240, 0xf0, 0x1, 0x0, 0x0) 19:35:46 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f00000001c0)="bcf443337f2f80d96f08ebdca98f26816a37b2d7225519f5806e2822c9c29cf6bb7723cc206c410054", 0x29) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x3ff, 0x240402) fspick(r1, &(0x7f0000000140)='./file0/file0\x00', 0x1) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:35:46 executing program 3 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) r3 = gettid() openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x200, 0x0) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000500"/120], 0x78) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x86, 0x1, 0x2, "17551487c3be903a76c1736669756808", "7b75b41935c234f2d61ee877ccba60630db3e9f41dea7029dd30c643867aabf1e074b8fbbe1fa512153b2be6493563138ed4bc8e4b3d69abd38ebfd52e30dd23d9710e4bebd249018d6ca1db467256a1d8d3b3a89a18a3adc9fbc52c889d3b38705c7e37bfeaff4781eb2641d8cdeb7dd3"}, 0x86, 0x3) tkill(r3, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:35:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:46 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5435, 0x200402) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x1d) close(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) [ 803.658828][ T7350] FAULT_INJECTION: forcing a failure. [ 803.658828][ T7350] name failslab, interval 1, probability 0, space 0, times 0 [ 803.725287][ T7350] CPU: 0 PID: 7350 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 803.733222][ T7350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 803.743276][ T7350] Call Trace: [ 803.746561][ T7350] dump_stack+0x172/0x1f0 [ 803.750893][ T7350] should_fail.cold+0xa/0x15 [ 803.755475][ T7350] ? fault_create_debugfs_attr+0x180/0x180 [ 803.761270][ T7350] ? page_to_nid.part.0+0x20/0x20 [ 803.766278][ T7350] ? ___might_sleep+0x163/0x280 [ 803.771115][ T7350] __should_failslab+0x121/0x190 [ 803.776043][ T7350] should_failslab+0x9/0x14 [ 803.780526][ T7350] kmem_cache_alloc+0x2aa/0x710 [ 803.785359][ T7350] ? memcg_kmem_put_cache+0x3e/0x50 [ 803.790537][ T7350] ? kmem_cache_alloc+0x314/0x710 [ 803.795543][ T7350] security_file_alloc+0x39/0x170 [ 803.800726][ T7350] __alloc_file+0xde/0x340 [ 803.805121][ T7350] alloc_empty_file+0x72/0x170 [ 803.809864][ T7350] path_openat+0xef/0x4630 [ 803.814258][ T7350] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 803.820040][ T7350] ? kasan_slab_alloc+0xf/0x20 [ 803.824780][ T7350] ? kmem_cache_alloc+0x121/0x710 [ 803.829784][ T7350] ? getname_flags+0xd6/0x5b0 [ 803.834438][ T7350] ? getname+0x1a/0x20 [ 803.838490][ T7350] ? do_sys_open+0x2c9/0x5d0 [ 803.843147][ T7350] ? __x64_sys_open+0x7e/0xc0 [ 803.847894][ T7350] ? do_syscall_64+0xfd/0x6a0 [ 803.852552][ T7350] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 803.858596][ T7350] ? __isolate_free_page+0x4c0/0x4c0 [ 803.863862][ T7350] ? up_write+0x9d/0x280 [ 803.868172][ T7350] ? __kasan_check_read+0x11/0x20 [ 803.873528][ T7350] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 803.878890][ T7350] ? __kasan_check_read+0x11/0x20 [ 803.883893][ T7350] ? __alloc_pages_nodemask+0x578/0x900 [ 803.889427][ T7350] ? cache_grow_end+0xa4/0x190 [ 803.894170][ T7350] ? __kasan_check_read+0x11/0x20 [ 803.899176][ T7350] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 803.904986][ T7350] do_filp_open+0x1a1/0x280 [ 803.909474][ T7350] ? may_open_dev+0x100/0x100 [ 803.914138][ T7350] ? lock_downgrade+0x920/0x920 [ 803.918967][ T7350] ? rwlock_bug.part.0+0x90/0x90 [ 803.923882][ T7350] ? __alloc_fd+0x35/0x620 [ 803.928292][ T7350] ? __kasan_check_read+0x11/0x20 [ 803.933302][ T7350] ? do_raw_spin_unlock+0x57/0x270 [ 803.938393][ T7350] ? _raw_spin_unlock+0x2d/0x50 [ 803.943222][ T7350] ? __alloc_fd+0x487/0x620 [ 803.947969][ T7350] do_sys_open+0x3fe/0x5d0 [ 803.952367][ T7350] ? filp_open+0x80/0x80 [ 803.956600][ T7350] ? fput+0x1b/0x20 [ 803.960591][ T7350] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 803.966733][ T7350] __x64_sys_open+0x7e/0xc0 [ 803.971218][ T7350] do_syscall_64+0xfd/0x6a0 [ 803.975701][ T7350] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 803.981574][ T7350] RIP: 0033:0x413761 [ 803.985451][ T7350] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 804.005031][ T7350] RSP: 002b:00007f901b50ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 804.013422][ T7350] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 19:35:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 804.021371][ T7350] RDX: 00007f901b50bb0a RSI: 0000000000000002 RDI: 00007f901b50bb00 [ 804.029319][ T7350] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 804.037270][ T7350] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 804.045220][ T7350] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:35:47 executing program 5: unshare(0x8000000) r0 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7f, 0x2000) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000000c0)={0x5, 0x0, 0xffffffffffffff81, 0x6}, 0x8) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000280)=""/204, 0x12f, 0x0, 0x0) 19:35:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) r3 = gettid() openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x200, 0x0) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000500"/120], 0x78) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x86, 0x1, 0x2, "17551487c3be903a76c1736669756808", "7b75b41935c234f2d61ee877ccba60630db3e9f41dea7029dd30c643867aabf1e074b8fbbe1fa512153b2be6493563138ed4bc8e4b3d69abd38ebfd52e30dd23d9710e4bebd249018d6ca1db467256a1d8d3b3a89a18a3adc9fbc52c889d3b38705c7e37bfeaff4781eb2641d8cdeb7dd3"}, 0x86, 0x3) tkill(r3, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:35:47 executing program 3 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:47 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ftruncate(r1, 0xfaa) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) [ 804.286414][ T7474] FAULT_INJECTION: forcing a failure. [ 804.286414][ T7474] name failslab, interval 1, probability 0, space 0, times 0 [ 804.300340][ T7474] CPU: 1 PID: 7474 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 804.308252][ T7474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 804.321874][ T7474] Call Trace: [ 804.325176][ T7474] dump_stack+0x172/0x1f0 [ 804.329508][ T7474] should_fail.cold+0xa/0x15 [ 804.334114][ T7474] ? fault_create_debugfs_attr+0x180/0x180 [ 804.339945][ T7474] ? kernel_text_address+0x73/0xf0 [ 804.345065][ T7474] ? ___might_sleep+0x163/0x280 [ 804.349920][ T7474] __should_failslab+0x121/0x190 [ 804.354865][ T7474] should_failslab+0x9/0x14 [ 804.359365][ T7474] __kmalloc+0x2e0/0x770 [ 804.363606][ T7474] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 804.369320][ T7474] tomoyo_realpath_from_path+0xcd/0x7b0 [ 804.374859][ T7474] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 804.381105][ T7474] tomoyo_check_open_permission+0x2a8/0x3f0 [ 804.386999][ T7474] ? tomoyo_path_number_perm+0x520/0x520 [ 804.392633][ T7474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 804.398872][ T7474] ? refcount_sub_and_test_checked+0x154/0x200 [ 804.405032][ T7474] ? lock_downgrade+0x920/0x920 [ 804.409860][ T7474] ? rwlock_bug.part.0+0x90/0x90 [ 804.414774][ T7474] ? lockref_get+0x16/0x60 [ 804.419167][ T7474] tomoyo_file_open+0xa9/0xd0 [ 804.423822][ T7474] security_file_open+0x71/0x300 [ 804.428739][ T7474] do_dentry_open+0x373/0x1250 [ 804.433481][ T7474] ? match_exception_partial+0x242/0x2d0 [ 804.439094][ T7474] ? chown_common+0x5c0/0x5c0 [ 804.443770][ T7474] ? inode_permission+0xb4/0x560 [ 804.448693][ T7474] vfs_open+0xa0/0xd0 [ 804.452656][ T7474] path_openat+0x10e9/0x4630 [ 804.457251][ T7474] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 804.463041][ T7474] ? kasan_slab_alloc+0xf/0x20 [ 804.467811][ T7474] ? kmem_cache_alloc+0x121/0x710 [ 804.472838][ T7474] ? getname_flags+0xd6/0x5b0 [ 804.477489][ T7474] ? getname+0x1a/0x20 [ 804.481533][ T7474] ? do_sys_open+0x2c9/0x5d0 [ 804.486107][ T7474] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 804.491460][ T7474] ? __alloc_pages_nodemask+0x578/0x900 [ 804.496984][ T7474] ? cache_grow_end+0xa4/0x190 [ 804.501725][ T7474] ? __kasan_check_read+0x11/0x20 [ 804.506728][ T7474] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 804.512423][ T7474] do_filp_open+0x1a1/0x280 [ 804.516912][ T7474] ? may_open_dev+0x100/0x100 [ 804.521579][ T7474] ? __kasan_check_read+0x11/0x20 [ 804.526581][ T7474] ? do_raw_spin_unlock+0x57/0x270 [ 804.531677][ T7474] ? _raw_spin_unlock+0x2d/0x50 [ 804.536593][ T7474] ? __alloc_fd+0x487/0x620 [ 804.541079][ T7474] do_sys_open+0x3fe/0x5d0 [ 804.545477][ T7474] ? filp_open+0x80/0x80 [ 804.549717][ T7474] ? fput+0x1b/0x20 [ 804.553505][ T7474] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 804.559548][ T7474] __x64_sys_open+0x7e/0xc0 [ 804.564027][ T7474] do_syscall_64+0xfd/0x6a0 [ 804.568507][ T7474] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 804.574374][ T7474] RIP: 0033:0x413761 [ 804.578254][ T7474] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 804.597834][ T7474] RSP: 002b:00007f901b50ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 804.606232][ T7474] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 804.614183][ T7474] RDX: 00007f901b50bb0a RSI: 0000000000000002 RDI: 00007f901b50bb00 [ 804.622132][ T7474] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 804.630098][ T7474] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 19:35:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x56e, 0x2000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000140)) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d6c0bcfe47bf070") syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) syz_emit_ethernet(0xffffffffffffff73, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2ce, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x44, 0x10}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0x2db, 0xc03]}) 19:35:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) r3 = gettid() openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x200, 0x0) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000500"/120], 0x78) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x86, 0x1, 0x2, "17551487c3be903a76c1736669756808", "7b75b41935c234f2d61ee877ccba60630db3e9f41dea7029dd30c643867aabf1e074b8fbbe1fa512153b2be6493563138ed4bc8e4b3d69abd38ebfd52e30dd23d9710e4bebd249018d6ca1db467256a1d8d3b3a89a18a3adc9fbc52c889d3b38705c7e37bfeaff4781eb2641d8cdeb7dd3"}, 0x86, 0x3) tkill(r3, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:35:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x1, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f00000000c0)={0x3, r2}) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000044000)) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r3) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f00000001c0)={0xc, 0x8, 0xfa0e, {0x0}}, 0x9918) dup3(r0, r4, 0x0) tkill(r3, 0x1002000000016) 19:35:47 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000080)={{0x8, 0x130}, 0x1, 0x3, 0xffffffffffffff00, {0xfff, 0x2}, 0xffffffffffffff81, 0x8}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r2) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 804.638064][ T7474] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 804.654433][ T7474] ERROR: Out of memory at tomoyo_realpath_from_path. 19:35:47 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg$inet6(r0, &(0x7f0000000000), 0x0, 0x80) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = eventfd2(0x0, 0x0) fchmod(r1, 0x3343b3de2dc9154a) fchown(r1, 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8, 0x1) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) 19:35:47 executing program 3 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000180)={0x7b, 0x0, [0x4b564d02, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 804.997958][ T7751] FAULT_INJECTION: forcing a failure. [ 804.997958][ T7751] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 805.011205][ T7751] CPU: 0 PID: 7751 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 805.019096][ T7751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 805.029153][ T7751] Call Trace: [ 805.032461][ T7751] dump_stack+0x172/0x1f0 [ 805.036860][ T7751] should_fail.cold+0xa/0x15 [ 805.036877][ T7751] ? percpu_ref_put_many+0x94/0x190 19:35:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) r3 = gettid() openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x200, 0x0) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000500"/120], 0x78) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 805.036893][ T7751] ? fault_create_debugfs_attr+0x180/0x180 [ 805.036913][ T7751] should_fail_alloc_page+0x50/0x60 19:35:48 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0xffffffff7fffffff, @mcast2, 0x1ff}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}, @in={0x2, 0x4e24, @local}], 0x3c) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @multicast1}, 0x4, 0x3, 0x0, 0x1}}, 0x26) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) socket$vsock_dgram(0x28, 0x2, 0x0) close(r1) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x10, "e2c43c7d90f17a95c1c3cc10062dfcbb"}, &(0x7f0000000140)=0x34) syz_genetlink_get_family_id$net_dm(&(0x7f0000000180)='NET_DM\x00') ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:48 executing program 3 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 805.036926][ T7751] __alloc_pages_nodemask+0x1a1/0x900 [ 805.036942][ T7751] ? lock_downgrade+0x920/0x920 [ 805.036955][ T7751] ? __alloc_pages_slowpath+0x2520/0x2520 [ 805.036972][ T7751] ? lock_downgrade+0x920/0x920 [ 805.036989][ T7751] ? fault_create_debugfs_attr+0x180/0x180 [ 805.037004][ T7751] cache_grow_begin+0x90/0xd20 [ 805.037020][ T7751] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 805.037034][ T7751] __kmalloc+0x6b2/0x770 [ 805.037045][ T7751] ? __kasan_check_read+0x11/0x20 [ 805.037062][ T7751] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 805.037075][ T7751] tomoyo_realpath_from_path+0xcd/0x7b0 [ 805.037089][ T7751] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 805.037108][ T7751] tomoyo_check_open_permission+0x2a8/0x3f0 [ 805.037124][ T7751] ? tomoyo_path_number_perm+0x520/0x520 [ 805.037140][ T7751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 805.037154][ T7751] ? refcount_sub_and_test_checked+0x154/0x200 [ 805.037171][ T7751] ? retint_kernel+0x2b/0x2b 19:35:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f00000001c0)="a6f33aff4858cd7574a73bfe4c4e", 0x0, 0x3f000000}, 0x28) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x80000) syz_read_part_table(0x20, 0x8, &(0x7f0000000900)=[{&(0x7f00000002c0)="e4bc7cdefc6e82b35f87d32a21e861a2bf4a66a06b32abae776582b40f124107cd8a92e17d99951a14a43ca2", 0x2c, 0x80000001}, {&(0x7f0000000380)="0e3e57ab425a4622b4e747fe8bbf9430b2601e9891c4a70a338683aa9d50958bfe0951ef04387850c3595ad50d5c8ab63052b2570e62f438debfcd07719f1a3729b196862fc374d12742b952de226343af4af8a20973cab1028cc8b16a3d0af5937f0e73c21c1fe9727c504d491fbc6b344e3233207554073c5862c119474af8704b6ed0df0d4e6d60abbf5b6a9dd4eb038684a485b03785bfa88e33b7d0a6809a233347b2494edf0dc6323cab9d7ae854e8bae777c0cbe514", 0xb9, 0x5}, {&(0x7f0000000440)="b81dbd29b34cb6c0958d67a73d351be3c5870629c89587b1500dd610371db687cad1d28c57b3d241f5ec16cd86cc2d0d75a5b4f99a428904dd255ae86471f6d109bda70f7e17c377ee8363b8abe6ba3880be53fe2f3130a2f1e3c5ca18ae450eeb27ea642ac4d85b062270c912e3bfde57742775016af8753ab350deb8acf5fa4bf240c4735d071e51497c1471996ea7f41ef5ca065f434d40302d95fc6e49e5aee6fccfc45e8cc03171b4ea7a2dd901b00ba2db942e5d203d2eb53ed8e39f313b1063ec7acd397c37a62077f6822e1b8d77997850d09188867da0806dd811b292dc70c7ecd66db541c019b1f8243a8b8821577e7bf9fbd3", 0xf8, 0xfffffffffffffffe}, {&(0x7f0000000540)="19be5d33dd7074f12543c82af6c22ae4320c4d91d205d3723063d06ab68403e6bbcaf6c4c699ca19654b784a9a2eebe940160dcfd505b8d4ffcf6e54f703fb42a0573ae8f8f24f17234074c757898d717d02bbf2207cdefe2f657ca937175d4eb61920443dff9e03111ec88147f6aab4919f86713854e5c0bda9e2ba2fb24ff18906ec8df7b5790bb64281db7099298e8f6506", 0x93, 0x81}, {&(0x7f0000000600)="4ac6527ce54cc937244c81f734872fb955919efb45cc7f8e946c69c046b51b523a10b8d70a02faa6140d7e21799804c39b6299d083ee67714f6e05183b04ad911710ba58cc24fec83cc5a1b8cb3fd07fa2d01bc1fc8b7f793ab78770410a7183ee0219cd0a97941a9b9ae26e5046e8fdc92e1492e14bf17da93177b1498805e17141bb9a2fa1dd2d9f2173341eefbf3a078a6f076c3f6e7c75fe1e8ac1f37e2f1a41ae860c745ebf1823e5c59a320c19f172eb4f2b5b3eb1a8c3d8633bde387e528881458f3a2c6f3ed73c748c970cbadf52fa22d6bd43e8d9c4b1ef11e82e009ffe7d7586642cde250b95dbadd37769", 0xf0, 0x7fff}, {&(0x7f0000000700)="81ba5731112ae54c676a324b367585fcc38da95bb8e773d605fed33a394bf96955ef72dbfa5247679ba08a223030a9526dc76fe3b67e2d36faee104c3177fc100c82b9d4ca76bc6f905ce4c2c4b2dbcf568d5661b8191f2b85b7ae76c2ee04287f12e2e9f8d5ccedebb6c9a8f95b44d8c777b9e1f5f4ecb0c803c9d8ad722848f8bb1f9d0684c0e0686050a344376b4ae2adae5769fffb649f5c4912c81a2efd31aaf9b1bf702c13193d02e4dd065b52e2b3604adaa5765355cd36a764f3d9b814f7da604edc7fc24f05040e888f1c21", 0xd0, 0x20}, {&(0x7f0000000800)="6db452ddccfe75114a6cd75c01c33ee239b5edcd820a81a4de163b8932c82e8ae7be8b933301e4dddf94aa1b276f6c819f601cd226f8781f98dd98a5d8816fd9d8e73407289602dac2bd0ed7611e8a3454b5ed5a7d88f908590090a47c9a3d124f3129a9a169fd382e8419c570aee085eb781638bf6fb28a1839fb55", 0x7c, 0x1}, {&(0x7f0000000880)="c9a9b2f18a2ee18529a864e57e019dfb40f91351a977476a18b12a5d8ce7fc962787efb04187be6efc482ffc69a00ecbd3548635c71934b7a1c91f237939e43e0bb686da50fae9b305fb", 0x4a, 0x63}]) poll(&(0x7f0000000280)=[{r0, 0x180}, {r0, 0x2}, {r1, 0x1000}, {r2, 0x1}, {r0, 0x2}, {r1, 0x1000}, {r1, 0x108}, {r0, 0x4080}], 0x8, 0xffffffffffffffff) accept$inet(r1, &(0x7f0000000300)={0x2, 0x0, @empty}, &(0x7f00000009c0)=0x10) 19:35:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xfc', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:48 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000080)={0x4, 0x80000000, 0x4, 0x0, 0x8}) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:48 executing program 3 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 805.037195][ T7751] ? lock_downgrade+0x920/0x920 [ 805.037208][ T7751] ? rwlock_bug.part.0+0x90/0x90 [ 805.037221][ T7751] ? lockref_get+0x16/0x60 [ 805.037236][ T7751] tomoyo_file_open+0xa9/0xd0 [ 805.037252][ T7751] security_file_open+0x71/0x300 [ 805.037268][ T7751] do_dentry_open+0x373/0x1250 [ 805.037279][ T7751] ? match_exception_partial+0x242/0x2d0 [ 805.037295][ T7751] ? chown_common+0x5c0/0x5c0 [ 805.037310][ T7751] ? inode_permission+0xb4/0x560 [ 805.037325][ T7751] vfs_open+0xa0/0xd0 [ 805.037338][ T7751] path_openat+0x10e9/0x4630 [ 805.037352][ T7751] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 805.037363][ T7751] ? kasan_slab_alloc+0xf/0x20 [ 805.037374][ T7751] ? kmem_cache_alloc+0x121/0x710 [ 805.037395][ T7751] ? getname_flags+0xd6/0x5b0 [ 805.037409][ T7751] ? getname+0x1a/0x20 [ 805.037421][ T7751] ? do_sys_open+0x2c9/0x5d0 [ 805.037444][ T7751] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 805.037459][ T7751] ? __alloc_pages_nodemask+0x578/0x900 [ 805.037472][ T7751] ? cache_grow_end+0xa4/0x190 [ 805.037485][ T7751] ? __kasan_check_read+0x11/0x20 [ 805.037503][ T7751] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 805.037516][ T7751] do_filp_open+0x1a1/0x280 [ 805.037529][ T7751] ? may_open_dev+0x100/0x100 [ 805.037547][ T7751] ? __kasan_check_read+0x11/0x20 [ 805.037559][ T7751] ? do_raw_spin_unlock+0x57/0x270 [ 805.037572][ T7751] ? _raw_spin_unlock+0x2d/0x50 [ 805.037584][ T7751] ? __alloc_fd+0x487/0x620 [ 805.037603][ T7751] do_sys_open+0x3fe/0x5d0 [ 805.037616][ T7751] ? filp_open+0x80/0x80 19:35:48 executing program 1: gettid() r0 = socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) utimensat(r1, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000180), 0x100) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f0000000100)) write$binfmt_aout(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x11f) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000700)={'ip6_vti0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000740)={'dummy0\x00', r3}) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) 19:35:48 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8000, 0x0) ioctl$TIOCSBRK(r2, 0x5427) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) [ 805.037634][ T7751] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 805.037648][ T7751] __x64_sys_open+0x7e/0xc0 [ 805.037663][ T7751] do_syscall_64+0xfd/0x6a0 [ 805.037679][ T7751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 805.037690][ T7751] RIP: 0033:0x413761 [ 805.037705][ T7751] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 805.037712][ T7751] RSP: 002b:00007f901b50ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 805.037725][ T7751] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 805.037733][ T7751] RDX: 00007f901b50bb0a RSI: 0000000000000002 RDI: 00007f901b50bb00 [ 805.037740][ T7751] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 805.037749][ T7751] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 805.037758][ T7751] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 805.363418][ T7944] FAULT_INJECTION: forcing a failure. [ 805.363418][ T7944] name failslab, interval 1, probability 0, space 0, times 0 [ 805.363435][ T7944] CPU: 0 PID: 7944 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 805.363443][ T7944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 805.363448][ T7944] Call Trace: [ 805.363465][ T7944] dump_stack+0x172/0x1f0 [ 805.363482][ T7944] should_fail.cold+0xa/0x15 [ 805.363497][ T7944] ? fault_create_debugfs_attr+0x180/0x180 [ 805.363511][ T7944] ? page_to_nid.part.0+0x20/0x20 [ 805.363525][ T7944] ? ___might_sleep+0x163/0x280 [ 805.363540][ T7944] __should_failslab+0x121/0x190 [ 805.363554][ T7944] should_failslab+0x9/0x14 [ 805.363565][ T7944] kmem_cache_alloc_trace+0x2d3/0x790 [ 805.363577][ T7944] ? lockdep_init_map+0x1be/0x6d0 [ 805.363652][ T7944] ? loop_info64_to_compat+0x6d0/0x6d0 [ 805.363667][ T7944] __kthread_create_on_node+0xf2/0x460 [ 805.363677][ T7944] ? lock_acquire+0x190/0x410 [ 805.363692][ T7944] ? __kthread_parkme+0x1c0/0x1c0 [ 805.363710][ T7944] ? loop_set_fd+0x659/0x1020 [ 805.363725][ T7944] ? do_raw_spin_unlock+0x57/0x270 [ 805.363739][ T7944] ? mutex_lock_io_nested+0x1260/0x1260 [ 805.363751][ T7944] ? loop_info64_to_compat+0x6d0/0x6d0 [ 805.363766][ T7944] kthread_create_on_node+0xbb/0xf0 [ 805.363779][ T7944] ? __kthread_create_on_node+0x460/0x460 [ 805.363794][ T7944] ? lockdep_init_map+0x1be/0x6d0 [ 805.363806][ T7944] ? lockdep_init_map+0x1be/0x6d0 [ 805.363822][ T7944] loop_set_fd+0x312/0x1020 [ 805.363839][ T7944] lo_ioctl+0x1a3/0x1460 [ 805.363852][ T7944] ? trace_hardirqs_on+0x67/0x240 [ 805.363864][ T7944] ? loop_set_fd+0x1020/0x1020 [ 805.363880][ T7944] blkdev_ioctl+0xedb/0x1c1a [ 805.363892][ T7944] ? blkpg_ioctl+0xa90/0xa90 [ 805.363907][ T7944] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 805.363917][ T7944] ? __kasan_check_read+0x11/0x20 [ 805.363933][ T7944] ? __kasan_check_read+0x11/0x20 [ 805.363948][ T7944] block_ioctl+0xee/0x130 [ 805.363959][ T7944] ? blkdev_fallocate+0x410/0x410 [ 805.363971][ T7944] do_vfs_ioctl+0xdb6/0x13e0 [ 805.363985][ T7944] ? ioctl_preallocate+0x210/0x210 [ 805.364001][ T7944] ? __fget+0x384/0x560 [ 805.364015][ T7944] ? ksys_dup3+0x3e0/0x3e0 [ 805.364027][ T7944] ? do_sys_open+0x31d/0x5d0 [ 805.364040][ T7944] ? tomoyo_file_ioctl+0x23/0x30 [ 805.364054][ T7944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 805.364067][ T7944] ? security_file_ioctl+0x8d/0xc0 [ 805.364079][ T7944] ksys_ioctl+0xab/0xd0 [ 805.364092][ T7944] __x64_sys_ioctl+0x73/0xb0 [ 805.364107][ T7944] do_syscall_64+0xfd/0x6a0 [ 805.364122][ T7944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 805.364131][ T7944] RIP: 0033:0x4596e7 [ 805.364143][ T7944] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 805.364150][ T7944] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 805.364161][ T7944] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 805.364168][ T7944] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 805.364174][ T7944] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 19:35:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xf6', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 805.364181][ T7944] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 805.364188][ T7944] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 806.082888][ T8054] FAULT_INJECTION: forcing a failure. [ 806.082888][ T8054] name failslab, interval 1, probability 0, space 0, times 0 [ 806.155055][ T8054] CPU: 1 PID: 8054 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 806.163001][ T8054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 806.173149][ T8054] Call Trace: [ 806.176447][ T8054] dump_stack+0x172/0x1f0 [ 806.180797][ T8054] should_fail.cold+0xa/0x15 [ 806.185408][ T8054] ? fault_create_debugfs_attr+0x180/0x180 [ 806.191225][ T8054] ? ___might_sleep+0x163/0x280 [ 806.196104][ T8054] __should_failslab+0x121/0x190 19:35:49 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x24801, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000080)={0x8001, 0x101, 0x5}) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r2) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) [ 806.201054][ T8054] should_failslab+0x9/0x14 [ 806.205555][ T8054] __kmalloc+0x2e0/0x770 [ 806.209804][ T8054] ? mark_held_locks+0xf0/0xf0 [ 806.214569][ T8054] ? kasan_slab_alloc+0xf/0x20 [ 806.219336][ T8054] ? kmem_cache_alloc+0x121/0x710 [ 806.224359][ T8054] ? getname_flags+0xd6/0x5b0 [ 806.229030][ T8054] ? getname+0x1a/0x20 [ 806.233095][ T8054] ? do_sys_open+0x2c9/0x5d0 [ 806.237679][ T8054] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 806.243391][ T8054] tomoyo_realpath_from_path+0xcd/0x7b0 [ 806.248928][ T8054] ? tomoyo_path_number_perm+0x193/0x520 [ 806.254562][ T8054] tomoyo_path_number_perm+0x1dd/0x520 [ 806.260014][ T8054] ? tomoyo_path_number_perm+0x193/0x520 [ 806.265643][ T8054] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 806.271437][ T8054] ? __kasan_check_read+0x11/0x20 [ 806.276461][ T8054] ? __kasan_check_read+0x11/0x20 [ 806.281494][ T8054] ? __fget+0x384/0x560 [ 806.285642][ T8054] ? ksys_dup3+0x3e0/0x3e0 [ 806.290052][ T8054] ? do_sys_open+0x31d/0x5d0 [ 806.294640][ T8054] tomoyo_file_ioctl+0x23/0x30 [ 806.299400][ T8054] security_file_ioctl+0x77/0xc0 [ 806.304330][ T8054] ksys_ioctl+0x57/0xd0 [ 806.308477][ T8054] __x64_sys_ioctl+0x73/0xb0 [ 806.313061][ T8054] do_syscall_64+0xfd/0x6a0 [ 806.317561][ T8054] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 806.323445][ T8054] RIP: 0033:0x4596e7 [ 806.327334][ T8054] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 806.347102][ T8054] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 806.355504][ T8054] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 806.363472][ T8054] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 806.371432][ T8054] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 806.379417][ T8054] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 806.387377][ T8054] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 806.406226][ T8054] ERROR: Out of memory at tomoyo_realpath_from_path. 19:35:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xfe', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) r3 = gettid() openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x200, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:35:51 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8b, 0x14000) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000080)=@gcm_256={{0x304}, "4595a3c6d1fdfae2", "659097345e4b415c4ab6b54deede3f6f09a4a2109ee0604a1d935fb28ced5691", "ae874016", "02e409a8d9aef1f6"}, 0x38) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) bind$xdp(r2, &(0x7f0000000200)={0x2c, 0x1, r3, 0x35, r2}, 0x10) 19:35:51 executing program 3 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x400000000000079, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x16d) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 19:35:51 executing program 5: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$KVM_RUN(r1, 0xae80, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3f) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f00000002c0)={0x8001005, 0x4, 0x2}) ptrace$cont(0x1f, r2, 0x0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000740)='tracefs\x00', 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) 19:35:51 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) close(r1) write$binfmt_aout(r0, &(0x7f0000000000)={{0x10b, 0x7, 0x7, 0x109, 0x33d, 0xfffffffffffffff5, 0x40, 0x19bf}, "0e36798e6d796acc419021b2c851242301178255badde535b629ea1c3e37", [[], []]}, 0x23e) [ 808.225527][ T8298] FAULT_INJECTION: forcing a failure. [ 808.225527][ T8298] name failslab, interval 1, probability 0, space 0, times 0 [ 808.238454][ T8298] CPU: 1 PID: 8298 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 808.246348][ T8298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 808.256405][ T8298] Call Trace: [ 808.259699][ T8298] dump_stack+0x172/0x1f0 [ 808.264016][ T8298] should_fail.cold+0xa/0x15 [ 808.268588][ T8298] ? fault_create_debugfs_attr+0x180/0x180 [ 808.274377][ T8298] ? stack_trace_save+0xac/0xe0 [ 808.279214][ T8298] __should_failslab+0x121/0x190 [ 808.284169][ T8298] should_failslab+0x9/0x14 [ 808.288648][ T8298] kmem_cache_alloc+0x47/0x710 [ 808.293390][ T8298] ? save_stack+0x5c/0x90 [ 808.297697][ T8298] ? save_stack+0x23/0x90 [ 808.302002][ T8298] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 808.307781][ T8298] ? kasan_slab_alloc+0xf/0x20 [ 808.312552][ T8298] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 808.318858][ T8298] idr_get_free+0x48e/0x8c0 [ 808.323352][ T8298] idr_alloc_u32+0x19e/0x330 [ 808.327930][ T8298] ? __fprop_inc_percpu_max+0x230/0x230 [ 808.333511][ T8298] ? fault_create_debugfs_attr+0x180/0x180 [ 808.339302][ T8298] ? mark_held_locks+0xf0/0xf0 [ 808.344053][ T8298] ? page_to_nid.part.0+0x20/0x20 [ 808.349081][ T8298] idr_alloc_cyclic+0x132/0x270 [ 808.353916][ T8298] ? idr_alloc+0x150/0x150 [ 808.358316][ T8298] __kernfs_new_node+0x172/0x6c0 [ 808.363264][ T8298] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 808.368703][ T8298] ? trace_hardirqs_on+0x67/0x240 [ 808.373724][ T8298] ? _raw_spin_unlock_irq+0x5e/0x90 [ 808.378899][ T8298] ? __schedule+0xfa5/0x1580 [ 808.383469][ T8298] ? __sched_text_start+0x8/0x8 [ 808.388297][ T8298] ? account_entity_enqueue+0x244/0x390 [ 808.393819][ T8298] kernfs_new_node+0x96/0x120 [ 808.398504][ T8298] kernfs_create_dir_ns+0x52/0x160 [ 808.403603][ T8298] internal_create_group+0x7f4/0xc30 [ 808.408885][ T8298] ? bd_set_size+0x3f/0xb0 [ 808.413282][ T8298] ? remove_files.isra.0+0x190/0x190 [ 808.418549][ T8298] ? __down_timeout+0x2d0/0x2d0 [ 808.423471][ T8298] ? __kasan_check_write+0x14/0x20 [ 808.428559][ T8298] ? up_write+0x9d/0x280 [ 808.432801][ T8298] sysfs_create_group+0x20/0x30 [ 808.437634][ T8298] loop_set_fd+0xac1/0x1020 [ 808.442134][ T8298] lo_ioctl+0x1a3/0x1460 [ 808.446355][ T8298] ? trace_hardirqs_on+0x67/0x240 [ 808.451361][ T8298] ? loop_set_fd+0x1020/0x1020 [ 808.456111][ T8298] blkdev_ioctl+0xedb/0x1c1a [ 808.460701][ T8298] ? blkpg_ioctl+0xa90/0xa90 [ 808.465293][ T8298] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 808.471090][ T8298] ? __kasan_check_read+0x11/0x20 [ 808.476124][ T8298] ? __kasan_check_read+0x11/0x20 [ 808.481138][ T8298] block_ioctl+0xee/0x130 [ 808.485450][ T8298] ? blkdev_fallocate+0x410/0x410 [ 808.490452][ T8298] do_vfs_ioctl+0xdb6/0x13e0 [ 808.495040][ T8298] ? ioctl_preallocate+0x210/0x210 [ 808.500132][ T8298] ? __fget+0x384/0x560 [ 808.504263][ T8298] ? ksys_dup3+0x3e0/0x3e0 [ 808.508670][ T8298] ? do_sys_open+0x31d/0x5d0 [ 808.513239][ T8298] ? tomoyo_file_ioctl+0x23/0x30 [ 808.518153][ T8298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 808.524370][ T8298] ? security_file_ioctl+0x8d/0xc0 [ 808.529461][ T8298] ksys_ioctl+0xab/0xd0 [ 808.533596][ T8298] __x64_sys_ioctl+0x73/0xb0 [ 808.538194][ T8298] do_syscall_64+0xfd/0x6a0 [ 808.542680][ T8298] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 808.548548][ T8298] RIP: 0033:0x4596e7 [ 808.552453][ T8298] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 808.572034][ T8298] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 808.580420][ T8298] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 808.588370][ T8298] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 808.596344][ T8298] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 808.604300][ T8298] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 808.612249][ T8298] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:35:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:51 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80, 0x0) accept4$nfc_llcp(r0, 0x0, &(0x7f00000000c0), 0x80800) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r1, 0x80044941, &(0x7f0000000080)=0xffffffffffffffff) 19:35:51 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x7) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) 19:35:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:51 executing program 3 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 808.950577][ T8529] FAULT_INJECTION: forcing a failure. [ 808.950577][ T8529] name failslab, interval 1, probability 0, space 0, times 0 [ 808.963375][ T8529] CPU: 1 PID: 8529 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 808.971274][ T8529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 808.981328][ T8529] Call Trace: [ 808.984630][ T8529] dump_stack+0x172/0x1f0 [ 808.988965][ T8529] should_fail.cold+0xa/0x15 [ 808.993562][ T8529] ? fault_create_debugfs_attr+0x180/0x180 [ 808.999359][ T8529] ? stack_trace_save+0xac/0xe0 [ 809.004211][ T8529] __should_failslab+0x121/0x190 [ 809.009130][ T8529] should_failslab+0x9/0x14 [ 809.013608][ T8529] kmem_cache_alloc+0x47/0x710 [ 809.018349][ T8529] ? save_stack+0x5c/0x90 [ 809.022654][ T8529] ? save_stack+0x23/0x90 [ 809.026960][ T8529] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 809.032740][ T8529] ? kasan_slab_alloc+0xf/0x20 [ 809.037481][ T8529] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 809.043801][ T8529] idr_get_free+0x48e/0x8c0 [ 809.048300][ T8529] idr_alloc_u32+0x19e/0x330 [ 809.052878][ T8529] ? __fprop_inc_percpu_max+0x230/0x230 [ 809.058416][ T8529] ? fault_create_debugfs_attr+0x180/0x180 [ 809.064200][ T8529] ? mark_held_locks+0xf0/0xf0 [ 809.068939][ T8529] ? page_to_nid.part.0+0x20/0x20 [ 809.073958][ T8529] idr_alloc_cyclic+0x132/0x270 [ 809.078784][ T8529] ? idr_alloc+0x150/0x150 [ 809.083183][ T8529] __kernfs_new_node+0x172/0x6c0 [ 809.088117][ T8529] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 809.093564][ T8529] ? trace_hardirqs_on+0x67/0x240 [ 809.098591][ T8529] ? _raw_spin_unlock_irq+0x5e/0x90 [ 809.103768][ T8529] ? __schedule+0xfa5/0x1580 [ 809.108333][ T8529] ? __sched_text_start+0x8/0x8 [ 809.113168][ T8529] ? account_entity_enqueue+0x244/0x390 [ 809.118695][ T8529] kernfs_new_node+0x96/0x120 [ 809.123363][ T8529] kernfs_create_dir_ns+0x52/0x160 [ 809.128450][ T8529] internal_create_group+0x7f4/0xc30 [ 809.133714][ T8529] ? bd_set_size+0x3f/0xb0 [ 809.138108][ T8529] ? remove_files.isra.0+0x190/0x190 [ 809.143364][ T8529] ? __down_timeout+0x2d0/0x2d0 [ 809.148192][ T8529] ? __kasan_check_write+0x14/0x20 [ 809.153289][ T8529] ? up_write+0x9d/0x280 [ 809.157509][ T8529] sysfs_create_group+0x20/0x30 [ 809.162341][ T8529] loop_set_fd+0xac1/0x1020 [ 809.166823][ T8529] lo_ioctl+0x1a3/0x1460 [ 809.171053][ T8529] ? trace_hardirqs_on+0x67/0x240 [ 809.176075][ T8529] ? loop_set_fd+0x1020/0x1020 [ 809.180818][ T8529] blkdev_ioctl+0xedb/0x1c1a [ 809.185405][ T8529] ? blkpg_ioctl+0xa90/0xa90 [ 809.189997][ T8529] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 809.195780][ T8529] ? __kasan_check_read+0x11/0x20 [ 809.200799][ T8529] ? __kasan_check_read+0x11/0x20 [ 809.205828][ T8529] block_ioctl+0xee/0x130 [ 809.210132][ T8529] ? blkdev_fallocate+0x410/0x410 [ 809.215130][ T8529] do_vfs_ioctl+0xdb6/0x13e0 [ 809.219703][ T8529] ? ioctl_preallocate+0x210/0x210 [ 809.224807][ T8529] ? __fget+0x384/0x560 [ 809.228952][ T8529] ? ksys_dup3+0x3e0/0x3e0 [ 809.233344][ T8529] ? do_sys_open+0x31d/0x5d0 [ 809.238004][ T8529] ? tomoyo_file_ioctl+0x23/0x30 [ 809.242936][ T8529] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 809.249154][ T8529] ? security_file_ioctl+0x8d/0xc0 [ 809.254259][ T8529] ksys_ioctl+0xab/0xd0 [ 809.258393][ T8529] __x64_sys_ioctl+0x73/0xb0 [ 809.262958][ T8529] do_syscall_64+0xfd/0x6a0 [ 809.267444][ T8529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 809.273311][ T8529] RIP: 0033:0x4596e7 [ 809.277182][ T8529] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 809.296766][ T8529] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 809.305163][ T8529] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 809.313836][ T8529] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 809.327005][ T8529] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 809.334972][ T8529] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 809.342924][ T8529] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:35:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) r3 = gettid() openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x200, 0x0) fcntl$dupfd(r0, 0x0, r0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:35:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r1, &(0x7f0000000680)=[{&(0x7f0000000200)=""/113, 0x71}], 0x1, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000100)=""/77) 19:35:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e20, 0xffff, @mcast1, 0x7}}, 0x3ff, 0x1}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={r2, 0x38000, 0x2, 0x10001}, &(0x7f0000000140)=0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000002240)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)=""/4096, 0x34000}], 0x1}}], 0x1, 0x0, 0x0) 19:35:54 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:54 executing program 3 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 811.733439][ T8543] FAULT_INJECTION: forcing a failure. [ 811.733439][ T8543] name failslab, interval 1, probability 0, space 0, times 0 [ 811.758373][ T8543] CPU: 0 PID: 8543 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 811.766304][ T8543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 811.776383][ T8543] Call Trace: 19:35:54 executing program 1: r0 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) r1 = accept$packet(r0, 0x0, &(0x7f0000000040)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x3, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) sendfile(r1, r0, &(0x7f0000000200), 0x1) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, r2, 0x0, 0xa, &(0x7f0000000280)='/dev/full\x00'}, 0x30) getpgid(r4) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000300)=[0x401, 0x9]) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae09, &(0x7f0000000340)=""/42) openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x50df078757fc066b) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) setresuid(r3, r3, r3) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000003c0)=0x2, 0x4) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000400)=0x6) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, &(0x7f0000000440), &(0x7f0000000480)=0x18) ioctl$BLKIOMIN(r2, 0x1278, &(0x7f00000004c0)) connect$vsock_dgram(r2, &(0x7f0000000500)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) write$capi20_data(r2, &(0x7f0000000540)={{0x10, 0x8, 0x581ff723f85ce246, 0x80, 0x5, 0x2}, 0x74, "de73f8015182f7a79e19c4cf41144f08f69d4a6d6a5a8301209df9ab718c19dc64dcaef5c35903039a8295750ce7b43be6f69e6cb662963b2c66afa449528e9c1b1ae3f9debddad8447947fd3c4fc99674e11b5946bd85d6f0ca396451af772c1441184a36ad7d02da31f1252c9acb7eaa8efeac"}, 0x86) ioctl$IMGETDEVINFO(r2, 0x80044944, &(0x7f0000000600)={0xfffffffffffffffc}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000680)={0x0, 0x1ff}, &(0x7f00000006c0)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000700)={r6, 0x1}, &(0x7f0000000740)=0x8) ioctl$CAPI_GET_SERIAL(r2, 0xc0044308, &(0x7f0000000780)) ioctl$sock_TIOCOUTQ(r2, 0x5411, &(0x7f00000007c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000800), &(0x7f0000000840)=0x14) ioctl$VIDIOC_SUBDEV_S_CROP(r2, 0xc038563c, &(0x7f0000000880)={0x1, 0x0, {0xfe, 0xe376, 0x6, 0x1000}}) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f00000008c0)=0x4) sendmsg$key(r2, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001980)={&(0x7f0000000900)={0x2, 0xb, 0xafc9, 0x3, 0x20d, 0x0, 0x70bd25, 0x25dfdbfe, [@sadb_x_sec_ctx={0x201, 0x18, 0x3f0000000000000, 0xe9b, 0x1000, "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"}, @sadb_sa={0x2, 0x1, 0x4d5, 0xfff, 0x4, 0xee, 0x0, 0x80000000}, @sadb_x_policy={0x8, 0x12, 0x4, 0x0, 0x0, 0x0, 0x2b, {0x6, 0xff, 0x8, 0x9, 0x0, 0x0, 0x0, @in=@empty, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}}]}, 0x1068}}, 0x80) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000001a00)=0xfff) 19:35:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 811.779688][ T8543] dump_stack+0x172/0x1f0 [ 811.784300][ T8543] should_fail.cold+0xa/0x15 [ 811.788900][ T8543] ? fault_create_debugfs_attr+0x180/0x180 [ 811.794719][ T8543] ? page_to_nid.part.0+0x20/0x20 [ 811.799747][ T8543] ? ___might_sleep+0x163/0x280 [ 811.804606][ T8543] __should_failslab+0x121/0x190 [ 811.809560][ T8543] should_failslab+0x9/0x14 [ 811.814070][ T8543] kmem_cache_alloc_trace+0x2d3/0x790 [ 811.819440][ T8543] ? lockdep_init_map+0x1be/0x6d0 [ 811.824462][ T8543] ? loop_info64_to_compat+0x6d0/0x6d0 19:35:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 811.829928][ T8543] __kthread_create_on_node+0xf2/0x460 [ 811.835384][ T8543] ? lock_acquire+0x190/0x410 [ 811.840066][ T8543] ? __kthread_parkme+0x1c0/0x1c0 [ 811.845089][ T8543] ? loop_set_fd+0x659/0x1020 [ 811.849758][ T8543] ? do_raw_spin_unlock+0x57/0x270 [ 811.854877][ T8543] ? mutex_lock_io_nested+0x1260/0x1260 [ 811.860409][ T8543] ? loop_info64_to_compat+0x6d0/0x6d0 [ 811.865863][ T8543] kthread_create_on_node+0xbb/0xf0 [ 811.871061][ T8543] ? __kthread_create_on_node+0x460/0x460 [ 811.876801][ T8543] ? lockdep_init_map+0x1be/0x6d0 [ 811.881830][ T8543] ? lockdep_init_map+0x1be/0x6d0 [ 811.886851][ T8543] loop_set_fd+0x312/0x1020 [ 811.891354][ T8543] lo_ioctl+0x1a3/0x1460 [ 811.895593][ T8543] ? trace_hardirqs_on+0x67/0x240 [ 811.900616][ T8543] ? loop_set_fd+0x1020/0x1020 [ 811.905389][ T8543] blkdev_ioctl+0xedb/0x1c1a [ 811.909980][ T8543] ? blkpg_ioctl+0xa90/0xa90 [ 811.914568][ T8543] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 811.920368][ T8543] ? __kasan_check_read+0x11/0x20 [ 811.925390][ T8543] ? __kasan_check_read+0x11/0x20 [ 811.930411][ T8543] block_ioctl+0xee/0x130 [ 811.934734][ T8543] ? blkdev_fallocate+0x410/0x410 [ 811.939847][ T8543] do_vfs_ioctl+0xdb6/0x13e0 [ 811.944444][ T8543] ? ioctl_preallocate+0x210/0x210 [ 811.949572][ T8543] ? __fget+0x384/0x560 [ 811.953728][ T8543] ? ksys_dup3+0x3e0/0x3e0 [ 811.958141][ T8543] ? do_sys_open+0x31d/0x5d0 [ 811.962727][ T8543] ? tomoyo_file_ioctl+0x23/0x30 [ 811.967673][ T8543] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 811.973924][ T8543] ? security_file_ioctl+0x8d/0xc0 [ 811.979048][ T8543] ksys_ioctl+0xab/0xd0 [ 811.983217][ T8543] __x64_sys_ioctl+0x73/0xb0 [ 811.987814][ T8543] do_syscall_64+0xfd/0x6a0 [ 811.992312][ T8543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 811.998193][ T8543] RIP: 0033:0x4596e7 [ 812.002077][ T8543] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 812.021664][ T8543] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 19:35:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 812.030056][ T8543] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 812.038004][ T8543] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 812.045968][ T8543] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 812.053930][ T8543] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 812.062150][ T8543] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:35:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) r3 = gettid() openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x200, 0x0) fcntl$dupfd(r0, 0x0, r0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:35:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:55 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={r2, r3, r4}, 0xc) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) 19:35:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000300)) sendmmsg$alg(r3, &(0x7f0000001000)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="47f31e1180a62d4a72ca49c3cac5502a11aa6c57b2a26beb3b6f25939c9d3dd8fb439553bab49ed0", 0x28}, {&(0x7f0000000400)="5f8c42a51edb4357a28d0147c8a435000000000000004b8de48e52f7df395e5105d600e4b9b394a5953f2dbb1c019e40cf67c398d50e0d61a0e69e9ac8a783c47f17752c1e5358e28ec1b90131c21619a8efe2a8fda3923749646ad1eb09149ee95bdef2765c8316092a36c8b83910fe347502243ca5cfacf58201ddc14c910224713eefa741ed31bf9e2812f80297a1f962781a59156aceb859770d5d594e0c1b87c462d380f211959f37e26150b1931f170e5b60a36bfca3ea38da77e1abf175233269fab393d2", 0xc8}], 0x2, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}], 0x1}}], 0x40000000000015c, 0x0, 0x0) 19:35:55 executing program 3 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:55 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x20000800003) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x84) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bcsh0\x00', 0x0}) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000002c0)={@remote, 0x0}, &(0x7f0000000300)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000380)={0x0, @dev, @empty}, &(0x7f00000003c0)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000580)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x120, r2, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0x104, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r4}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x120}, 0x1, 0x0, 0x0, 0x4000}, 0x80) [ 812.298624][ T8685] FAULT_INJECTION: forcing a failure. [ 812.298624][ T8685] name failslab, interval 1, probability 0, space 0, times 0 [ 812.312034][ T8685] CPU: 1 PID: 8685 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 812.319944][ T8685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 812.330002][ T8685] Call Trace: [ 812.333296][ T8685] dump_stack+0x172/0x1f0 [ 812.337724][ T8685] should_fail.cold+0xa/0x15 [ 812.342317][ T8685] ? lock_downgrade+0x920/0x920 19:35:55 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x63ced61f62078c8b) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x40, 0x0, 0x1, 0x20, "d6865588c6749114db58902ef70ba04a83b516be8ff06ce14a4a253bf14ec06e"}) r1 = syz_open_dev$sg(&(0x7f0000005b00)='/dev/sg#\x00', 0x0, 0x80) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000080)="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") openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0xd0000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x101000, 0x0) [ 812.347186][ T8685] ? fault_create_debugfs_attr+0x180/0x180 [ 812.352994][ T8685] ? page_to_nid.part.0+0x20/0x20 [ 812.358012][ T8685] ? ___might_sleep+0x163/0x280 [ 812.362847][ T8685] __should_failslab+0x121/0x190 [ 812.367770][ T8685] should_failslab+0x9/0x14 [ 812.372254][ T8685] kmem_cache_alloc+0x2aa/0x710 [ 812.377079][ T8685] ? __schedule+0xfa5/0x1580 [ 812.381648][ T8685] ? __kasan_check_read+0x11/0x20 [ 812.386653][ T8685] __kernfs_new_node+0xf0/0x6c0 [ 812.391482][ T8685] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 812.396917][ T8685] ? trace_hardirqs_on+0x67/0x240 [ 812.401919][ T8685] ? _raw_spin_unlock_irq+0x5e/0x90 [ 812.407095][ T8685] ? __schedule+0xfa5/0x1580 [ 812.411677][ T8685] ? __sched_text_start+0x8/0x8 [ 812.416642][ T8685] ? account_entity_enqueue+0x244/0x390 [ 812.422174][ T8685] kernfs_new_node+0x96/0x120 [ 812.426830][ T8685] kernfs_create_dir_ns+0x52/0x160 [ 812.431924][ T8685] internal_create_group+0x7f4/0xc30 [ 812.437193][ T8685] ? bd_set_size+0x3f/0xb0 [ 812.441590][ T8685] ? remove_files.isra.0+0x190/0x190 [ 812.446852][ T8685] ? __down_timeout+0x2d0/0x2d0 [ 812.451694][ T8685] ? __kasan_check_write+0x14/0x20 [ 812.456796][ T8685] ? up_write+0x9d/0x280 [ 812.461016][ T8685] sysfs_create_group+0x20/0x30 [ 812.465845][ T8685] loop_set_fd+0xac1/0x1020 [ 812.470339][ T8685] lo_ioctl+0x1a3/0x1460 [ 812.474570][ T8685] ? trace_hardirqs_on+0x67/0x240 [ 812.479571][ T8685] ? loop_set_fd+0x1020/0x1020 [ 812.484333][ T8685] blkdev_ioctl+0xedb/0x1c1a [ 812.488931][ T8685] ? blkpg_ioctl+0xa90/0xa90 [ 812.493534][ T8685] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 812.499905][ T8685] ? __kasan_check_read+0x11/0x20 [ 812.504911][ T8685] ? __kasan_check_read+0x11/0x20 [ 812.509912][ T8685] block_ioctl+0xee/0x130 [ 812.514228][ T8685] ? blkdev_fallocate+0x410/0x410 [ 812.519250][ T8685] do_vfs_ioctl+0xdb6/0x13e0 [ 812.523817][ T8685] ? ioctl_preallocate+0x210/0x210 [ 812.528907][ T8685] ? __fget+0x384/0x560 [ 812.533042][ T8685] ? ksys_dup3+0x3e0/0x3e0 [ 812.537438][ T8685] ? do_sys_open+0x31d/0x5d0 [ 812.542010][ T8685] ? tomoyo_file_ioctl+0x23/0x30 [ 812.546926][ T8685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 812.553141][ T8685] ? security_file_ioctl+0x8d/0xc0 [ 812.558229][ T8685] ksys_ioctl+0xab/0xd0 [ 812.562369][ T8685] __x64_sys_ioctl+0x73/0xb0 [ 812.566945][ T8685] do_syscall_64+0xfd/0x6a0 [ 812.571427][ T8685] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 812.577294][ T8685] RIP: 0033:0x4596e7 19:35:55 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4000, 0x0) openat$snapshot(0xffffffffffffff9c, 0xfffffffffffffffe, 0x20000, 0x0) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x1f, 0x40880) r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, 0x0) 19:35:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 812.581172][ T8685] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 812.600789][ T8685] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 812.609205][ T8685] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 812.617185][ T8685] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 812.625143][ T8685] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 812.633103][ T8685] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 812.641049][ T8685] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:35:55 executing program 3 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:55 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00<\xa3\x04;\xe6\xa5\a\xbc\x96\x03g\x8dd\xe6\x87\xad\x9e!\'H\xe3\x95h>d2>\xc6\x02\xee\xfb\x88\xac\x9f\x02\xee\xcdZ\x1e\xae\xfd\xdd]\xa2Uk\xaf\'\x90\xd0K\x0e\xcf\x8b\x94', 0x200002, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) fstat(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000007c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000900)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@initdev, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000a40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000b80)=0xe8) r9 = getegid() getresgid(&(0x7f0000000bc0), &(0x7f0000000c00)=0x0, &(0x7f0000000c40)) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000c80)={{}, {0x1, 0x3}, [{0x2, 0x7, r1}, {0x2, 0x5, r2}, {0x2, 0x6, r3}, {0x2, 0x4, r4}, {0x2, 0x0, r5}, {0x2, 0x4, r6}, {0x2, 0x4, r7}, {0x2, 0x7, r8}], {0x4, 0x5}, [{0x8, 0x2, r9}, {0x8, 0x1, r10}], {0x10, 0x7}, {0x20, 0x1}}, 0x74, 0x3) r11 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) r12 = openat$cgroup_procs(r11, &(0x7f00000003c0)='cgroup.procs\x00\n\xa5\x9d`\xc8\xae\xe4pgcMN\xeb\xeb \xd8Wq\x8fH\x0302\x8f\xa5y\xfd\x8b\x02\xcf\xd9\xc7\x9a\x8f\xa0dr\xc1\x17\xc5-\xa6G\xf2f\x90\xe2\x0eF\xa1\x15\xe5\xfb,d\x9c\xb3hf\xdf\xc0\xda\xfe\xc5?1\xdb=\xc9v,\xb0l6\xd9C\xaay\xc5\xaf\xe1\xf3\xd6\xb37\xa7\xe2c\xc6L\x14I\xe3\xcfK\xcf\xab\xdfY\x83\xc5>\xbco\xd5\xd6\xbe=nc\xc0\x14\xfc\xa1OZ\x80\xd4\xbe \b\xbdB_-~\rP0\x9fA\xecCe*\xcc\xcc\xec\xaci\x92\xaf\xb6r\xab\xfc\xbd\x16{8G\xce\xeft,\x99\xe2\xf2Ju\xbd\xca\x8f\xd0\x86\x92]\xf2<\xfc\xac\t\xe8\ro\xda\xaa\x1b\xddb-*l\x9c\xd9\xefX\xb3\xec\xc6\x96=\x94\xa4b&gU\\_\xdd\xa6\xabN\x98\x19\xa8\xe3\x8e\xa3\xee\xd1\xf6=\xa2\x7f\x96dt\x9e9\x8ei\x13\xf9\x19WC\x95\xe3\x99!\xc8\x9a\xef\xf6\xd96\x0e\xe8G\xda\xa8\x80\xa0\x90\xa8K9\xfe\xa9\xd0\xf0\xdcV|\x955\xcf#\xf9\xbd\xf0[\xb1\xb9\x91\xf3\xea\xcbF\x9e>ZS\x10\x8ec\xa0 Pv\xad\x04C\x9bWwh\xec\xadHq\x86\xc8Q\x8b8v5\x7f\xdf\x10Q\xb1\x9cW)Z\xaf)\xc7\x92\xddt\xd3\x81\xf8(\xd9\vES\va\x9a\xcc\xdf\xe9\xa0\'\xb0\xc05\"X\x9d9fb', 0x2, 0x0) write$cgroup_pid(r12, &(0x7f0000000000), 0x12) 19:35:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 812.826933][ T8871] FAULT_INJECTION: forcing a failure. [ 812.826933][ T8871] name failslab, interval 1, probability 0, space 0, times 0 [ 812.839836][ T8871] CPU: 1 PID: 8871 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 812.847749][ T8871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 812.857807][ T8871] Call Trace: [ 812.861104][ T8871] dump_stack+0x172/0x1f0 [ 812.865450][ T8871] should_fail.cold+0xa/0x15 [ 812.870050][ T8871] ? fault_create_debugfs_attr+0x180/0x180 19:35:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) r3 = gettid() openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x200, 0x0) fcntl$dupfd(r0, 0x0, r0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:35:55 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x1ff, 0x1) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) recvfrom$unix(r1, &(0x7f0000000080)=""/107, 0x6b, 0x40002000, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e21}, 0x6e) close(r1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) [ 812.875859][ T8871] ? stack_trace_save+0xac/0xe0 [ 812.880721][ T8871] __should_failslab+0x121/0x190 [ 812.885661][ T8871] should_failslab+0x9/0x14 [ 812.890161][ T8871] kmem_cache_alloc+0x47/0x710 [ 812.894916][ T8871] ? save_stack+0x5c/0x90 [ 812.899250][ T8871] ? save_stack+0x23/0x90 [ 812.903570][ T8871] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 812.909352][ T8871] ? kasan_slab_alloc+0xf/0x20 [ 812.914097][ T8871] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 812.920431][ T8871] idr_get_free+0x48e/0x8c0 [ 812.924915][ T8871] idr_alloc_u32+0x19e/0x330 [ 812.929484][ T8871] ? __fprop_inc_percpu_max+0x230/0x230 [ 812.935013][ T8871] ? fault_create_debugfs_attr+0x180/0x180 [ 812.940801][ T8871] ? mark_held_locks+0xf0/0xf0 [ 812.945629][ T8871] ? page_to_nid.part.0+0x20/0x20 [ 812.950640][ T8871] idr_alloc_cyclic+0x132/0x270 [ 812.955479][ T8871] ? idr_alloc+0x150/0x150 [ 812.959878][ T8871] __kernfs_new_node+0x172/0x6c0 [ 812.964809][ T8871] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 812.970996][ T8871] ? trace_hardirqs_on+0x67/0x240 [ 812.976011][ T8871] ? _raw_spin_unlock_irq+0x5e/0x90 [ 812.981227][ T8871] ? __schedule+0xfa5/0x1580 [ 812.985805][ T8871] ? __sched_text_start+0x8/0x8 [ 812.990647][ T8871] ? account_entity_enqueue+0x244/0x390 [ 812.996189][ T8871] kernfs_new_node+0x96/0x120 [ 813.000851][ T8871] kernfs_create_dir_ns+0x52/0x160 [ 813.005959][ T8871] internal_create_group+0x7f4/0xc30 [ 813.011234][ T8871] ? bd_set_size+0x3f/0xb0 [ 813.015646][ T8871] ? remove_files.isra.0+0x190/0x190 [ 813.020932][ T8871] ? __down_timeout+0x2d0/0x2d0 [ 813.025760][ T8871] ? __kasan_check_write+0x14/0x20 [ 813.030865][ T8871] ? up_write+0x9d/0x280 [ 813.035097][ T8871] sysfs_create_group+0x20/0x30 [ 813.039926][ T8871] loop_set_fd+0xac1/0x1020 [ 813.044425][ T8871] lo_ioctl+0x1a3/0x1460 [ 813.048679][ T8871] ? trace_hardirqs_on+0x67/0x240 [ 813.053754][ T8871] ? loop_set_fd+0x1020/0x1020 [ 813.058513][ T8871] blkdev_ioctl+0xedb/0x1c1a [ 813.063105][ T8871] ? blkpg_ioctl+0xa90/0xa90 [ 813.067682][ T8871] ? tomoyo_execute_permission+0x4a0/0x4a0 19:35:56 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rfkill\x00', 0x101012, 0x0) r1 = memfd_create(&(0x7f0000000200)='/dev/dsp\x00', 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xf) getgid() sendfile(r0, r1, &(0x7f0000000000), 0x7fffffffffffffff) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) [ 813.073470][ T8871] ? __kasan_check_read+0x11/0x20 [ 813.078478][ T8871] ? __kasan_check_read+0x11/0x20 [ 813.083483][ T8871] block_ioctl+0xee/0x130 [ 813.087793][ T8871] ? blkdev_fallocate+0x410/0x410 [ 813.092808][ T8871] do_vfs_ioctl+0xdb6/0x13e0 [ 813.097397][ T8871] ? ioctl_preallocate+0x210/0x210 [ 813.102512][ T8871] ? __fget+0x384/0x560 [ 813.106676][ T8871] ? ksys_dup3+0x3e0/0x3e0 [ 813.111132][ T8871] ? do_sys_open+0x31d/0x5d0 [ 813.115724][ T8871] ? tomoyo_file_ioctl+0x23/0x30 [ 813.120665][ T8871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 813.126909][ T8871] ? security_file_ioctl+0x8d/0xc0 [ 813.132020][ T8871] ksys_ioctl+0xab/0xd0 [ 813.136162][ T8871] __x64_sys_ioctl+0x73/0xb0 [ 813.140737][ T8871] do_syscall_64+0xfd/0x6a0 [ 813.145231][ T8871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.151107][ T8871] RIP: 0033:0x4596e7 [ 813.154981][ T8871] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 813.174567][ T8871] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 813.182965][ T8871] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 813.190940][ T8871] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 813.198893][ T8871] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 813.206857][ T8871] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 813.214807][ T8871] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:35:56 executing program 3 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x8000, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000200)={0x6, 0x0, 0x100a, 0xbb, 0x3, {0x1, 0x3}, 0x1}) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = socket$inet(0x10, 0x2000000003, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0xee, 0x40000) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x1a) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a0203021f00000601000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) connect$vsock_dgram(r3, &(0x7f0000000180)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) 19:35:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:56 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000005600)={0x0, 0x10, &(0x7f00000055c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000005640)=0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r0}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f00000000c0), 0x2c3) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff020000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003a00000000000000000000000000000000000000000000000000000000000000000000020000000a00000000000000fe800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff020000000000000000000000000001000000000000000000000000000000003800000000000000000000000000000000000000000000000000008b5b000000000000000000000000000000000000000000000000000000000000f1ffffff00000000000000000000000000000000000000000000000000000088d050fdbae72a0a2d7e080097f4f737c829fbd29b489615462a14da0f03ca2e8d27ec3e9ecb296de3e7b121041b30efa4d2f2e10ac6ad55111b7ceee1820ad414cd4838d024f580dbe60000feae1fa8229bbd205edcf47aa1e844985441376db4887da534daa2bb53d65e7c50bebf37521301147b8f2616d03620f1e77a1278ea33c69583b5108adce11b7147a33439314873680d01107c150f7c25d6f72cad248f8709c4575c8b9b5b94e98d39cff89f7a1ed841ca2b6869d03f5efada1324a2a86a34475de19aaa2248dc5d58a0028d5af28c69c99e4e6afb0b9785341c622226f255ed932f0e0b10e0b00b405d364db4307d0b09c901c593139d48"], 0x190) readv(r4, &(0x7f0000000000)=[{&(0x7f0000000200)=""/181, 0xb5}], 0x1) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f00000001c0)={r1, 0x7, 0x0, 0x3, 0x200}, &(0x7f0000000200)=0x18) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="200000006f00000084001700020000000000410200000000f1ffffff2f614f837fb1840f70c6bfd16698e2b2b4775df3488ab220061fe890d8b10601f9e1608c4b366b8c1961698093e959d2267eacdff4acf9bbaddbe53bddab11b1f3c53bf503e9157f33521892df8c1a2a0f01e70d0dbc5c6e972e4c096f8d398805596025f5067f8ca75accaf41d319db6f4c3f7df884d569cdc2a4d415ec39f31256533d219a0d7bce22049a8db815156207b792946ccfcfbeb9fcaeca2d9b", @ANYRES32=0x0], 0x20}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e23, @broadcast}}, [0x37e1, 0x101, 0x7fffffff, 0x1, 0x4f36, 0xffffffffffffffff, 0x0, 0x4, 0x7093, 0x200, 0x77d9, 0x0, 0xeeb, 0x0, 0x8]}, &(0x7f0000000000)=0x100) 19:35:56 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) close(r1) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x101000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r2, 0x810c5701, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) [ 813.431840][ T9026] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 813.453056][ T9027] FAULT_INJECTION: forcing a failure. [ 813.453056][ T9027] name failslab, interval 1, probability 0, space 0, times 0 [ 813.467578][ T9027] CPU: 1 PID: 9027 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 813.475486][ T9027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 813.485539][ T9027] Call Trace: [ 813.488837][ T9027] dump_stack+0x172/0x1f0 [ 813.493171][ T9027] should_fail.cold+0xa/0x15 [ 813.497769][ T9027] ? fault_create_debugfs_attr+0x180/0x180 [ 813.503732][ T9027] ? page_to_nid.part.0+0x20/0x20 [ 813.508742][ T9027] ? ___might_sleep+0x163/0x280 [ 813.513573][ T9027] __should_failslab+0x121/0x190 [ 813.518501][ T9027] should_failslab+0x9/0x14 [ 813.523089][ T9027] kmem_cache_alloc+0x2aa/0x710 [ 813.527926][ T9027] ? __mutex_lock+0x45d/0x13c0 [ 813.532671][ T9027] __kernfs_new_node+0xf0/0x6c0 [ 813.537499][ T9027] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 813.542931][ T9027] ? wait_for_completion+0x440/0x440 [ 813.549501][ T9027] ? __kasan_check_write+0x14/0x20 [ 813.554591][ T9027] ? mutex_unlock+0xd/0x10 [ 813.558981][ T9027] ? kernfs_activate+0x192/0x1f0 [ 813.563908][ T9027] kernfs_new_node+0x96/0x120 [ 813.568576][ T9027] __kernfs_create_file+0x51/0x33b [ 813.573665][ T9027] sysfs_add_file_mode_ns+0x222/0x560 [ 813.579014][ T9027] internal_create_group+0x359/0xc30 [ 813.584276][ T9027] ? bd_set_size+0x3f/0xb0 [ 813.588673][ T9027] ? remove_files.isra.0+0x190/0x190 [ 813.593933][ T9027] ? __down_timeout+0x2d0/0x2d0 [ 813.598760][ T9027] ? __kasan_check_write+0x14/0x20 [ 813.603854][ T9027] ? up_write+0x9d/0x280 [ 813.608077][ T9027] sysfs_create_group+0x20/0x30 [ 813.612903][ T9027] loop_set_fd+0xac1/0x1020 [ 813.617386][ T9027] lo_ioctl+0x1a3/0x1460 [ 813.621605][ T9027] ? trace_hardirqs_on+0x67/0x240 [ 813.626618][ T9027] ? loop_set_fd+0x1020/0x1020 [ 813.631369][ T9027] blkdev_ioctl+0xedb/0x1c1a [ 813.635951][ T9027] ? blkpg_ioctl+0xa90/0xa90 [ 813.640530][ T9027] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 813.646419][ T9027] ? __kasan_check_read+0x11/0x20 [ 813.651429][ T9027] ? __kasan_check_read+0x11/0x20 [ 813.656431][ T9027] block_ioctl+0xee/0x130 [ 813.660745][ T9027] ? blkdev_fallocate+0x410/0x410 [ 813.665753][ T9027] do_vfs_ioctl+0xdb6/0x13e0 [ 813.670350][ T9027] ? ioctl_preallocate+0x210/0x210 [ 813.675438][ T9027] ? __fget+0x384/0x560 [ 813.679569][ T9027] ? ksys_dup3+0x3e0/0x3e0 [ 813.683958][ T9027] ? do_sys_open+0x31d/0x5d0 [ 813.688543][ T9027] ? tomoyo_file_ioctl+0x23/0x30 [ 813.693458][ T9027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 813.699672][ T9027] ? security_file_ioctl+0x8d/0xc0 [ 813.704768][ T9027] ksys_ioctl+0xab/0xd0 [ 813.708904][ T9027] __x64_sys_ioctl+0x73/0xb0 [ 813.713470][ T9027] do_syscall_64+0xfd/0x6a0 [ 813.717952][ T9027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.723824][ T9027] RIP: 0033:0x4596e7 [ 813.727711][ T9027] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 813.747307][ T9027] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 813.755707][ T9027] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 813.763656][ T9027] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 813.771604][ T9027] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 19:35:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) r3 = gettid() openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x200, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 813.779557][ T9027] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 813.787514][ T9027] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:35:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:56 executing program 3 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:56 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='mounts\xfa') openat$cgroup_ro(r0, &(0x7f0000000040)='0puacct.usage_percpu\x00', 0x0, 0x0) 19:35:57 executing program 2: syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x200004000c603, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="604884e002000a0090040300001af5c97824", 0x131, 0x400}], 0x0, 0x0) 19:35:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 814.036163][ T9154] FAULT_INJECTION: forcing a failure. [ 814.036163][ T9154] name failslab, interval 1, probability 0, space 0, times 0 [ 814.065392][ T9154] CPU: 1 PID: 9154 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 814.073316][ T9154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 814.083369][ T9154] Call Trace: [ 814.086662][ T9154] dump_stack+0x172/0x1f0 [ 814.090996][ T9154] should_fail.cold+0xa/0x15 [ 814.095591][ T9154] ? fault_create_debugfs_attr+0x180/0x180 [ 814.101397][ T9154] ? page_to_nid.part.0+0x20/0x20 [ 814.106425][ T9154] ? ___might_sleep+0x163/0x280 [ 814.111277][ T9154] __should_failslab+0x121/0x190 [ 814.116210][ T9154] should_failslab+0x9/0x14 [ 814.120718][ T9154] kmem_cache_alloc+0x2aa/0x710 [ 814.125583][ T9154] ? kernfs_activate+0x192/0x1f0 [ 814.130513][ T9154] ? __kasan_check_read+0x11/0x20 [ 814.135530][ T9154] ? __mutex_lock+0x45d/0x13c0 [ 814.140288][ T9154] __kernfs_new_node+0xf0/0x6c0 [ 814.145127][ T9154] ? __mutex_lock+0x45d/0x13c0 [ 814.149888][ T9154] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 814.155347][ T9154] ? __kasan_check_write+0x14/0x20 [ 814.160447][ T9154] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 814.165983][ T9154] ? wait_for_completion+0x440/0x440 [ 814.171266][ T9154] kernfs_new_node+0x96/0x120 [ 814.175939][ T9154] __kernfs_create_file+0x51/0x33b [ 814.181048][ T9154] sysfs_add_file_mode_ns+0x222/0x560 [ 814.186415][ T9154] internal_create_group+0x359/0xc30 [ 814.191696][ T9154] ? bd_set_size+0x3f/0xb0 [ 814.196127][ T9154] ? remove_files.isra.0+0x190/0x190 [ 814.201395][ T9154] ? __down_timeout+0x2d0/0x2d0 [ 814.206221][ T9154] ? __kasan_check_write+0x14/0x20 [ 814.211317][ T9154] ? up_write+0x9d/0x280 [ 814.215558][ T9154] sysfs_create_group+0x20/0x30 [ 814.220403][ T9154] loop_set_fd+0xac1/0x1020 [ 814.224898][ T9154] lo_ioctl+0x1a3/0x1460 [ 814.229134][ T9154] ? trace_hardirqs_on+0x67/0x240 [ 814.234141][ T9154] ? loop_set_fd+0x1020/0x1020 [ 814.238885][ T9154] blkdev_ioctl+0xedb/0x1c1a [ 814.243451][ T9154] ? blkpg_ioctl+0xa90/0xa90 [ 814.248018][ T9154] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 814.253804][ T9154] ? __kasan_check_read+0x11/0x20 [ 814.258808][ T9154] ? __kasan_check_read+0x11/0x20 [ 814.263812][ T9154] block_ioctl+0xee/0x130 [ 814.268119][ T9154] ? blkdev_fallocate+0x410/0x410 [ 814.273118][ T9154] do_vfs_ioctl+0xdb6/0x13e0 [ 814.277689][ T9154] ? ioctl_preallocate+0x210/0x210 [ 814.282775][ T9154] ? __fget+0x384/0x560 [ 814.286910][ T9154] ? ksys_dup3+0x3e0/0x3e0 [ 814.291324][ T9154] ? do_sys_open+0x31d/0x5d0 [ 814.295902][ T9154] ? tomoyo_file_ioctl+0x23/0x30 [ 814.300832][ T9154] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 814.307056][ T9154] ? security_file_ioctl+0x8d/0xc0 [ 814.312159][ T9154] ksys_ioctl+0xab/0xd0 [ 814.316301][ T9154] __x64_sys_ioctl+0x73/0xb0 [ 814.320884][ T9154] do_syscall_64+0xfd/0x6a0 [ 814.325366][ T9154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 814.331241][ T9154] RIP: 0033:0x4596e7 [ 814.335122][ T9154] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 814.354701][ T9154] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 814.363114][ T9154] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 814.371071][ T9154] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 814.379040][ T9154] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 814.386995][ T9154] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 814.394952][ T9154] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 814.407461][ T9026] bond0: (slave bond_slave_1): Releasing backup interface 19:35:57 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000280)=0x2ab5, 0x1d9) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x2000) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="5e05000000000000c9100000000001000100000100c910fe800000000000000000000000002f489d21313f36d2ce00aeeb769b5a81d48b258586d0e7112595bccf8705f2155c46b3fbb4d6dcf587c1b63dd93dea22ce2fa5fed95bec924d0066cf526e9c5161e428a5963014a3bf94ab0100a975714bca3379acaf541032c4fa1ef354ca7ed6c95b"], 0x38) sendto$isdn(r1, &(0x7f00000000c0)={0x3ff, 0xf1, "49a3d0cde774145dd86643cbacb3092a7cfe628fc21153b7a57fc82a0428e9b8725e1f0912fbba14f925904f"}, 0x34, 0x1, &(0x7f0000000200)={0x22, 0x56, 0x1, 0x7, 0x4}, 0x6) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000100)={0x0, 0x3, 0x2000e07, 0x5, 0xffffffff}, 0xc) setsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000040)=ANY=[@ANYBLOB="880a040505403102ff010000000000000000000000000001ff010000000000000000000000000001ff010000000000000000000000000001fe8000000000003b88f0732a988fbdc5688b8827e5c30100000000000000bbfe"], 0x58) [ 814.438546][ T9157] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 19:35:57 executing program 3 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:57 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) r1 = request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)='keyring\x00', 0xfffffffffffffffd) request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000000)={'\x00\x00\x10', 0x2, 0x4c00000000006800}, 0x0, r1) 19:35:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 814.558044][ T9168] FAULT_INJECTION: forcing a failure. [ 814.558044][ T9168] name failslab, interval 1, probability 0, space 0, times 0 [ 814.571272][ T9168] CPU: 0 PID: 9168 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 814.579175][ T9168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 814.589225][ T9168] Call Trace: [ 814.592519][ T9168] dump_stack+0x172/0x1f0 [ 814.596888][ T9168] should_fail.cold+0xa/0x15 [ 814.601490][ T9168] ? fault_create_debugfs_attr+0x180/0x180 [ 814.607302][ T9168] ? page_to_nid.part.0+0x20/0x20 [ 814.612338][ T9168] ? ___might_sleep+0x163/0x280 [ 814.617192][ T9168] __should_failslab+0x121/0x190 [ 814.622122][ T9168] should_failslab+0x9/0x14 [ 814.626606][ T9168] kmem_cache_alloc+0x2aa/0x710 [ 814.631438][ T9168] ? __mutex_lock+0x45d/0x13c0 [ 814.636191][ T9168] __kernfs_new_node+0xf0/0x6c0 [ 814.641015][ T9168] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 814.646447][ T9168] ? wait_for_completion+0x440/0x440 [ 814.651709][ T9168] ? __kasan_check_write+0x14/0x20 [ 814.656823][ T9168] ? mutex_unlock+0xd/0x10 [ 814.661215][ T9168] ? kernfs_activate+0x192/0x1f0 [ 814.666127][ T9168] kernfs_new_node+0x96/0x120 [ 814.670794][ T9168] __kernfs_create_file+0x51/0x33b [ 814.675927][ T9168] sysfs_add_file_mode_ns+0x222/0x560 [ 814.681275][ T9168] internal_create_group+0x359/0xc30 [ 814.686543][ T9168] ? bd_set_size+0x3f/0xb0 [ 814.690953][ T9168] ? remove_files.isra.0+0x190/0x190 [ 814.696213][ T9168] ? __down_timeout+0x2d0/0x2d0 [ 814.701043][ T9168] ? __kasan_check_write+0x14/0x20 [ 814.706655][ T9168] ? up_write+0x9d/0x280 [ 814.710881][ T9168] sysfs_create_group+0x20/0x30 [ 814.715712][ T9168] loop_set_fd+0xac1/0x1020 [ 814.720189][ T9168] lo_ioctl+0x1a3/0x1460 [ 814.724409][ T9168] ? trace_hardirqs_on+0x67/0x240 [ 814.729408][ T9168] ? loop_set_fd+0x1020/0x1020 [ 814.734150][ T9168] blkdev_ioctl+0xedb/0x1c1a [ 814.738713][ T9168] ? blkpg_ioctl+0xa90/0xa90 [ 814.743279][ T9168] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 814.749066][ T9168] ? __kasan_check_read+0x11/0x20 [ 814.754067][ T9168] ? __kasan_check_read+0x11/0x20 [ 814.759067][ T9168] block_ioctl+0xee/0x130 [ 814.763369][ T9168] ? blkdev_fallocate+0x410/0x410 [ 814.768370][ T9168] do_vfs_ioctl+0xdb6/0x13e0 [ 814.772935][ T9168] ? ioctl_preallocate+0x210/0x210 [ 814.778018][ T9168] ? __fget+0x384/0x560 [ 814.782152][ T9168] ? ksys_dup3+0x3e0/0x3e0 [ 814.786544][ T9168] ? do_sys_open+0x31d/0x5d0 [ 814.791124][ T9168] ? tomoyo_file_ioctl+0x23/0x30 [ 814.796040][ T9168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 814.802255][ T9168] ? security_file_ioctl+0x8d/0xc0 [ 814.807349][ T9168] ksys_ioctl+0xab/0xd0 [ 814.811484][ T9168] __x64_sys_ioctl+0x73/0xb0 [ 814.816055][ T9168] do_syscall_64+0xfd/0x6a0 [ 814.820541][ T9168] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 814.826410][ T9168] RIP: 0033:0x4596e7 [ 814.830280][ T9168] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 814.849860][ T9168] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 814.858244][ T9168] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 814.866193][ T9168] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 814.874136][ T9168] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 814.882080][ T9168] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 814.890027][ T9168] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:35:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x5) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1eeee977, 0x50100) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000040)={&(0x7f0000c09000/0x2000)=nil, 0x2000}) mbind(&(0x7f0000489000/0x1000)=nil, 0x1000, 0x2, 0x0, 0x0, 0x0) 19:35:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) r3 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:35:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000080)={0x8, 0x3f, 0x1}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) pidfd_send_signal(r2, 0x0, 0x0, 0x0) 19:35:59 executing program 3 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = fcntl$dupfd(r0, 0x406, r0) bind$netrom(r1, &(0x7f0000000000)={{0x3, @default, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}, 0x48) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = dup(r0) setsockopt$inet_int(r3, 0x0, 0x2, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:35:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:59 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) connect$l2tp(r1, &(0x7f0000000400)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x4, 0x3, 0x1, 0x3, {0xa, 0x4e20, 0x1, @mcast1, 0x10000000000}}}, 0x3a) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000141400ac1423bb0703907800"/54], 0x0) r2 = accept$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) uselib(&(0x7f0000000300)='./file0/file0\x00') ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000180)=0x42) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000380), &(0x7f00000003c0)=0xc) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000340)=0x4) 19:35:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:35:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000004c0)={@ipv4={[], [], @broadcast}, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@setlink={0x48, 0x13, 0x402, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r1, 0x10, 0x40000}, [@IFLA_PROMISCUITY={0x8, 0x1e, 0x4}, @IFLA_PHYS_PORT_ID={0x20, 0x22, "0ec695f9d91a1418a969a231cd496b593e5becbd3fcdf183db91"}]}, 0x40c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) [ 816.944667][ T9300] FAULT_INJECTION: forcing a failure. [ 816.944667][ T9300] name failslab, interval 1, probability 0, space 0, times 0 [ 816.995546][ T9304] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 817.016667][ T9300] CPU: 0 PID: 9300 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 817.024590][ T9300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 817.034647][ T9300] Call Trace: [ 817.037945][ T9300] dump_stack+0x172/0x1f0 [ 817.042281][ T9300] should_fail.cold+0xa/0x15 [ 817.046873][ T9300] ? fault_create_debugfs_attr+0x180/0x180 [ 817.052682][ T9300] ? page_to_nid.part.0+0x20/0x20 [ 817.057708][ T9300] ? ___might_sleep+0x163/0x280 [ 817.062559][ T9300] __should_failslab+0x121/0x190 [ 817.067489][ T9300] should_failslab+0x9/0x14 [ 817.071981][ T9300] kmem_cache_alloc+0x2aa/0x710 [ 817.076833][ T9300] ? __mutex_lock+0x45d/0x13c0 [ 817.081606][ T9300] __kernfs_new_node+0xf0/0x6c0 [ 817.086464][ T9300] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 817.091925][ T9300] ? wait_for_completion+0x440/0x440 [ 817.097214][ T9300] ? __kasan_check_write+0x14/0x20 [ 817.102327][ T9300] ? mutex_unlock+0xd/0x10 [ 817.106756][ T9300] ? kernfs_activate+0x192/0x1f0 [ 817.111691][ T9300] kernfs_new_node+0x96/0x120 [ 817.116376][ T9300] __kernfs_create_file+0x51/0x33b [ 817.121483][ T9300] sysfs_add_file_mode_ns+0x222/0x560 [ 817.126855][ T9300] internal_create_group+0x359/0xc30 [ 817.132136][ T9300] ? bd_set_size+0x3f/0xb0 [ 817.136584][ T9300] ? remove_files.isra.0+0x190/0x190 [ 817.141869][ T9300] ? __down_timeout+0x2d0/0x2d0 [ 817.146715][ T9300] ? __kasan_check_write+0x14/0x20 [ 817.151822][ T9300] ? up_write+0x9d/0x280 [ 817.156065][ T9300] sysfs_create_group+0x20/0x30 [ 817.160914][ T9300] loop_set_fd+0xac1/0x1020 [ 817.165420][ T9300] lo_ioctl+0x1a3/0x1460 [ 817.169657][ T9300] ? trace_hardirqs_on+0x67/0x240 [ 817.174678][ T9300] ? loop_set_fd+0x1020/0x1020 [ 817.179489][ T9300] blkdev_ioctl+0xedb/0x1c1a [ 817.184077][ T9300] ? blkpg_ioctl+0xa90/0xa90 [ 817.188667][ T9300] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 817.194470][ T9300] ? __kasan_check_read+0x11/0x20 [ 817.199501][ T9300] ? __kasan_check_read+0x11/0x20 [ 817.204532][ T9300] block_ioctl+0xee/0x130 [ 817.208857][ T9300] ? blkdev_fallocate+0x410/0x410 [ 817.213896][ T9300] do_vfs_ioctl+0xdb6/0x13e0 [ 817.218486][ T9300] ? ioctl_preallocate+0x210/0x210 [ 817.223586][ T9300] ? __fget+0x384/0x560 [ 817.227737][ T9300] ? ksys_dup3+0x3e0/0x3e0 [ 817.232152][ T9300] ? do_sys_open+0x31d/0x5d0 [ 817.236739][ T9300] ? tomoyo_file_ioctl+0x23/0x30 [ 817.241674][ T9300] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 817.247905][ T9300] ? security_file_ioctl+0x8d/0xc0 [ 817.253015][ T9300] ksys_ioctl+0xab/0xd0 [ 817.257166][ T9300] __x64_sys_ioctl+0x73/0xb0 [ 817.261750][ T9300] do_syscall_64+0xfd/0x6a0 [ 817.266255][ T9300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 817.272140][ T9300] RIP: 0033:0x4596e7 [ 817.276032][ T9300] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:36:00 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'erspan0\x00', 0x3}, 0x18) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="2e0000001d008183ad5de087185082cf0124b0eba0070060002339a00576f9835b3f10009148700000f85ac47c45", 0x2e}], 0x1}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 19:36:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 817.295633][ T9300] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 817.304047][ T9300] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 817.312046][ T9300] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 817.320016][ T9300] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 817.327986][ T9300] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 817.335955][ T9300] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:00 executing program 3 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 817.578197][ T9633] FAULT_INJECTION: forcing a failure. [ 817.578197][ T9633] name failslab, interval 1, probability 0, space 0, times 0 [ 817.608128][ T9633] CPU: 0 PID: 9633 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 817.616049][ T9633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 817.626101][ T9633] Call Trace: [ 817.629400][ T9633] dump_stack+0x172/0x1f0 [ 817.633741][ T9633] should_fail.cold+0xa/0x15 [ 817.638370][ T9633] ? fault_create_debugfs_attr+0x180/0x180 [ 817.644176][ T9633] ? page_to_nid.part.0+0x20/0x20 [ 817.649198][ T9633] ? ___might_sleep+0x163/0x280 [ 817.654046][ T9633] __should_failslab+0x121/0x190 [ 817.658983][ T9633] should_failslab+0x9/0x14 [ 817.663485][ T9633] kmem_cache_alloc+0x2aa/0x710 [ 817.668334][ T9633] ? __mutex_lock+0x45d/0x13c0 [ 817.673106][ T9633] __kernfs_new_node+0xf0/0x6c0 [ 817.677955][ T9633] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 817.683409][ T9633] ? wait_for_completion+0x440/0x440 [ 817.688691][ T9633] ? __kasan_check_write+0x14/0x20 [ 817.693800][ T9633] ? mutex_unlock+0xd/0x10 [ 817.698205][ T9633] ? kernfs_activate+0x192/0x1f0 [ 817.703140][ T9633] kernfs_new_node+0x96/0x120 [ 817.707899][ T9633] __kernfs_create_file+0x51/0x33b [ 817.713008][ T9633] sysfs_add_file_mode_ns+0x222/0x560 [ 817.718381][ T9633] internal_create_group+0x359/0xc30 [ 817.723760][ T9633] ? bd_set_size+0x3f/0xb0 [ 817.728176][ T9633] ? remove_files.isra.0+0x190/0x190 [ 817.733452][ T9633] ? __down_timeout+0x2d0/0x2d0 [ 817.738306][ T9633] ? __kasan_check_write+0x14/0x20 [ 817.743410][ T9633] ? up_write+0x9d/0x280 [ 817.747648][ T9633] sysfs_create_group+0x20/0x30 [ 817.752493][ T9633] loop_set_fd+0xac1/0x1020 [ 817.756996][ T9633] lo_ioctl+0x1a3/0x1460 [ 817.761231][ T9633] ? trace_hardirqs_on+0x67/0x240 [ 817.766251][ T9633] ? loop_set_fd+0x1020/0x1020 [ 817.771012][ T9633] blkdev_ioctl+0xedb/0x1c1a [ 817.775606][ T9633] ? blkpg_ioctl+0xa90/0xa90 [ 817.780202][ T9633] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 817.786174][ T9633] ? __kasan_check_read+0x11/0x20 [ 817.791179][ T9633] ? __kasan_check_read+0x11/0x20 [ 817.796185][ T9633] block_ioctl+0xee/0x130 [ 817.800493][ T9633] ? blkdev_fallocate+0x410/0x410 [ 817.805501][ T9633] do_vfs_ioctl+0xdb6/0x13e0 [ 817.810082][ T9633] ? ioctl_preallocate+0x210/0x210 [ 817.815257][ T9633] ? __fget+0x384/0x560 [ 817.819405][ T9633] ? ksys_dup3+0x3e0/0x3e0 [ 817.823809][ T9633] ? do_sys_open+0x31d/0x5d0 [ 817.828422][ T9633] ? tomoyo_file_ioctl+0x23/0x30 [ 817.833700][ T9633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 817.839925][ T9633] ? security_file_ioctl+0x8d/0xc0 [ 817.845037][ T9633] ksys_ioctl+0xab/0xd0 [ 817.849204][ T9633] __x64_sys_ioctl+0x73/0xb0 [ 817.853802][ T9633] do_syscall_64+0xfd/0x6a0 [ 817.858472][ T9633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 817.864342][ T9633] RIP: 0033:0x4596e7 [ 817.868216][ T9633] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 817.887803][ T9633] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 817.896220][ T9633] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 817.904187][ T9633] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 817.912142][ T9633] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 817.920089][ T9633] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 817.928048][ T9633] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 817.967589][ T9635] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 818.898777][T10647] device bridge_slave_1 left promiscuous mode [ 818.904986][T10647] Ûÿ: port 2(bridge_slave_1) entered disabled state [ 818.912383][T10647] device bridge_slave_0 left promiscuous mode [ 818.918581][T10647] Ûÿ: port 1(bridge_slave_0) entered disabled state [ 819.407208][T10647] device hsr_slave_0 left promiscuous mode [ 819.413189][T10647] device hsr_slave_1 left promiscuous mode [ 819.426184][T10647] device team_slave_1 left promiscuous mode [ 819.432790][T10647] team0 (unregistering): Port device team_slave_1 removed [ 819.442980][T10647] device team_slave_0 left promiscuous mode [ 819.449349][T10647] team0 (unregistering): Port device team_slave_0 removed [ 819.459604][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 819.491833][T10647] bond0 (unregistering): Released all slaves 19:36:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:03 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000000c000)='fs\x00', 0x0, &(0x7f0000000140)) 19:36:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000280)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xffad}}, {0x4000030000000304, @broadcast}, 0x0, {0x2, 0x0, @local}, 'veth1_to_bridge\x00'}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc]}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x2) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000200)={0x0, 0xf, 0x1ff, 0x3f, "bffb5a85cc8da67ff53f1106601011c7cae30a9719bc3360c33b12efb81934d4"}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x88, r3, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6b2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x20000041}, 0x4004000) r4 = syz_open_dev$swradio(0x0, 0x0, 0x2) ioctl$NBD_DISCONNECT(r4, 0xab08) sendmmsg(r0, 0x0, 0x6d, 0x10000) 19:36:03 executing program 3 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:03 executing program 5: syz_emit_ethernet(0x53, &(0x7f0000000180)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "2ff786", 0x1d, 0x0, 0x0, @remote, @remote, {[@fragment={0x6}], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"8c"}}}}}}}, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x7db4858da9731dd6) r1 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) dup2(r0, r1) r2 = mq_open(&(0x7f0000000000)='vmnet1vboxnet0\xb3nodev%self\x15wlan0vmnet0+!\x00', 0x80, 0x4, &(0x7f0000000040)={0x0, 0x8000, 0x3, 0x39ff, 0x8000, 0x7, 0x2, 0x8}) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r1, r2], 0x2) [ 820.471816][ T9644] FAULT_INJECTION: forcing a failure. [ 820.471816][ T9644] name failslab, interval 1, probability 0, space 0, times 0 [ 820.503801][ T9644] CPU: 1 PID: 9644 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 820.511729][ T9644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 820.521781][ T9644] Call Trace: [ 820.525087][ T9644] dump_stack+0x172/0x1f0 [ 820.529432][ T9644] should_fail.cold+0xa/0x15 [ 820.534040][ T9644] ? fault_create_debugfs_attr+0x180/0x180 [ 820.539851][ T9644] ? page_to_nid.part.0+0x20/0x20 [ 820.544879][ T9644] ? ___might_sleep+0x163/0x280 [ 820.549739][ T9644] __should_failslab+0x121/0x190 [ 820.554679][ T9644] should_failslab+0x9/0x14 [ 820.559182][ T9644] kmem_cache_alloc+0x2aa/0x710 [ 820.564039][ T9644] ? __mutex_lock+0x45d/0x13c0 [ 820.568809][ T9644] __kernfs_new_node+0xf0/0x6c0 [ 820.573664][ T9644] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 820.579118][ T9644] ? wait_for_completion+0x440/0x440 [ 820.584402][ T9644] ? __kasan_check_write+0x14/0x20 [ 820.589515][ T9644] ? mutex_unlock+0xd/0x10 [ 820.593929][ T9644] ? kernfs_activate+0x192/0x1f0 [ 820.598868][ T9644] kernfs_new_node+0x96/0x120 [ 820.603553][ T9644] __kernfs_create_file+0x51/0x33b [ 820.608678][ T9644] sysfs_add_file_mode_ns+0x222/0x560 [ 820.614062][ T9644] internal_create_group+0x359/0xc30 [ 820.619434][ T9644] ? bd_set_size+0x3f/0xb0 [ 820.623852][ T9644] ? remove_files.isra.0+0x190/0x190 [ 820.629158][ T9644] ? __down_timeout+0x2d0/0x2d0 [ 820.634010][ T9644] ? __kasan_check_write+0x14/0x20 [ 820.639120][ T9644] ? up_write+0x9d/0x280 [ 820.643356][ T9644] sysfs_create_group+0x20/0x30 [ 820.648206][ T9644] loop_set_fd+0xac1/0x1020 [ 820.652711][ T9644] lo_ioctl+0x1a3/0x1460 [ 820.656954][ T9644] ? trace_hardirqs_on+0x67/0x240 [ 820.661974][ T9644] ? loop_set_fd+0x1020/0x1020 [ 820.666735][ T9644] blkdev_ioctl+0xedb/0x1c1a [ 820.671328][ T9644] ? blkpg_ioctl+0xa90/0xa90 [ 820.675917][ T9644] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 820.681716][ T9644] ? __kasan_check_read+0x11/0x20 [ 820.686740][ T9644] ? __kasan_check_read+0x11/0x20 [ 820.691767][ T9644] block_ioctl+0xee/0x130 [ 820.696091][ T9644] ? blkdev_fallocate+0x410/0x410 [ 820.701109][ T9644] do_vfs_ioctl+0xdb6/0x13e0 [ 820.705697][ T9644] ? ioctl_preallocate+0x210/0x210 [ 820.710810][ T9644] ? __fget+0x384/0x560 [ 820.714965][ T9644] ? ksys_dup3+0x3e0/0x3e0 [ 820.719389][ T9644] ? do_sys_open+0x31d/0x5d0 [ 820.723978][ T9644] ? tomoyo_file_ioctl+0x23/0x30 [ 820.728917][ T9644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 820.735157][ T9644] ? security_file_ioctl+0x8d/0xc0 [ 820.740269][ T9644] ksys_ioctl+0xab/0xd0 [ 820.744427][ T9644] __x64_sys_ioctl+0x73/0xb0 [ 820.749022][ T9644] do_syscall_64+0xfd/0x6a0 [ 820.753533][ T9644] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 820.759427][ T9644] RIP: 0033:0x4596e7 [ 820.763313][ T9644] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 820.782911][ T9644] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 820.791325][ T9644] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 820.799298][ T9644] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 820.807268][ T9644] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 820.815242][ T9644] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 19:36:03 executing program 2: r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="3b5be66d6d261d057bf070") r2 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x3ff, 0x6) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000340)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x2, 0x3}}}, 0xa0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000008}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r3, 0x20, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x480d1}, 0x8080) write$evdev(r2, &(0x7f0000000180)=[{{0x0, 0x7530}, 0x2, 0x0, 0xb02f}], 0x11e8) 19:36:03 executing program 5: syz_open_dev$vcsn(&(0x7f0000000540)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0x8f) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000440)={0x2, 0x0, [], {0x0, @reserved}}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 19:36:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 820.823215][ T9644] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:03 executing program 3 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:03 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x64}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x800039c, 0x0) [ 821.129132][ T9782] FAULT_INJECTION: forcing a failure. [ 821.129132][ T9782] name failslab, interval 1, probability 0, space 0, times 0 [ 821.166638][ T9782] CPU: 1 PID: 9782 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 821.174565][ T9782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.184623][ T9782] Call Trace: [ 821.187922][ T9782] dump_stack+0x172/0x1f0 [ 821.192248][ T9782] should_fail.cold+0xa/0x15 [ 821.196838][ T9782] ? fault_create_debugfs_attr+0x180/0x180 [ 821.202649][ T9782] ? page_to_nid.part.0+0x20/0x20 [ 821.207675][ T9782] ? ___might_sleep+0x163/0x280 [ 821.212522][ T9782] __should_failslab+0x121/0x190 [ 821.217455][ T9782] should_failslab+0x9/0x14 [ 821.221960][ T9782] kmem_cache_alloc+0x2aa/0x710 [ 821.226807][ T9782] ? __mutex_lock+0x45d/0x13c0 [ 821.231663][ T9782] __kernfs_new_node+0xf0/0x6c0 [ 821.236521][ T9782] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 821.242066][ T9782] ? wait_for_completion+0x440/0x440 [ 821.247347][ T9782] ? __kasan_check_write+0x14/0x20 [ 821.252457][ T9782] ? mutex_unlock+0xd/0x10 [ 821.256871][ T9782] ? kernfs_activate+0x192/0x1f0 [ 821.261805][ T9782] kernfs_new_node+0x96/0x120 [ 821.266486][ T9782] __kernfs_create_file+0x51/0x33b [ 821.271604][ T9782] sysfs_add_file_mode_ns+0x222/0x560 [ 821.276976][ T9782] internal_create_group+0x359/0xc30 [ 821.282257][ T9782] ? bd_set_size+0x3f/0xb0 [ 821.286672][ T9782] ? remove_files.isra.0+0x190/0x190 [ 821.291953][ T9782] ? __down_timeout+0x2d0/0x2d0 [ 821.296804][ T9782] ? __kasan_check_write+0x14/0x20 [ 821.301909][ T9782] ? up_write+0x9d/0x280 [ 821.306152][ T9782] sysfs_create_group+0x20/0x30 [ 821.311006][ T9782] loop_set_fd+0xac1/0x1020 [ 821.315517][ T9782] lo_ioctl+0x1a3/0x1460 [ 821.319761][ T9782] ? trace_hardirqs_on+0x67/0x240 [ 821.324783][ T9782] ? loop_set_fd+0x1020/0x1020 [ 821.329548][ T9782] blkdev_ioctl+0xedb/0x1c1a [ 821.334144][ T9782] ? blkpg_ioctl+0xa90/0xa90 [ 821.338743][ T9782] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 821.344563][ T9782] ? __kasan_check_read+0x11/0x20 [ 821.349591][ T9782] ? __kasan_check_read+0x11/0x20 [ 821.354613][ T9782] block_ioctl+0xee/0x130 [ 821.358948][ T9782] ? blkdev_fallocate+0x410/0x410 [ 821.363968][ T9782] do_vfs_ioctl+0xdb6/0x13e0 [ 821.368561][ T9782] ? ioctl_preallocate+0x210/0x210 [ 821.373666][ T9782] ? __fget+0x384/0x560 [ 821.377821][ T9782] ? ksys_dup3+0x3e0/0x3e0 [ 821.382968][ T9782] ? do_sys_open+0x31d/0x5d0 [ 821.387557][ T9782] ? tomoyo_file_ioctl+0x23/0x30 [ 821.392501][ T9782] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 821.398739][ T9782] ? security_file_ioctl+0x8d/0xc0 [ 821.403846][ T9782] ksys_ioctl+0xab/0xd0 [ 821.408000][ T9782] __x64_sys_ioctl+0x73/0xb0 [ 821.412592][ T9782] do_syscall_64+0xfd/0x6a0 [ 821.417099][ T9782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.422982][ T9782] RIP: 0033:0x4596e7 [ 821.426879][ T9782] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 821.446484][ T9782] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 821.454895][ T9782] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 821.462862][ T9782] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 821.470837][ T9782] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 19:36:04 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:04 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0xfffffffffffffcf1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x3cf}], 0x1}, 0x0) 19:36:04 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount(&(0x7f0000000000)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='cgroup\x00', 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x4000, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x80000001, 0x3, 0x9, 0x4997}, {0x81, 0x541e, 0x140, 0x81}]}, 0x10) [ 821.478797][ T9782] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 821.486744][ T9782] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 822.532915][T10038] IPVS: ftp: loaded support on port[0] = 21 [ 822.598533][T10038] chnl_net:caif_netlink_parms(): no params data found [ 822.623689][T10038] bridge0: port 1(bridge_slave_0) entered blocking state [ 822.630842][T10038] bridge0: port 1(bridge_slave_0) entered disabled state [ 822.638550][T10038] device bridge_slave_0 entered promiscuous mode [ 822.645925][T10038] bridge0: port 2(bridge_slave_1) entered blocking state [ 822.653069][T10038] bridge0: port 2(bridge_slave_1) entered disabled state [ 822.660729][T10038] device bridge_slave_1 entered promiscuous mode [ 822.676407][T10038] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 822.686801][T10038] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 822.704411][T10038] team0: Port device team_slave_0 added [ 822.711205][T10038] team0: Port device team_slave_1 added [ 822.726959][T10038] device hsr_slave_0 entered promiscuous mode [ 822.733521][T10038] device hsr_slave_1 entered promiscuous mode [ 822.739776][T10038] debugfs: Directory 'hsr0' with parent '/' already present! [ 822.755127][T10038] bridge0: port 2(bridge_slave_1) entered blocking state [ 822.762210][T10038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 822.769570][T10038] bridge0: port 1(bridge_slave_0) entered blocking state [ 822.776631][T10038] bridge0: port 1(bridge_slave_0) entered forwarding state [ 822.804998][T10038] 8021q: adding VLAN 0 to HW filter on device bond0 [ 822.816741][T14952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 822.824977][T14952] bridge0: port 1(bridge_slave_0) entered disabled state [ 822.832871][T14952] bridge0: port 2(bridge_slave_1) entered disabled state [ 822.841116][T14952] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 822.852121][T10038] 8021q: adding VLAN 0 to HW filter on device team0 [ 822.862515][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 822.871129][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 822.878166][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 822.893918][ T2868] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 822.902392][ T2868] bridge0: port 2(bridge_slave_1) entered blocking state [ 822.909427][ T2868] bridge0: port 2(bridge_slave_1) entered forwarding state [ 822.926954][T10038] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 822.937565][T10038] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 822.949462][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 822.958424][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 822.967049][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 822.975354][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 822.990657][T10038] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 822.998479][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 823.006644][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 823.086973][T10046] input: syz1 as /devices/virtual/input/input45 19:36:06 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') 19:36:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:06 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000a40)={'veth0_to_be\x00', 0x1}) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_int(r0, &(0x7f0000000140)='io.weight\x00', 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) close(r2) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) sendmsg(r3, &(0x7f00000004c0)={&(0x7f0000000400)=@vsock={0x28, 0x0, 0x2710}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r4 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) write$cgroup_pid(r5, &(0x7f0000000340), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) gettid() openat$cgroup_ro(r4, &(0x7f00000005c0)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r6, &(0x7f0000000080), 0x297ef) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) 19:36:06 executing program 2: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100032b2c25e994efd18498d66205baa68754a30600000002000600000000000000000000002100000000000000", 0x30}], 0x1}, 0x0) 19:36:06 executing program 3 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, 0x8) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 823.144096][T10048] input: syz1 as /devices/virtual/input/input46 [ 823.234185][T10058] FAULT_INJECTION: forcing a failure. [ 823.234185][T10058] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 823.247417][T10058] CPU: 0 PID: 10058 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 823.255389][T10058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.265795][T10058] Call Trace: [ 823.269094][T10058] dump_stack+0x172/0x1f0 [ 823.273429][T10058] should_fail.cold+0xa/0x15 [ 823.278020][T10058] ? rwlock_bug.part.0+0x90/0x90 [ 823.282971][T10058] ? fault_create_debugfs_attr+0x180/0x180 [ 823.288956][T10058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.295200][T10058] ? debug_smp_processor_id+0x3c/0x214 [ 823.300657][T10058] should_fail_alloc_page+0x50/0x60 [ 823.305845][T10058] __alloc_pages_nodemask+0x1a1/0x900 [ 823.311214][T10058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.317451][T10058] ? __alloc_pages_slowpath+0x2520/0x2520 [ 823.323174][T10058] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 823.328809][T10058] ? __kasan_check_read+0x11/0x20 [ 823.333844][T10058] ? fault_create_debugfs_attr+0x180/0x180 [ 823.339648][T10058] cache_grow_begin+0x90/0xd20 [ 823.344455][T10058] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 823.350696][T10058] kmem_cache_alloc_trace+0x6b3/0x790 [ 823.356078][T10058] kobject_uevent_env+0x387/0x101d [ 823.361197][T10058] ? __kasan_check_write+0x14/0x20 [ 823.366309][T10058] ? up_write+0x9d/0x280 [ 823.370556][T10058] kobject_uevent+0x20/0x26 [ 823.375060][T10058] loop_set_fd+0xb52/0x1020 [ 823.381063][T10058] lo_ioctl+0x1a3/0x1460 [ 823.385315][T10058] ? trace_hardirqs_on+0x67/0x240 [ 823.390345][T10058] ? loop_set_fd+0x1020/0x1020 [ 823.395110][T10058] blkdev_ioctl+0xedb/0x1c1a [ 823.399705][T10058] ? blkpg_ioctl+0xa90/0xa90 [ 823.404301][T10058] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 823.410102][T10058] ? __kasan_check_read+0x11/0x20 [ 823.415124][T10058] ? __kasan_check_read+0x11/0x20 [ 823.420146][T10058] block_ioctl+0xee/0x130 [ 823.424472][T10058] ? blkdev_fallocate+0x410/0x410 [ 823.429500][T10058] do_vfs_ioctl+0xdb6/0x13e0 [ 823.434094][T10058] ? ioctl_preallocate+0x210/0x210 [ 823.439466][T10058] ? __fget+0x384/0x560 [ 823.443623][T10058] ? ksys_dup3+0x3e0/0x3e0 [ 823.448036][T10058] ? do_sys_open+0x31d/0x5d0 [ 823.452628][T10058] ? tomoyo_file_ioctl+0x23/0x30 [ 823.457572][T10058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.463820][T10058] ? security_file_ioctl+0x8d/0xc0 [ 823.468927][T10058] ksys_ioctl+0xab/0xd0 [ 823.473072][T10058] __x64_sys_ioctl+0x73/0xb0 [ 823.477665][T10058] do_syscall_64+0xfd/0x6a0 [ 823.482172][T10058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 823.488056][T10058] RIP: 0033:0x4596e7 [ 823.491956][T10058] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 823.511561][T10058] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 823.520065][T10058] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 19:36:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x2, 0x8, 0x6, 0x7f, 0x5, 0xba04, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x7, 0x9, 0xfffffffffffffff7, 0x7fff, 0x3}}, &(0x7f0000000000)=0xb0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xb000) write$cgroup_pid(r1, &(0x7f0000000000), 0xcbaa60f5) [ 823.528038][T10058] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 823.536008][T10058] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 823.543976][T10058] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 823.552818][T10058] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:06 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000001, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0xa, 0x2, 0x11) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f00000098c0)={&(0x7f0000009800)=@can, 0x80, 0x0}, 0x20) 19:36:06 executing program 3 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 823.882304][T10295] FAULT_INJECTION: forcing a failure. [ 823.882304][T10295] name failslab, interval 1, probability 0, space 0, times 0 [ 823.895784][T10295] CPU: 1 PID: 10295 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 823.903780][T10295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.913831][T10295] Call Trace: [ 823.917104][T10295] dump_stack+0x172/0x1f0 [ 823.921419][T10295] should_fail.cold+0xa/0x15 [ 823.925999][T10295] ? fault_create_debugfs_attr+0x180/0x180 [ 823.931784][T10295] ? page_to_nid.part.0+0x20/0x20 [ 823.936786][T10295] ? ___might_sleep+0x163/0x280 [ 823.941622][T10295] __should_failslab+0x121/0x190 [ 823.946534][T10295] should_failslab+0x9/0x14 [ 823.951024][T10295] __kmalloc+0x2e0/0x770 [ 823.955294][T10295] ? kasan_kmalloc+0x9/0x10 [ 823.959776][T10295] ? kobject_get_path+0xc4/0x1b0 [ 823.964687][T10295] kobject_get_path+0xc4/0x1b0 [ 823.969446][T10295] kobject_uevent_env+0x3ab/0x101d [ 823.974539][T10295] ? __kasan_check_write+0x14/0x20 [ 823.979637][T10295] ? up_write+0x9d/0x280 [ 823.983869][T10295] kobject_uevent+0x20/0x26 [ 823.988352][T10295] loop_set_fd+0xb52/0x1020 [ 823.992835][T10295] lo_ioctl+0x1a3/0x1460 [ 823.997057][T10295] ? trace_hardirqs_on+0x67/0x240 [ 824.002061][T10295] ? loop_set_fd+0x1020/0x1020 [ 824.006802][T10295] blkdev_ioctl+0xedb/0x1c1a [ 824.011544][T10295] ? blkpg_ioctl+0xa90/0xa90 [ 824.016109][T10295] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 824.021892][T10295] ? __kasan_check_read+0x11/0x20 [ 824.026904][T10295] ? __kasan_check_read+0x11/0x20 [ 824.031926][T10295] block_ioctl+0xee/0x130 [ 824.036251][T10295] ? blkdev_fallocate+0x410/0x410 [ 824.041260][T10295] do_vfs_ioctl+0xdb6/0x13e0 [ 824.045826][T10295] ? ioctl_preallocate+0x210/0x210 [ 824.050917][T10295] ? __fget+0x384/0x560 [ 824.055048][T10295] ? ksys_dup3+0x3e0/0x3e0 [ 824.059442][T10295] ? do_sys_open+0x31d/0x5d0 [ 824.064012][T10295] ? tomoyo_file_ioctl+0x23/0x30 [ 824.068948][T10295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 824.075166][T10295] ? security_file_ioctl+0x8d/0xc0 [ 824.080256][T10295] ksys_ioctl+0xab/0xd0 [ 824.084389][T10295] __x64_sys_ioctl+0x73/0xb0 [ 824.088971][T10295] do_syscall_64+0xfd/0x6a0 [ 824.093454][T10295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 824.099320][T10295] RIP: 0033:0x4596e7 [ 824.103191][T10295] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 824.122771][T10295] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 19:36:07 executing program 2: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xfffffdff) 19:36:07 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='rdma.current\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x2}, 0x0) 19:36:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 824.131167][T10295] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 824.139114][T10295] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 824.147078][T10295] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 824.155029][T10295] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 824.162977][T10295] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 824.191140][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 824.196970][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:36:07 executing program 3 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team_slave_1\x00', 0x0}) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000040)={@dev, @rand_addr, r1}, 0xc) [ 824.281762][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 824.287605][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:36:07 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') poll(&(0x7f0000000000)=[{r0}], 0x1, 0x6) [ 824.375003][T10416] FAULT_INJECTION: forcing a failure. [ 824.375003][T10416] name failslab, interval 1, probability 0, space 0, times 0 [ 824.390970][T10416] CPU: 0 PID: 10416 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 824.398977][T10416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 824.409033][T10416] Call Trace: [ 824.412323][T10416] dump_stack+0x172/0x1f0 [ 824.416656][T10416] should_fail.cold+0xa/0x15 [ 824.421254][T10416] ? fault_create_debugfs_attr+0x180/0x180 [ 824.427070][T10416] ? page_to_nid.part.0+0x20/0x20 [ 824.432101][T10416] ? ___might_sleep+0x163/0x280 [ 824.437055][T10416] __should_failslab+0x121/0x190 [ 824.441992][T10416] should_failslab+0x9/0x14 [ 824.446496][T10416] kmem_cache_alloc_node_trace+0x274/0x750 [ 824.452301][T10416] ? kasan_unpoison_shadow+0x35/0x50 [ 824.457585][T10416] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 824.463387][T10416] __kmalloc_node_track_caller+0x3d/0x70 [ 824.469073][T10416] __kmalloc_reserve.isra.0+0x40/0xf0 [ 824.474425][T10416] __alloc_skb+0x10b/0x5e0 [ 824.478817][T10416] ? netdev_alloc_frag+0x1b0/0x1b0 [ 824.483964][T10416] ? netlink_has_listeners+0x6e/0x3f0 [ 824.489320][T10416] alloc_uevent_skb+0x83/0x1e2 [ 824.494067][T10416] kobject_uevent_env+0xaa3/0x101d [ 824.499194][T10416] kobject_uevent+0x20/0x26 [ 824.503675][T10416] loop_set_fd+0xb52/0x1020 [ 824.508156][T10416] lo_ioctl+0x1a3/0x1460 [ 824.512394][T10416] ? trace_hardirqs_on+0x67/0x240 [ 824.517395][T10416] ? loop_set_fd+0x1020/0x1020 [ 824.522135][T10416] blkdev_ioctl+0xedb/0x1c1a [ 824.526713][T10416] ? blkpg_ioctl+0xa90/0xa90 [ 824.531295][T10416] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 824.537077][T10416] ? __kasan_check_read+0x11/0x20 [ 824.542079][T10416] ? __kasan_check_read+0x11/0x20 [ 824.547086][T10416] block_ioctl+0xee/0x130 [ 824.551396][T10416] ? blkdev_fallocate+0x410/0x410 [ 824.556397][T10416] do_vfs_ioctl+0xdb6/0x13e0 [ 824.560961][T10416] ? ioctl_preallocate+0x210/0x210 [ 824.566051][T10416] ? __fget+0x384/0x560 [ 824.570186][T10416] ? ksys_dup3+0x3e0/0x3e0 [ 824.574581][T10416] ? do_sys_open+0x31d/0x5d0 [ 824.579164][T10416] ? tomoyo_file_ioctl+0x23/0x30 [ 824.584081][T10416] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 824.590311][T10416] ? security_file_ioctl+0x8d/0xc0 [ 824.595407][T10416] ksys_ioctl+0xab/0xd0 [ 824.599538][T10416] __x64_sys_ioctl+0x73/0xb0 [ 824.604125][T10416] do_syscall_64+0xfd/0x6a0 [ 824.608606][T10416] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 824.614490][T10416] RIP: 0033:0x4596e7 [ 824.618365][T10416] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 824.637943][T10416] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 824.646332][T10416] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 824.654281][T10416] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 824.662225][T10416] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 824.670171][T10416] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 824.678120][T10416] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000200)=0x5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 19:36:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x1f, 0x4) 19:36:09 executing program 5: r0 = socket$inet6(0xa, 0x80000000000003, 0x3) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000140)={'bridge0\x00\x00z\x00\x00\xc1\x05\x8e9', &(0x7f0000000000)=ANY=[@ANYBLOB='\n']}) 19:36:09 executing program 3 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x160, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 826.732265][T10536] FAULT_INJECTION: forcing a failure. [ 826.732265][T10536] name failslab, interval 1, probability 0, space 0, times 0 [ 826.755787][T10536] CPU: 1 PID: 10536 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 826.763805][T10536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.773954][T10536] Call Trace: [ 826.777232][T10536] dump_stack+0x172/0x1f0 [ 826.781543][T10536] should_fail.cold+0xa/0x15 [ 826.786115][T10536] ? fault_create_debugfs_attr+0x180/0x180 [ 826.791904][T10536] ? page_to_nid.part.0+0x20/0x20 [ 826.796903][T10536] ? ___might_sleep+0x163/0x280 [ 826.801734][T10536] __should_failslab+0x121/0x190 [ 826.806648][T10536] should_failslab+0x9/0x14 [ 826.811127][T10536] kmem_cache_alloc_node_trace+0x274/0x750 [ 826.816908][T10536] ? kasan_unpoison_shadow+0x35/0x50 [ 826.822171][T10536] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 826.827954][T10536] __kmalloc_node_track_caller+0x3d/0x70 [ 826.833568][T10536] __kmalloc_reserve.isra.0+0x40/0xf0 [ 826.838916][T10536] __alloc_skb+0x10b/0x5e0 [ 826.843308][T10536] ? netdev_alloc_frag+0x1b0/0x1b0 [ 826.848403][T10536] ? netlink_has_listeners+0x6e/0x3f0 [ 826.853767][T10536] alloc_uevent_skb+0x83/0x1e2 [ 826.858512][T10536] kobject_uevent_env+0xaa3/0x101d [ 826.863601][T10536] kobject_uevent+0x20/0x26 [ 826.868080][T10536] loop_set_fd+0xb52/0x1020 [ 826.872561][T10536] lo_ioctl+0x1a3/0x1460 [ 826.876782][T10536] ? trace_hardirqs_on+0x67/0x240 [ 826.881811][T10536] ? loop_set_fd+0x1020/0x1020 [ 826.886575][T10536] blkdev_ioctl+0xedb/0x1c1a [ 826.891160][T10536] ? blkpg_ioctl+0xa90/0xa90 [ 826.895731][T10536] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 826.901513][T10536] ? __kasan_check_read+0x11/0x20 [ 826.906514][T10536] ? __kasan_check_read+0x11/0x20 [ 826.911517][T10536] block_ioctl+0xee/0x130 [ 826.915823][T10536] ? blkdev_fallocate+0x410/0x410 [ 826.920824][T10536] do_vfs_ioctl+0xdb6/0x13e0 [ 826.925394][T10536] ? ioctl_preallocate+0x210/0x210 [ 826.930500][T10536] ? __fget+0x384/0x560 [ 826.934629][T10536] ? ksys_dup3+0x3e0/0x3e0 [ 826.939022][T10536] ? do_sys_open+0x31d/0x5d0 [ 826.943593][T10536] ? tomoyo_file_ioctl+0x23/0x30 [ 826.948596][T10536] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 826.954829][T10536] ? security_file_ioctl+0x8d/0xc0 [ 826.959926][T10536] ksys_ioctl+0xab/0xd0 [ 826.964057][T10536] __x64_sys_ioctl+0x73/0xb0 [ 826.968628][T10536] do_syscall_64+0xfd/0x6a0 [ 826.973125][T10536] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.979017][T10536] RIP: 0033:0x4596e7 [ 826.982916][T10536] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 827.002498][T10536] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 827.010887][T10536] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 827.018852][T10536] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 19:36:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000040)=""/181) 19:36:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 827.026804][T10536] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 827.034749][T10536] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 827.042695][T10536] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:10 executing program 3 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:10 executing program 2: r0 = userfaultfd(0x0) r1 = epoll_create1(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) epoll_pwait(r1, &(0x7f0000000300)=[{}], 0x1, 0x0, 0x0, 0x0) 19:36:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 827.281995][T10661] FAULT_INJECTION: forcing a failure. [ 827.281995][T10661] name failslab, interval 1, probability 0, space 0, times 0 [ 827.306391][T10661] CPU: 1 PID: 10661 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 827.314396][T10661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.324448][T10661] Call Trace: [ 827.327746][T10661] dump_stack+0x172/0x1f0 [ 827.332088][T10661] should_fail.cold+0xa/0x15 [ 827.336690][T10661] ? fault_create_debugfs_attr+0x180/0x180 [ 827.342505][T10661] ? page_to_nid.part.0+0x20/0x20 [ 827.347533][T10661] ? ___might_sleep+0x163/0x280 [ 827.352378][T10661] __should_failslab+0x121/0x190 [ 827.357300][T10661] should_failslab+0x9/0x14 [ 827.361789][T10661] kmem_cache_alloc+0x2aa/0x710 [ 827.366628][T10661] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 827.372426][T10661] ? netlink_broadcast_filtered+0x78/0xb80 [ 827.378240][T10661] ? __kmalloc_node_track_caller+0x4e/0x70 [ 827.385036][T10661] skb_clone+0x154/0x3d0 [ 827.389270][T10661] netlink_broadcast_filtered+0x8d7/0xb80 [ 827.394996][T10661] netlink_broadcast+0x3a/0x50 [ 827.399754][T10661] kobject_uevent_env+0xad4/0x101d [ 827.404865][T10661] kobject_uevent+0x20/0x26 [ 827.409353][T10661] loop_set_fd+0xb52/0x1020 [ 827.413838][T10661] lo_ioctl+0x1a3/0x1460 [ 827.418061][T10661] ? trace_hardirqs_on+0x67/0x240 [ 827.423069][T10661] ? loop_set_fd+0x1020/0x1020 [ 827.427815][T10661] blkdev_ioctl+0xedb/0x1c1a [ 827.432403][T10661] ? blkpg_ioctl+0xa90/0xa90 [ 827.436982][T10661] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 827.442765][T10661] ? __kasan_check_read+0x11/0x20 [ 827.447768][T10661] ? __kasan_check_read+0x11/0x20 [ 827.452773][T10661] block_ioctl+0xee/0x130 [ 827.457078][T10661] ? blkdev_fallocate+0x410/0x410 [ 827.462078][T10661] do_vfs_ioctl+0xdb6/0x13e0 [ 827.466653][T10661] ? ioctl_preallocate+0x210/0x210 [ 827.471747][T10661] ? __fget+0x384/0x560 [ 827.475880][T10661] ? ksys_dup3+0x3e0/0x3e0 [ 827.480273][T10661] ? do_sys_open+0x31d/0x5d0 [ 827.484840][T10661] ? tomoyo_file_ioctl+0x23/0x30 [ 827.489777][T10661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 827.496025][T10661] ? security_file_ioctl+0x8d/0xc0 [ 827.501128][T10661] ksys_ioctl+0xab/0xd0 [ 827.505262][T10661] __x64_sys_ioctl+0x73/0xb0 [ 827.509832][T10661] do_syscall_64+0xfd/0x6a0 [ 827.514316][T10661] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.520181][T10661] RIP: 0033:0x4596e7 [ 827.524144][T10661] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 827.543997][T10661] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 827.553580][T10661] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 827.561582][T10661] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 827.569533][T10661] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 827.577482][T10661] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 827.585439][T10661] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:12 executing program 1: r0 = fsopen(&(0x7f00000001c0)='proc\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) socket(0x0, 0x3, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2000, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, 0x0) getpid() fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) 19:36:12 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) 19:36:12 executing program 5: r0 = memfd_create(&(0x7f00000000c0)='\x14Ym1\xa9\xa22\x0fN\xcb\xa2\xba\xe5\xf4\x97\x00\x04\x00\x00', 0x0) write(r0, &(0x7f0000000180)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xfa, 0x0, &(0x7f0000000000)=0xfffffcf2) 19:36:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:12 executing program 3 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x5}, 0xb) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x76, &(0x7f0000000080)={r1}, 0x8) [ 830.142891][T10784] FAULT_INJECTION: forcing a failure. [ 830.142891][T10784] name failslab, interval 1, probability 0, space 0, times 0 [ 830.186731][T10784] CPU: 1 PID: 10784 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 830.194773][T10784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.204821][T10784] Call Trace: [ 830.204840][T10784] dump_stack+0x172/0x1f0 [ 830.204862][T10784] should_fail.cold+0xa/0x15 [ 830.212439][T10784] ? __kasan_check_read+0x11/0x20 [ 830.212463][T10784] ? fault_create_debugfs_attr+0x180/0x180 [ 830.227826][T10784] ? page_to_nid.part.0+0x20/0x20 [ 830.232849][T10784] ? ___might_sleep+0x163/0x280 [ 830.237715][T10784] __should_failslab+0x121/0x190 [ 830.242652][T10784] should_failslab+0x9/0x14 [ 830.247150][T10784] kmem_cache_alloc+0x2aa/0x710 [ 830.251993][T10784] ? __fget+0x384/0x560 [ 830.256156][T10784] getname_flags+0xd6/0x5b0 [ 830.260655][T10784] do_mkdirat+0xa0/0x2a0 [ 830.264894][T10784] ? __ia32_sys_mknod+0xb0/0xb0 [ 830.269739][T10784] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 830.275802][T10784] ? trace_hardirqs_off_caller+0x65/0x230 [ 830.281541][T10784] __x64_sys_mkdir+0x5c/0x80 [ 830.286131][T10784] do_syscall_64+0xfd/0x6a0 [ 830.290632][T10784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.296513][T10784] RIP: 0033:0x458c97 [ 830.300402][T10784] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 830.319999][T10784] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 830.328404][T10784] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 19:36:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "90"}]}}, &(0x7f0000000140)=""/171, 0x2a, 0xab, 0x1}, 0x20) 19:36:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 830.336372][T10784] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 830.344336][T10784] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 830.352297][T10784] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 830.360264][T10784] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:13 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0x81785501, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x0, 0x0, 0x0, "d000"}) 19:36:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x890b, &(0x7f0000000000)) 19:36:13 executing program 3 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:13 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc4c85512, &(0x7f0000000200)={0x12, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x0, 0x0, 0x0, "d000"}) 19:36:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 19:36:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 830.586875][T10902] FAULT_INJECTION: forcing a failure. [ 830.586875][T10902] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 830.600099][T10902] CPU: 1 PID: 10902 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 830.608070][T10902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.618121][T10902] Call Trace: [ 830.621418][T10902] dump_stack+0x172/0x1f0 [ 830.625753][T10902] should_fail.cold+0xa/0x15 [ 830.630347][T10902] ? fault_create_debugfs_attr+0x180/0x180 [ 830.636158][T10902] ? loop_set_fd+0x1020/0x1020 [ 830.640940][T10902] should_fail_alloc_page+0x50/0x60 [ 830.646140][T10902] __alloc_pages_nodemask+0x1a1/0x900 [ 830.651506][T10902] ? __kasan_check_read+0x11/0x20 [ 830.656534][T10902] ? __alloc_pages_slowpath+0x2520/0x2520 [ 830.662247][T10902] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 830.667880][T10902] ? __kasan_check_read+0x11/0x20 [ 830.672907][T10902] ? fault_create_debugfs_attr+0x180/0x180 [ 830.678711][T10902] cache_grow_begin+0x90/0xd20 [ 830.683473][T10902] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 830.689713][T10902] kmem_cache_alloc+0x64e/0x710 [ 830.694556][T10902] ? __fget+0x384/0x560 [ 830.698716][T10902] getname_flags+0xd6/0x5b0 [ 830.703220][T10902] do_mkdirat+0xa0/0x2a0 [ 830.707459][T10902] ? __ia32_sys_mknod+0xb0/0xb0 [ 830.712309][T10902] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 830.718371][T10902] ? trace_hardirqs_off_caller+0x65/0x230 [ 830.724085][T10902] __x64_sys_mkdir+0x5c/0x80 [ 830.728679][T10902] do_syscall_64+0xfd/0x6a0 [ 830.733184][T10902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.739067][T10902] RIP: 0033:0x458c97 [ 830.742958][T10902] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 830.762556][T10902] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 830.770963][T10902] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 830.778928][T10902] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 19:36:13 executing program 1: ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f0000000f80)={0x0, "d0d3c2a21932e844a89e906edfd511636d1ec93e5971f312e4bd08fd3e10bc18", 0x0, 0x4, 0xaf8a}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x386) connect$inet6(r0, &(0x7f00000000c0), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) 19:36:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 830.786894][T10902] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 830.794857][T10902] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 830.802817][T10902] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8982, &(0x7f0000000000)) 19:36:13 executing program 3 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:13 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0x40405514, &(0x7f0000000200)={0x3, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x0, 0x0, 0x0, "d000"}) 19:36:13 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x0) 19:36:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:13 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x4000, 0x0) 19:36:13 executing program 1: msgsnd(0x0, &(0x7f0000000100)={0x3}, 0x1600, 0x0) 19:36:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) [ 831.033605][T10927] FAULT_INJECTION: forcing a failure. [ 831.033605][T10927] name failslab, interval 1, probability 0, space 0, times 0 [ 831.068422][T10927] CPU: 0 PID: 10927 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 831.076442][T10927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.086581][T10927] Call Trace: [ 831.089864][T10927] dump_stack+0x172/0x1f0 [ 831.089884][T10927] should_fail.cold+0xa/0x15 [ 831.089901][T10927] ? fault_create_debugfs_attr+0x180/0x180 [ 831.089920][T10927] ? __kernel_text_address+0xd/0x40 [ 831.109789][T10927] ? unwind_get_return_address+0x61/0xa0 [ 831.115430][T10927] ? profile_setup.cold+0xbb/0xbb [ 831.120468][T10927] ? ___might_sleep+0x163/0x280 [ 831.125329][T10927] __should_failslab+0x121/0x190 [ 831.130270][T10927] should_failslab+0x9/0x14 [ 831.134772][T10927] __kmalloc+0x2e0/0x770 [ 831.139013][T10927] ? mark_held_locks+0xf0/0xf0 [ 831.143774][T10927] ? stack_trace_save+0xac/0xe0 [ 831.148624][T10927] ? stack_trace_consume_entry+0x190/0x190 [ 831.154433][T10927] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 831.160165][T10927] tomoyo_realpath_from_path+0xcd/0x7b0 [ 831.165710][T10927] ? tomoyo_path_number_perm+0x193/0x520 [ 831.171347][T10927] tomoyo_path_number_perm+0x1dd/0x520 [ 831.176807][T10927] ? tomoyo_path_number_perm+0x193/0x520 [ 831.182439][T10927] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 831.182461][T10927] ? __kasan_check_write+0x14/0x20 [ 831.193349][T10927] ? quarantine_put+0x11c/0x1c0 [ 831.198283][T10927] ? trace_hardirqs_on+0x67/0x240 [ 831.203299][T10927] ? putname+0xef/0x130 [ 831.203313][T10927] ? kmem_cache_free+0x1a7/0x320 [ 831.203328][T10927] tomoyo_path_mkdir+0xaa/0xf0 [ 831.203339][T10927] ? tomoyo_file_ioctl+0x30/0x30 [ 831.203352][T10927] ? kern_path_mountpoint+0x40/0x40 [ 831.203364][T10927] ? strncpy_from_user+0x2b4/0x400 [ 831.203378][T10927] security_path_mkdir+0x113/0x170 [ 831.203391][T10927] do_mkdirat+0x160/0x2a0 [ 831.203405][T10927] ? __ia32_sys_mknod+0xb0/0xb0 [ 831.203426][T10927] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 831.252712][T10927] ? trace_hardirqs_off_caller+0x65/0x230 [ 831.258439][T10927] __x64_sys_mkdir+0x5c/0x80 [ 831.263028][T10927] do_syscall_64+0xfd/0x6a0 [ 831.263052][T10927] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.273396][T10927] RIP: 0033:0x458c97 [ 831.273410][T10927] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 831.273418][T10927] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 831.273429][T10927] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 831.273441][T10927] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 831.321183][T10927] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 19:36:13 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc4c85512, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x0, 0x0, 0x0, "d000"}) 19:36:14 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) read$rfkill(r0, 0x0, 0x0) 19:36:14 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000000)="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", 0xfffffffffffffd17, 0x12}]) 19:36:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:14 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in=@remote, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@in=@local}, 0x0, @in=@empty}}, 0xe8) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x40000000000051f, 0x0, 0x0) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) [ 831.329148][T10927] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 831.337110][T10927] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 831.367690][T10927] ERROR: Out of memory at tomoyo_realpath_from_path. 19:36:14 executing program 3 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:14 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0x2) 19:36:14 executing program 5: semctl$GETNCNT(0x0, 0xcbb3ce46cfa9adfd, 0xe, 0x0) 19:36:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000001c0)=ANY=[@ANYBLOB="050000000000000020000040050000a90000000000fae9fff7ff00000000000001"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000000000c8104"]) 19:36:14 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) [ 831.622351][T11056] FAULT_INJECTION: forcing a failure. [ 831.622351][T11056] name failslab, interval 1, probability 0, space 0, times 0 [ 831.675964][T11056] CPU: 0 PID: 11056 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 831.683981][T11056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.694026][T11056] Call Trace: [ 831.694047][T11056] dump_stack+0x172/0x1f0 [ 831.694067][T11056] should_fail.cold+0xa/0x15 [ 831.694092][T11056] ? fault_create_debugfs_attr+0x180/0x180 [ 831.712038][T11056] ? __kernel_text_address+0xd/0x40 [ 831.712054][T11056] ? unwind_get_return_address+0x61/0xa0 [ 831.712066][T11056] ? profile_setup.cold+0xbb/0xbb [ 831.712090][T11056] ? ___might_sleep+0x163/0x280 [ 831.732735][T11056] __should_failslab+0x121/0x190 [ 831.737674][T11056] should_failslab+0x9/0x14 [ 831.742180][T11056] __kmalloc+0x2e0/0x770 [ 831.746435][T11056] ? mark_held_locks+0xf0/0xf0 [ 831.751208][T11056] ? stack_trace_save+0xac/0xe0 [ 831.756061][T11056] ? stack_trace_consume_entry+0x190/0x190 [ 831.761876][T11056] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 831.767597][T11056] tomoyo_realpath_from_path+0xcd/0x7b0 [ 831.773146][T11056] ? tomoyo_path_number_perm+0x193/0x520 [ 831.778873][T11056] tomoyo_path_number_perm+0x1dd/0x520 [ 831.784336][T11056] ? tomoyo_path_number_perm+0x193/0x520 [ 831.789977][T11056] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 831.795787][T11056] ? __kasan_check_write+0x14/0x20 [ 831.800901][T11056] ? quarantine_put+0x11c/0x1c0 [ 831.805755][T11056] ? trace_hardirqs_on+0x67/0x240 [ 831.810781][T11056] ? putname+0xef/0x130 [ 831.814937][T11056] ? kmem_cache_free+0x1a7/0x320 [ 831.819877][T11056] tomoyo_path_mkdir+0xaa/0xf0 [ 831.824639][T11056] ? tomoyo_file_ioctl+0x30/0x30 [ 831.829583][T11056] ? kern_path_mountpoint+0x40/0x40 [ 831.834778][T11056] ? strncpy_from_user+0x2b4/0x400 [ 831.839898][T11056] security_path_mkdir+0x113/0x170 [ 831.845013][T11056] do_mkdirat+0x160/0x2a0 [ 831.849352][T11056] ? __ia32_sys_mknod+0xb0/0xb0 [ 831.854208][T11056] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 831.860271][T11056] ? trace_hardirqs_off_caller+0x65/0x230 [ 831.865993][T11056] __x64_sys_mkdir+0x5c/0x80 [ 831.870602][T11056] do_syscall_64+0xfd/0x6a0 [ 831.875116][T11056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.881007][T11056] RIP: 0033:0x458c97 [ 831.884908][T11056] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 831.904504][T11056] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 831.912924][T11056] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 19:36:14 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x303, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x146, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000240], 0x0, &(0x7f0000000040), &(0x7f0000000240)=[{}, {0x0, '\x00', 0x0, 0x0, 0x1, [{0x0, 0x2, 0x0, 'team_slave_1\x00', 'veth0_to_bridge\x00', 'bcsh0\x00', 'team_slave_0\x00', @dev, [], @broadcast, [0xff, 0xff], 0x6e, 0x6e, 0xb6, [], [], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x0, 0xff, 0x1}}}}]}, {0x0, '\x00', 0x1}]}, 0x1be) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x800002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800009003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 19:36:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 831.920883][T11056] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 831.928844][T11056] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 831.936812][T11056] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 831.944772][T11056] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 831.963189][T11056] ERROR: Out of memory at tomoyo_realpath_from_path. 19:36:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:14 executing program 3 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:14 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000140)='./file0/file0\x00') 19:36:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:14 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) [ 832.229374][T11083] FAULT_INJECTION: forcing a failure. [ 832.229374][T11083] name failslab, interval 1, probability 0, space 0, times 0 [ 832.246689][T11083] CPU: 1 PID: 11083 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 832.254689][T11083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.254694][T11083] Call Trace: [ 832.254713][T11083] dump_stack+0x172/0x1f0 [ 832.254735][T11083] should_fail.cold+0xa/0x15 [ 832.277204][T11083] ? fault_create_debugfs_attr+0x180/0x180 [ 832.283010][T11083] ? __kasan_check_write+0x14/0x20 [ 832.288123][T11083] ? ___might_sleep+0x163/0x280 [ 832.292970][T11083] __should_failslab+0x121/0x190 [ 832.298005][T11083] ? ratelimit_state_init+0xb0/0xb0 [ 832.303197][T11083] should_failslab+0x9/0x14 [ 832.307696][T11083] kmem_cache_alloc+0x2aa/0x710 [ 832.312625][T11083] ? __kasan_check_read+0x11/0x20 [ 832.317648][T11083] ? ratelimit_state_init+0xb0/0xb0 [ 832.322929][T11083] ext4_alloc_inode+0x1f/0x640 [ 832.327687][T11083] ? ratelimit_state_init+0xb0/0xb0 [ 832.332868][T11083] alloc_inode+0x68/0x1e0 [ 832.337179][T11083] new_inode_pseudo+0x19/0xf0 [ 832.341831][T11083] new_inode+0x1f/0x40 [ 832.345877][T11083] __ext4_new_inode+0x3d5/0x4e50 [ 832.350825][T11083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 832.357051][T11083] ? __dquot_initialize+0x525/0xd80 [ 832.362232][T11083] ? ext4_free_inode+0x1490/0x1490 [ 832.367324][T11083] ? dqget+0x10d0/0x10d0 [ 832.371551][T11083] ? quarantine_put+0x11c/0x1c0 [ 832.376380][T11083] ext4_mkdir+0x3df/0xe20 [ 832.381504][T11083] ? ext4_init_dot_dotdot+0x520/0x520 [ 832.386861][T11083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 832.393092][T11083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 832.399316][T11083] ? security_inode_permission+0xcb/0x100 [ 832.405014][T11083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 832.411414][T11083] ? security_inode_mkdir+0xe4/0x120 [ 832.416680][T11083] vfs_mkdir+0x42e/0x670 [ 832.420904][T11083] do_mkdirat+0x234/0x2a0 [ 832.425210][T11083] ? __ia32_sys_mknod+0xb0/0xb0 [ 832.430044][T11083] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 832.436103][T11083] ? trace_hardirqs_off_caller+0x65/0x230 [ 832.441972][T11083] __x64_sys_mkdir+0x5c/0x80 [ 832.446541][T11083] do_syscall_64+0xfd/0x6a0 [ 832.451023][T11083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.456893][T11083] RIP: 0033:0x458c97 [ 832.460776][T11083] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:36:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, 0x0, 0x0) 19:36:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 832.480354][T11083] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 832.488914][T11083] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 832.496881][T11083] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 832.504829][T11083] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 832.512777][T11083] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 832.520744][T11083] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000100)={0x80000}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 19:36:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/612], 0x264) write$binfmt_elf32(r0, &(0x7f0000001340)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "", [[], []]}, 0x258) 19:36:15 executing program 3 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:15 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) [ 832.785409][T11203] FAULT_INJECTION: forcing a failure. [ 832.785409][T11203] name failslab, interval 1, probability 0, space 0, times 0 [ 832.808046][T11203] CPU: 1 PID: 11203 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 832.816058][T11203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.826122][T11203] Call Trace: [ 832.829423][T11203] dump_stack+0x172/0x1f0 [ 832.833869][T11203] should_fail.cold+0xa/0x15 [ 832.838463][T11203] ? fault_create_debugfs_attr+0x180/0x180 [ 832.844278][T11203] ? ___might_sleep+0x163/0x280 [ 832.844300][T11203] __should_failslab+0x121/0x190 [ 832.854062][T11203] should_failslab+0x9/0x14 [ 832.858556][T11203] __kmalloc+0x2e0/0x770 [ 832.862796][T11203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 832.869039][T11203] ? d_absolute_path+0x11b/0x170 [ 832.873969][T11203] ? __d_path+0x140/0x140 [ 832.878289][T11203] ? tomoyo_encode2.part.0+0xf5/0x400 [ 832.883661][T11203] tomoyo_encode2.part.0+0xf5/0x400 [ 832.888863][T11203] tomoyo_encode+0x2b/0x50 [ 832.893273][T11203] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 832.898909][T11203] tomoyo_path_number_perm+0x1dd/0x520 [ 832.904364][T11203] ? tomoyo_path_number_perm+0x193/0x520 [ 832.910016][T11203] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 832.915845][T11203] ? __kasan_check_write+0x14/0x20 [ 832.920971][T11203] ? quarantine_put+0x11c/0x1c0 [ 832.920993][T11203] ? trace_hardirqs_on+0x67/0x240 [ 832.930843][T11203] ? putname+0xef/0x130 [ 832.935004][T11203] ? kmem_cache_free+0x1a7/0x320 [ 832.939948][T11203] tomoyo_path_mkdir+0xaa/0xf0 [ 832.946102][T11203] ? tomoyo_file_ioctl+0x30/0x30 [ 832.951121][T11203] ? kern_path_mountpoint+0x40/0x40 [ 832.956315][T11203] ? strncpy_from_user+0x2b4/0x400 [ 832.961420][T11203] security_path_mkdir+0x113/0x170 [ 832.966528][T11203] do_mkdirat+0x160/0x2a0 [ 832.970847][T11203] ? __ia32_sys_mknod+0xb0/0xb0 [ 832.975692][T11203] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 832.981735][T11203] ? trace_hardirqs_off_caller+0x65/0x230 [ 832.987431][T11203] __x64_sys_mkdir+0x5c/0x80 [ 832.992021][T11203] do_syscall_64+0xfd/0x6a0 [ 832.996507][T11203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 833.002485][T11203] RIP: 0033:0x458c97 [ 833.006362][T11203] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 833.025944][T11203] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 19:36:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 833.034422][T11203] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 833.042371][T11203] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 833.050419][T11203] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 833.058383][T11203] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 833.066332][T11203] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000240)) 19:36:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 833.114790][T11203] ERROR: Out of memory at tomoyo_realpath_from_path. 19:36:16 executing program 3 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:16 executing program 2: socket$inet6(0xa, 0x0, 0x0) creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) read$eventfd(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2) creat(&(0x7f00000000c0)='./bus\x00', 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000640)=ANY=[@ANYBLOB="62726f7574650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000", @ANYBLOB='\x00'], 0x2) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000800)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x9f) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='hybla\x00', 0x6) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:36:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 833.281648][T11332] FAULT_INJECTION: forcing a failure. [ 833.281648][T11332] name failslab, interval 1, probability 0, space 0, times 0 [ 833.299700][T11332] CPU: 1 PID: 11332 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 833.307703][T11332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.317757][T11332] Call Trace: [ 833.321057][T11332] dump_stack+0x172/0x1f0 [ 833.325389][T11332] should_fail.cold+0xa/0x15 [ 833.330066][T11332] ? fault_create_debugfs_attr+0x180/0x180 [ 833.335876][T11332] ? ___might_sleep+0x163/0x280 [ 833.340727][T11332] __should_failslab+0x121/0x190 [ 833.345672][T11332] should_failslab+0x9/0x14 [ 833.350171][T11332] __kmalloc+0x2e0/0x770 [ 833.354411][T11332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 833.360650][T11332] ? d_absolute_path+0x11b/0x170 [ 833.365586][T11332] ? __d_path+0x140/0x140 [ 833.369916][T11332] ? tomoyo_encode2.part.0+0xf5/0x400 [ 833.375286][T11332] tomoyo_encode2.part.0+0xf5/0x400 [ 833.380482][T11332] tomoyo_encode+0x2b/0x50 [ 833.384892][T11332] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 833.390543][T11332] tomoyo_path_number_perm+0x1dd/0x520 [ 833.396002][T11332] ? tomoyo_path_number_perm+0x193/0x520 [ 833.401632][T11332] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 833.407438][T11332] ? __kasan_check_write+0x14/0x20 [ 833.412550][T11332] ? quarantine_put+0x11c/0x1c0 [ 833.417406][T11332] ? trace_hardirqs_on+0x67/0x240 [ 833.422514][T11332] ? putname+0xef/0x130 [ 833.426666][T11332] ? kmem_cache_free+0x1a7/0x320 [ 833.431607][T11332] tomoyo_path_mkdir+0xaa/0xf0 [ 833.436381][T11332] ? tomoyo_file_ioctl+0x30/0x30 [ 833.441323][T11332] ? kern_path_mountpoint+0x40/0x40 [ 833.446515][T11332] ? strncpy_from_user+0x2b4/0x400 [ 833.451629][T11332] security_path_mkdir+0x113/0x170 [ 833.456745][T11332] do_mkdirat+0x160/0x2a0 [ 833.461075][T11332] ? __ia32_sys_mknod+0xb0/0xb0 [ 833.465925][T11332] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 833.471990][T11332] ? trace_hardirqs_off_caller+0x65/0x230 [ 833.477705][T11332] __x64_sys_mkdir+0x5c/0x80 [ 833.482297][T11332] do_syscall_64+0xfd/0x6a0 [ 833.486800][T11332] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 833.492683][T11332] RIP: 0033:0x458c97 [ 833.496576][T11332] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 833.516266][T11332] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 833.524671][T11332] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 19:36:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='map_files\x00') getdents(r0, &(0x7f0000000000)=""/232, 0x302) 19:36:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 833.532640][T11332] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 833.540615][T11332] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 833.549871][T11332] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 833.557839][T11332] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:16 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) [ 833.576951][T11332] ERROR: Out of memory at tomoyo_realpath_from_path. 19:36:16 executing program 3 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_genetlink_get_family_id$tipc2(0xffffffffffffffff) 19:36:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:16 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) writev(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 833.775767][T11460] FAULT_INJECTION: forcing a failure. [ 833.775767][T11460] name failslab, interval 1, probability 0, space 0, times 0 [ 833.799233][T11460] CPU: 0 PID: 11460 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 833.807240][T11460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.817291][T11460] Call Trace: [ 833.820588][T11460] dump_stack+0x172/0x1f0 [ 833.824932][T11460] should_fail.cold+0xa/0x15 [ 833.829537][T11460] ? fault_create_debugfs_attr+0x180/0x180 [ 833.835353][T11460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 833.841596][T11460] ? should_fail+0x1de/0x852 [ 833.846202][T11460] __should_failslab+0x121/0x190 [ 833.851149][T11460] should_failslab+0x9/0x14 [ 833.855636][T11460] kmem_cache_alloc+0x47/0x710 [ 833.860382][T11460] ? find_get_entry+0x50e/0x880 [ 833.865217][T11460] ? ___might_sleep+0x163/0x280 [ 833.870061][T11460] ? mempool_alloc+0x380/0x380 [ 833.874805][T11460] mempool_alloc_slab+0x47/0x60 [ 833.879635][T11460] mempool_alloc+0x169/0x380 [ 833.884214][T11460] ? mempool_destroy+0x40/0x40 [ 833.888956][T11460] ? find_get_entry+0x535/0x880 [ 833.893792][T11460] ? mark_held_locks+0xf0/0xf0 [ 833.898534][T11460] ? __unlock_page_memcg+0x53/0x100 [ 833.903714][T11460] bio_alloc_bioset+0x3b9/0x680 [ 833.908540][T11460] ? mark_buffer_dirty_inode+0x305/0x410 [ 833.914150][T11460] ? bvec_alloc+0x2f0/0x2f0 [ 833.918640][T11460] ? lock_downgrade+0x920/0x920 [ 833.923469][T11460] ? rwlock_bug.part.0+0x90/0x90 [ 833.928385][T11460] submit_bh_wbc+0x1c5/0x900 [ 833.933749][T11460] __sync_dirty_buffer+0x12b/0x350 [ 833.938837][T11460] sync_dirty_buffer+0x1b/0x20 [ 833.943591][T11460] __ext4_handle_dirty_metadata+0x241/0x600 [ 833.949462][T11460] ext4_getblk+0x368/0x570 [ 833.953857][T11460] ? ext4_iomap_begin+0x1000/0x1000 [ 833.959035][T11460] ext4_bread+0x93/0x270 [ 833.963266][T11460] ? ext4_getblk+0x570/0x570 [ 833.967838][T11460] ext4_append+0x155/0x370 [ 833.972235][T11460] ext4_mkdir+0x632/0xe20 [ 833.976547][T11460] ? ext4_init_dot_dotdot+0x520/0x520 [ 833.982257][T11460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 833.988475][T11460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 833.994695][T11460] ? security_inode_permission+0xcb/0x100 [ 834.000394][T11460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 834.006613][T11460] ? security_inode_mkdir+0xe4/0x120 [ 834.011964][T11460] vfs_mkdir+0x42e/0x670 [ 834.016184][T11460] do_mkdirat+0x234/0x2a0 [ 834.020493][T11460] ? __ia32_sys_mknod+0xb0/0xb0 [ 834.025325][T11460] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 834.031367][T11460] ? trace_hardirqs_off_caller+0x65/0x230 [ 834.037063][T11460] __x64_sys_mkdir+0x5c/0x80 [ 834.041634][T11460] do_syscall_64+0xfd/0x6a0 [ 834.046202][T11460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.052082][T11460] RIP: 0033:0x458c97 [ 834.055959][T11460] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:36:16 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 19:36:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) waitid(0x0, 0x0, 0x0, 0x40000002, &(0x7f0000000000)) [ 834.075539][T11460] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 834.083927][T11460] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 834.091880][T11460] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 834.099828][T11460] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 834.107795][T11460] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 834.115838][T11460] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:19 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) fchmod(r0, 0x0) 19:36:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:19 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000700)={0x30, 0x5, 0x0, {0x0, 0x3, 0x6}}, 0x30) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000240)) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f00000002c0)) utimes(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)={{}, {0x77359400}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=r2, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000680)={0x7, 0x33, 0x2}, 0x7) keyctl$negate(0xd, 0x0, 0x0, 0x0) dup3(r1, r2, 0x0) r3 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r3, 0x0) add_key$user(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000080)="0ca11c532ca5c6fa8d414b0cb428341412b976334c960de5e3352b802764501fc9d6", 0x22, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0) 19:36:19 executing program 3 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:19 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 19:36:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x14\x03\x03\xf0\x00', @ifru_mtu=0x1}) ioctl$TUNSETGROUP(r1, 0x400454ce, 0x0) [ 836.702287][T11584] FAULT_INJECTION: forcing a failure. [ 836.702287][T11584] name failslab, interval 1, probability 0, space 0, times 0 [ 836.736433][T11584] CPU: 0 PID: 11584 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 19:36:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 836.744444][T11584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.754498][T11584] Call Trace: [ 836.757800][T11584] dump_stack+0x172/0x1f0 [ 836.762150][T11584] should_fail.cold+0xa/0x15 [ 836.766832][T11584] ? arch_stack_walk+0x97/0xf0 [ 836.771593][T11584] ? fault_create_debugfs_attr+0x180/0x180 [ 836.777403][T11584] ? ___might_sleep+0x163/0x280 [ 836.782270][T11584] __should_failslab+0x121/0x190 [ 836.787209][T11584] should_failslab+0x9/0x14 [ 836.791710][T11584] __kmalloc+0x2e0/0x770 [ 836.795955][T11584] ? __getblk_gfp+0x5c/0xa10 [ 836.800553][T11584] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 836.806272][T11584] ? ext4_find_extent+0x76e/0x9d0 [ 836.811302][T11584] ext4_find_extent+0x76e/0x9d0 [ 836.816203][T11584] ? ___might_sleep+0x163/0x280 [ 836.821058][T11584] ext4_ext_map_blocks+0x1dc/0x5040 [ 836.826269][T11584] ? __kasan_check_read+0x11/0x20 [ 836.831303][T11584] ? ext4_ext_release+0x10/0x10 [ 836.836172][T11584] ? __kasan_check_write+0x14/0x20 [ 836.841287][T11584] ? down_read+0x10a/0x3f0 [ 836.845706][T11584] ? down_read_killable+0x460/0x460 19:36:19 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) [ 836.850908][T11584] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 836.857149][T11584] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 836.862606][T11584] ext4_map_blocks+0xdc5/0x17f0 [ 836.867467][T11584] ? ext4_issue_zeroout+0x190/0x190 [ 836.872669][T11584] ? ext4_set_acl+0x4f0/0x4f0 [ 836.877355][T11584] ? __kasan_check_write+0x14/0x20 [ 836.882466][T11584] ext4_getblk+0xc4/0x570 [ 836.886788][T11584] ? ext4_iomap_begin+0x1000/0x1000 [ 836.891986][T11584] ext4_bread+0x93/0x270 [ 836.896228][T11584] ? ext4_getblk+0x570/0x570 [ 836.900825][T11584] ext4_append+0x155/0x370 [ 836.905251][T11584] ext4_mkdir+0x632/0xe20 [ 836.909595][T11584] ? ext4_init_dot_dotdot+0x520/0x520 [ 836.914971][T11584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 836.921219][T11584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 836.927460][T11584] ? security_inode_permission+0xcb/0x100 [ 836.933188][T11584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 836.939435][T11584] ? security_inode_mkdir+0xe4/0x120 [ 836.944735][T11584] vfs_mkdir+0x42e/0x670 [ 836.948987][T11584] do_mkdirat+0x234/0x2a0 [ 836.953316][T11584] ? __ia32_sys_mknod+0xb0/0xb0 [ 836.958171][T11584] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 836.964235][T11584] ? trace_hardirqs_off_caller+0x65/0x230 [ 836.969955][T11584] __x64_sys_mkdir+0x5c/0x80 [ 836.974548][T11584] do_syscall_64+0xfd/0x6a0 [ 836.979056][T11584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 836.985208][T11584] RIP: 0033:0x458c97 19:36:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000000)={{0x80}, 'port0\x00', 0x97}) [ 836.989100][T11584] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 837.008791][T11584] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 837.017211][T11584] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 837.025194][T11584] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 837.033168][T11584] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 837.041141][T11584] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 19:36:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x306) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x14\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 837.049193][T11584] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:22 executing program 3 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:22 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x4, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x20000, @local}}}, 0x108) 19:36:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) fgetxattr(r0, &(0x7f0000000040)=@known='system.sockprotoname\x00', 0x0, 0x0) 19:36:22 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 19:36:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:22 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) poll(&(0x7f0000000380)=[{r0}], 0x1, 0x0) [ 839.854817][T11947] FAULT_INJECTION: forcing a failure. [ 839.854817][T11947] name failslab, interval 1, probability 0, space 0, times 0 [ 839.920517][T11947] CPU: 1 PID: 11947 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 839.928549][T11947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 839.938592][T11947] Call Trace: [ 839.941869][T11947] dump_stack+0x172/0x1f0 [ 839.946195][T11947] should_fail.cold+0xa/0x15 [ 839.950768][T11947] ? fault_create_debugfs_attr+0x180/0x180 [ 839.956557][T11947] ? lock_downgrade+0x920/0x920 [ 839.961393][T11947] ? ___might_sleep+0x163/0x280 [ 839.966226][T11947] __should_failslab+0x121/0x190 [ 839.971145][T11947] should_failslab+0x9/0x14 [ 839.975644][T11947] kmem_cache_alloc+0x2aa/0x710 [ 839.980479][T11947] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 839.986700][T11947] ? __mark_inode_dirty+0x3d1/0x1390 [ 839.991969][T11947] ext4_mb_new_blocks+0x5b9/0x3870 [ 839.997060][T11947] ? quarantine_put+0x11c/0x1c0 [ 840.001891][T11947] ? ext4_find_extent+0x76e/0x9d0 [ 840.006900][T11947] ext4_ext_map_blocks+0x2b34/0x5040 [ 840.012166][T11947] ? ext4_ext_release+0x10/0x10 [ 840.016995][T11947] ? lock_acquire+0x190/0x410 [ 840.021650][T11947] ? ext4_map_blocks+0x4b1/0x17f0 [ 840.026657][T11947] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 840.032095][T11947] ext4_map_blocks+0x529/0x17f0 [ 840.036927][T11947] ? ext4_issue_zeroout+0x190/0x190 [ 840.042105][T11947] ? ext4_set_acl+0x4f0/0x4f0 [ 840.046765][T11947] ? __kasan_check_write+0x14/0x20 [ 840.051874][T11947] ext4_getblk+0xc4/0x570 [ 840.056183][T11947] ? ext4_iomap_begin+0x1000/0x1000 [ 840.061363][T11947] ext4_bread+0x93/0x270 [ 840.065599][T11947] ? ext4_getblk+0x570/0x570 [ 840.070171][T11947] ext4_append+0x155/0x370 [ 840.074571][T11947] ext4_mkdir+0x632/0xe20 [ 840.078886][T11947] ? ext4_init_dot_dotdot+0x520/0x520 [ 840.084255][T11947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 840.090476][T11947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 840.096699][T11947] ? security_inode_permission+0xcb/0x100 [ 840.102405][T11947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 840.108623][T11947] ? security_inode_mkdir+0xe4/0x120 [ 840.113902][T11947] vfs_mkdir+0x42e/0x670 [ 840.118124][T11947] do_mkdirat+0x234/0x2a0 [ 840.122434][T11947] ? __ia32_sys_mknod+0xb0/0xb0 [ 840.127279][T11947] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 840.133326][T11947] ? trace_hardirqs_off_caller+0x65/0x230 [ 840.139024][T11947] __x64_sys_mkdir+0x5c/0x80 [ 840.143609][T11947] do_syscall_64+0xfd/0x6a0 [ 840.148093][T11947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 840.153962][T11947] RIP: 0033:0x458c97 [ 840.157841][T11947] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 840.177426][T11947] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 840.185814][T11947] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 840.193780][T11947] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 840.201742][T11947] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 840.209691][T11947] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 19:36:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 840.217641][T11947] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x891d, &(0x7f0000000040)={'bond_slave_1\x00', @ifru_names='syzkaller0\x00'}) 19:36:23 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) r0 = getpid() getpriority(0x1, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x9, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000540)=0xff, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r3 = socket(0x10, 0x2, 0x0) write(r3, &(0x7f0000000300)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000240)={0x0, 0x1000}) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000780)={0x1, &(0x7f0000000580)=[{0x0}]}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000000d80)={r4, 0x7, &(0x7f00000007c0)=[0x3, 0xfffffffffffffffb, 0x4, 0x8, 0xffffffffffffffff, 0x100000000, 0x4], &(0x7f0000000cc0)=[0x1ebf44ea, 0x6, 0x8, 0x430a, 0x1, 0x7], 0x10, 0x1, 0x7, &(0x7f0000000d00)=[0x3], &(0x7f0000000d40)}) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) clock_gettime(0x5, &(0x7f0000000440)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000000280)=[{{&(0x7f0000000640)=@isdn, 0x80, &(0x7f0000000100)=[{&(0x7f0000000800)=""/237, 0xed}], 0x1, &(0x7f0000000900)=""/127, 0x7f}, 0x8}], 0x1, 0x21, &(0x7f0000000500)={r6, r7+10000000}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000080)='!proccgroup\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000005c0)) fsetxattr$security_smack_entry(r5, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) socket(0xa, 0x800, 0x3ff) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r8, &(0x7f0000000380), 0x0}, 0x18) 19:36:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:23 executing program 3 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:23 executing program 1: process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000001940), 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000700)={0x30, 0x5, 0x0, {0x0, 0x3, 0x6, 0x508000000000}}, 0x30) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x400000, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r3 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)="6cd61bfc231f62413151bee0efe66f4786bd88e22305cbbb6c27c4b787aecf999a856cc60f4c7ce7d581e80235890f41ee62483c39c79731ad5b136b59c482b65569fc58571e5c1daa02f7cc1c13bae680bd8293b04ef3b69ef9c368044ce5905979b1ce1b78638eef0a7cd3552d26bf3b3d08685af859881229912f34ad3ee6e9189a22c3771976c521f07b65dd86aa7b3884f54b8314bd8bc415260b9cf7a1be2fadde61dec4b8d2370ff20ed8f8acee15e0ef13c5262648e9bfe0", 0xbc, 0xfffffffffffffffa) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) keyctl$negate(0xd, r3, 0x7fffffff, 0x0) dup3(r1, r2, 0x80000) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="0ca11c532ca5c6fa8d414b0cb428341412b976334c960de5e3352b802764501fc9d65cfab8a7d354b689f92ff588fcba6972c2278ced0834bae5594722151faa5c5504", 0x43, 0xffffffffffffffff) keyctl$search(0xa, r4, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0) [ 840.390639][T12058] FAULT_INJECTION: forcing a failure. [ 840.390639][T12058] name failslab, interval 1, probability 0, space 0, times 0 [ 840.415522][T12058] CPU: 0 PID: 12058 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 840.423539][T12058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.433596][T12058] Call Trace: [ 840.436893][T12058] dump_stack+0x172/0x1f0 [ 840.441228][T12058] should_fail.cold+0xa/0x15 [ 840.445817][T12058] ? fault_create_debugfs_attr+0x180/0x180 [ 840.451622][T12058] ? lock_downgrade+0x920/0x920 [ 840.456501][T12058] ? ___might_sleep+0x163/0x280 [ 840.461360][T12058] __should_failslab+0x121/0x190 [ 840.466412][T12058] should_failslab+0x9/0x14 [ 840.470917][T12058] kmem_cache_alloc+0x2aa/0x710 [ 840.475770][T12058] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 840.482013][T12058] ? __mark_inode_dirty+0x3d1/0x1390 [ 840.487309][T12058] ext4_mb_new_blocks+0x5b9/0x3870 [ 840.492443][T12058] ? quarantine_put+0x11c/0x1c0 [ 840.497303][T12058] ? ext4_find_extent+0x76e/0x9d0 [ 840.502354][T12058] ext4_ext_map_blocks+0x2b34/0x5040 [ 840.507647][T12058] ? ext4_ext_release+0x10/0x10 [ 840.512496][T12058] ? lock_acquire+0x190/0x410 [ 840.517173][T12058] ? ext4_map_blocks+0x4b1/0x17f0 [ 840.522201][T12058] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 840.527659][T12058] ext4_map_blocks+0x529/0x17f0 [ 840.532509][T12058] ? ext4_issue_zeroout+0x190/0x190 [ 840.537718][T12058] ? ext4_set_acl+0x4f0/0x4f0 [ 840.542407][T12058] ? __kasan_check_write+0x14/0x20 [ 840.547518][T12058] ext4_getblk+0xc4/0x570 [ 840.551849][T12058] ? ext4_iomap_begin+0x1000/0x1000 [ 840.557046][T12058] ext4_bread+0x93/0x270 [ 840.561298][T12058] ? ext4_getblk+0x570/0x570 [ 840.565898][T12058] ext4_append+0x155/0x370 [ 840.570312][T12058] ext4_mkdir+0x632/0xe20 [ 840.574649][T12058] ? ext4_init_dot_dotdot+0x520/0x520 [ 840.580020][T12058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 840.586276][T12058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 840.592515][T12058] ? security_inode_permission+0xcb/0x100 [ 840.598232][T12058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 840.604470][T12058] ? security_inode_mkdir+0xe4/0x120 [ 840.609755][T12058] vfs_mkdir+0x42e/0x670 [ 840.613995][T12058] do_mkdirat+0x234/0x2a0 [ 840.618326][T12058] ? __ia32_sys_mknod+0xb0/0xb0 [ 840.623179][T12058] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 840.629240][T12058] ? trace_hardirqs_off_caller+0x65/0x230 [ 840.634965][T12058] __x64_sys_mkdir+0x5c/0x80 [ 840.639537][T12058] do_syscall_64+0xfd/0x6a0 [ 840.644025][T12058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 840.649895][T12058] RIP: 0033:0x458c97 [ 840.653772][T12058] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 840.673354][T12058] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 840.681741][T12058] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 19:36:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$TUNSETOWNER(r1, 0x400454cc, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x14\x03\x03\xf0\x00', @ifru_mtu}) [ 840.689706][T12058] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 840.697659][T12058] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 840.705611][T12058] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 840.713561][T12058] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:23 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 19:36:23 executing program 3 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x2) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) pipe(0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x10000, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, 0xffffffffffffffff) r2 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@empty, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6=@loopback}}, 0x0) dup(r0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000400)={{{@in=@empty, @in6=@initdev}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000500)=0xe8) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r4, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000380)=0x2, 0x4) write$P9_RFLUSH(r4, &(0x7f00000001c0)={0x7d6a591eedaef62b}, 0xfffffe36) connect$unix(r4, &(0x7f0000000100)=@abs, 0x6e) 19:36:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 840.906825][T12275] FAULT_INJECTION: forcing a failure. [ 840.906825][T12275] name failslab, interval 1, probability 0, space 0, times 0 [ 840.938890][T12275] CPU: 1 PID: 12275 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 840.946907][T12275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.956959][T12275] Call Trace: [ 840.960258][T12275] dump_stack+0x172/0x1f0 [ 840.964599][T12275] should_fail.cold+0xa/0x15 [ 840.969194][T12275] ? fault_create_debugfs_attr+0x180/0x180 [ 840.975002][T12275] ? page_to_nid.part.0+0x20/0x20 [ 840.980036][T12275] ? ___might_sleep+0x163/0x280 [ 840.984892][T12275] __should_failslab+0x121/0x190 [ 840.989836][T12275] should_failslab+0x9/0x14 [ 840.994342][T12275] kmem_cache_alloc_trace+0x2d3/0x790 [ 840.999715][T12275] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 841.005951][T12275] ? _copy_from_user+0x12c/0x1a0 [ 841.010895][T12275] copy_mount_options+0x5c/0x3f0 [ 841.015831][T12275] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 841.022073][T12275] ksys_mount+0xa7/0x150 [ 841.026321][T12275] __x64_sys_mount+0xbe/0x150 [ 841.030998][T12275] do_syscall_64+0xfd/0x6a0 [ 841.035506][T12275] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 841.041400][T12275] RIP: 0033:0x45c2ca [ 841.045292][T12275] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 841.065674][T12275] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 841.074081][T12275] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 841.082033][T12275] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 841.090008][T12275] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 841.097963][T12275] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 19:36:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 841.105915][T12275] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:23 executing program 1: write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000700)={0x30, 0x5, 0x0, {0x0, 0x3, 0x6, 0x508000000000}}, 0x30) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x400000, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r2 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)="6cd61bfc231f62413151bee0efe66f4786bd88e22305cbbb6c27c4b787aecf999a856cc60f4c7ce7d581e80235890f41ee62483c39c79731ad5b136b59c482b65569fc58571e5c1daa02f7cc1c13bae680bd82", 0x53, 0xfffffffffffffffa) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000680)={0x7}, 0x7) getegid() keyctl$negate(0xd, r2, 0x7fffffff, 0x0) dup3(r0, r1, 0x80000) lsetxattr$trusted_overlay_redirect(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r3 = add_key$user(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r3, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0) 19:36:26 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:26 executing program 3 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000770000000200000063010080000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 19:36:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:26 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000080), 0xe) listen(r0, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, &(0x7f0000000100)) 19:36:26 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 19:36:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:26 executing program 1: [ 843.423679][T12396] FAULT_INJECTION: forcing a failure. [ 843.423679][T12396] name failslab, interval 1, probability 0, space 0, times 0 [ 843.499033][T12396] CPU: 1 PID: 12396 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 843.507057][T12396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.517113][T12396] Call Trace: [ 843.520411][T12396] dump_stack+0x172/0x1f0 [ 843.524748][T12396] should_fail.cold+0xa/0x15 [ 843.529344][T12396] ? fault_create_debugfs_attr+0x180/0x180 [ 843.535150][T12396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 843.541406][T12396] ? should_fail+0x1de/0x852 [ 843.546002][T12396] __should_failslab+0x121/0x190 [ 843.552448][T12396] should_failslab+0x9/0x14 [ 843.556958][T12396] kmem_cache_alloc+0x47/0x710 [ 843.561728][T12396] ? find_get_entry+0x50e/0x880 [ 843.566579][T12396] ? ___might_sleep+0x163/0x280 [ 843.571430][T12396] ? mempool_alloc+0x380/0x380 [ 843.576190][T12396] mempool_alloc_slab+0x47/0x60 [ 843.581033][T12396] mempool_alloc+0x169/0x380 [ 843.585626][T12396] ? mempool_destroy+0x40/0x40 [ 843.590388][T12396] ? find_get_entry+0x535/0x880 [ 843.595238][T12396] ? mark_held_locks+0xf0/0xf0 [ 843.600002][T12396] ? __unlock_page_memcg+0x53/0x100 [ 843.605201][T12396] bio_alloc_bioset+0x3b9/0x680 [ 843.610051][T12396] ? mark_buffer_dirty_inode+0x305/0x410 [ 843.615679][T12396] ? bvec_alloc+0x2f0/0x2f0 [ 843.620180][T12396] ? lock_downgrade+0x920/0x920 [ 843.625040][T12396] ? rwlock_bug.part.0+0x90/0x90 [ 843.629972][T12396] submit_bh_wbc+0x1c5/0x900 [ 843.634569][T12396] __sync_dirty_buffer+0x12b/0x350 [ 843.639682][T12396] sync_dirty_buffer+0x1b/0x20 [ 843.644448][T12396] __ext4_handle_dirty_metadata+0x241/0x600 [ 843.650346][T12396] ext4_getblk+0x368/0x570 [ 843.654759][T12396] ? ext4_iomap_begin+0x1000/0x1000 [ 843.659961][T12396] ext4_bread+0x93/0x270 [ 843.664200][T12396] ? ext4_getblk+0x570/0x570 [ 843.668800][T12396] ext4_append+0x155/0x370 [ 843.673216][T12396] ext4_mkdir+0x632/0xe20 [ 843.677548][T12396] ? ext4_init_dot_dotdot+0x520/0x520 [ 843.682925][T12396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 843.689160][T12396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 843.695395][T12396] ? security_inode_permission+0xcb/0x100 [ 843.701112][T12396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 843.707351][T12396] ? security_inode_mkdir+0xe4/0x120 [ 843.712635][T12396] vfs_mkdir+0x42e/0x670 [ 843.716876][T12396] do_mkdirat+0x234/0x2a0 [ 843.721204][T12396] ? __ia32_sys_mknod+0xb0/0xb0 [ 843.726057][T12396] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 843.732236][T12396] ? trace_hardirqs_off_caller+0x65/0x230 [ 843.737951][T12396] __x64_sys_mkdir+0x5c/0x80 [ 843.742538][T12396] do_syscall_64+0xfd/0x6a0 [ 843.747051][T12396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 843.752931][T12396] RIP: 0033:0x458c97 [ 843.756826][T12396] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 843.776430][T12396] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 843.784834][T12396] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 19:36:26 executing program 2: [ 843.792800][T12396] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 843.800775][T12396] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 843.808742][T12396] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 843.816706][T12396] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:26 executing program 2: 19:36:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:26 executing program 1: 19:36:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:29 executing program 3 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:29 executing program 2: 19:36:29 executing program 1: 19:36:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:29 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 19:36:29 executing program 2: 19:36:29 executing program 1: 19:36:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 846.523531][T12522] FAULT_INJECTION: forcing a failure. [ 846.523531][T12522] name failslab, interval 1, probability 0, space 0, times 0 [ 846.599404][T12522] CPU: 0 PID: 12522 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 846.607421][T12522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.617473][T12522] Call Trace: [ 846.620776][T12522] dump_stack+0x172/0x1f0 [ 846.625123][T12522] should_fail.cold+0xa/0x15 [ 846.629720][T12522] ? ext4_bread+0x93/0x270 [ 846.634145][T12522] ? fault_create_debugfs_attr+0x180/0x180 [ 846.639950][T12522] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 846.639965][T12522] ? ext4_mkdir+0x632/0xe20 [ 846.639983][T12522] ? vfs_mkdir+0x42e/0x670 [ 846.650511][T12522] ? do_mkdirat+0x234/0x2a0 [ 846.650522][T12522] ? __x64_sys_mkdir+0x5c/0x80 [ 846.650536][T12522] ? do_syscall_64+0xfd/0x6a0 [ 846.650554][T12522] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 846.674882][T12522] ? do_mkdirat+0x234/0x2a0 [ 846.679391][T12522] __should_failslab+0x121/0x190 [ 846.684331][T12522] should_failslab+0x9/0x14 [ 846.688916][T12522] kmem_cache_alloc_node+0x56/0x740 [ 846.694115][T12522] ? lock_downgrade+0x920/0x920 [ 846.698967][T12522] create_task_io_context+0x33/0x450 [ 846.704249][T12522] generic_make_request_checks+0x1b2f/0x21a0 [ 846.710230][T12522] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 846.716034][T12522] ? trace_event_raw_event_block_rq_requeue+0x640/0x640 [ 846.722962][T12522] ? ___might_sleep+0x163/0x280 [ 846.727812][T12522] ? mempool_alloc+0x380/0x380 [ 846.732578][T12522] generic_make_request+0x8f/0xb50 [ 846.737688][T12522] ? blk_queue_enter+0xe60/0xe60 [ 846.742626][T12522] ? guard_bio_eod+0x1cd/0x5a0 [ 846.747384][T12522] ? __kasan_check_read+0x11/0x20 [ 846.752410][T12522] submit_bio+0x104/0x4d0 [ 846.756733][T12522] ? submit_bio+0x104/0x4d0 [ 846.761231][T12522] ? generic_make_request+0xb50/0xb50 [ 846.766602][T12522] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 846.772317][T12522] ? guard_bio_eod+0x294/0x5a0 [ 846.777078][T12522] submit_bh_wbc+0x6b6/0x900 [ 846.781668][T12522] __sync_dirty_buffer+0x12b/0x350 [ 846.786774][T12522] sync_dirty_buffer+0x1b/0x20 [ 846.791539][T12522] __ext4_handle_dirty_metadata+0x241/0x600 [ 846.797429][T12522] ext4_getblk+0x368/0x570 [ 846.801840][T12522] ? ext4_iomap_begin+0x1000/0x1000 [ 846.807044][T12522] ext4_bread+0x93/0x270 [ 846.811283][T12522] ? ext4_getblk+0x570/0x570 [ 846.815875][T12522] ext4_append+0x155/0x370 [ 846.820292][T12522] ext4_mkdir+0x632/0xe20 [ 846.824627][T12522] ? ext4_init_dot_dotdot+0x520/0x520 [ 846.830000][T12522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 846.836236][T12522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 846.842476][T12522] ? security_inode_permission+0xcb/0x100 [ 846.848805][T12522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 846.855043][T12522] ? security_inode_mkdir+0xe4/0x120 [ 846.860331][T12522] vfs_mkdir+0x42e/0x670 [ 846.864572][T12522] do_mkdirat+0x234/0x2a0 [ 846.868899][T12522] ? __ia32_sys_mknod+0xb0/0xb0 [ 846.873748][T12522] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 846.879819][T12522] ? trace_hardirqs_off_caller+0x65/0x230 [ 846.885536][T12522] __x64_sys_mkdir+0x5c/0x80 [ 846.890123][T12522] do_syscall_64+0xfd/0x6a0 [ 846.894629][T12522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 846.900516][T12522] RIP: 0033:0x458c97 [ 846.904407][T12522] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 846.924001][T12522] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 846.932403][T12522] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 846.940369][T12522] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 19:36:29 executing program 1: 19:36:29 executing program 2: [ 846.948335][T12522] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 846.956300][T12522] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 846.964264][T12522] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:29 executing program 1: 19:36:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:32 executing program 2: 19:36:32 executing program 3 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:32 executing program 1: 19:36:32 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_create(0x0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:36:32 executing program 2: 19:36:32 executing program 1: 19:36:32 executing program 1: 19:36:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 849.616363][T12542] FAULT_INJECTION: forcing a failure. [ 849.616363][T12542] name failslab, interval 1, probability 0, space 0, times 0 [ 849.670616][T12542] CPU: 0 PID: 12542 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 849.678628][T12542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.688731][T12542] Call Trace: [ 849.692030][T12542] dump_stack+0x172/0x1f0 [ 849.696378][T12542] should_fail.cold+0xa/0x15 [ 849.701261][T12542] ? fault_create_debugfs_attr+0x180/0x180 [ 849.707343][T12542] ? generic_make_request+0x8d3/0xb50 [ 849.712738][T12542] __should_failslab+0x121/0x190 [ 849.712758][T12542] should_failslab+0x9/0x14 [ 849.722171][T12542] kmem_cache_alloc+0x47/0x710 [ 849.722192][T12542] ? ___might_sleep+0x163/0x280 [ 849.732216][T12542] ? mempool_alloc+0x380/0x380 [ 849.736998][T12542] mempool_alloc_slab+0x47/0x60 [ 849.741858][T12542] mempool_alloc+0x169/0x380 [ 849.746460][T12542] ? mempool_destroy+0x40/0x40 [ 849.751584][T12542] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 849.757748][T12542] ? guard_bio_eod+0x294/0x5a0 [ 849.762524][T12542] ? mark_held_locks+0xf0/0xf0 [ 849.767298][T12542] ? __unlock_page_memcg+0x53/0x100 [ 849.772511][T12542] bio_alloc_bioset+0x3b9/0x680 [ 849.777371][T12542] ? lock_acquire+0x190/0x410 [ 849.782050][T12542] ? task_css.constprop.0+0x120/0x120 [ 849.787863][T12542] ? bvec_alloc+0x2f0/0x2f0 [ 849.792376][T12542] submit_bh_wbc+0x1c5/0x900 [ 849.796977][T12542] __sync_dirty_buffer+0x12b/0x350 [ 849.802097][T12542] sync_dirty_buffer+0x1b/0x20 [ 849.806867][T12542] __ext4_handle_dirty_metadata+0x241/0x600 [ 849.812774][T12542] ext4_handle_dirty_dirblock+0x3ae/0x4c0 [ 849.818501][T12542] ? ext4_rename_dir_prepare+0x470/0x470 [ 849.824134][T12542] ? memcpy+0x46/0x50 [ 849.828122][T12542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 849.834360][T12542] ? ext4_init_dot_dotdot+0x39c/0x520 [ 849.839730][T12542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 849.845968][T12542] ext4_mkdir+0x6e0/0xe20 [ 849.850300][T12542] ? ext4_init_dot_dotdot+0x520/0x520 [ 849.855675][T12542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 849.861911][T12542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 849.868170][T12542] ? security_inode_permission+0xcb/0x100 [ 849.873889][T12542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 849.880130][T12542] ? security_inode_mkdir+0xe4/0x120 [ 849.885422][T12542] vfs_mkdir+0x42e/0x670 [ 849.889663][T12542] do_mkdirat+0x234/0x2a0 [ 849.893990][T12542] ? __ia32_sys_mknod+0xb0/0xb0 [ 849.898941][T12542] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 849.905007][T12542] ? trace_hardirqs_off_caller+0x65/0x230 [ 849.910720][T12542] __x64_sys_mkdir+0x5c/0x80 [ 849.915312][T12542] do_syscall_64+0xfd/0x6a0 [ 849.919815][T12542] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 849.925702][T12542] RIP: 0033:0x458c97 [ 849.929596][T12542] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 849.949193][T12542] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 849.957603][T12542] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 19:36:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:32 executing program 2: [ 849.965590][T12542] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 849.973559][T12542] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 849.981533][T12542] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 849.989499][T12542] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:35 executing program 1: 19:36:35 executing program 2: 19:36:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x18cd0a, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:35 executing program 3 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:35 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_create(0x0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:36:35 executing program 2: [ 852.707364][T12568] FAULT_INJECTION: forcing a failure. [ 852.707364][T12568] name failslab, interval 1, probability 0, space 0, times 0 [ 852.738772][T12568] CPU: 0 PID: 12568 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 852.746792][T12568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 852.756850][T12568] Call Trace: [ 852.760148][T12568] dump_stack+0x172/0x1f0 [ 852.764485][T12568] should_fail.cold+0xa/0x15 [ 852.764503][T12568] ? fault_create_debugfs_attr+0x180/0x180 [ 852.764519][T12568] ? ___might_sleep+0x163/0x280 [ 852.764538][T12568] __should_failslab+0x121/0x190 [ 852.774907][T12568] should_failslab+0x9/0x14 [ 852.774919][T12568] __kmalloc+0x2e0/0x770 [ 852.774931][T12568] ? save_stack+0x5c/0x90 [ 852.774941][T12568] ? save_stack+0x23/0x90 [ 852.774953][T12568] ? tomoyo_encode2.part.0+0xf5/0x400 [ 852.774964][T12568] tomoyo_encode2.part.0+0xf5/0x400 [ 852.774976][T12568] ? do_syscall_64+0xfd/0x6a0 [ 852.774991][T12568] tomoyo_encode+0x2b/0x50 [ 852.822042][T12568] tomoyo_mount_acl+0xe0/0x840 [ 852.826818][T12568] ? __kasan_check_read+0x11/0x20 [ 852.831843][T12568] ? __kasan_check_write+0x14/0x20 [ 852.836954][T12568] ? lock_downgrade+0x920/0x920 [ 852.841800][T12568] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 852.847342][T12568] ? debug_check_no_obj_freed+0xc0/0x43f [ 852.852973][T12568] ? trace_hardirqs_off+0x62/0x240 [ 852.858091][T12568] ? lock_acquire+0x190/0x410 [ 852.862762][T12568] ? tomoyo_mount_permission+0x10a/0x410 [ 852.868400][T12568] tomoyo_mount_permission+0x16a/0x410 [ 852.873855][T12568] ? tomoyo_mount_permission+0x10a/0x410 [ 852.879481][T12568] ? tomoyo_mount_acl+0x840/0x840 [ 852.884503][T12568] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 852.890747][T12568] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 852.896991][T12568] ? strncpy_from_user+0x2b4/0x400 [ 852.902098][T12568] tomoyo_sb_mount+0x35/0x40 [ 852.906695][T12568] security_sb_mount+0x87/0xd0 [ 852.911469][T12568] do_mount+0x1d4/0x1c30 [ 852.915719][T12568] ? kasan_kmalloc+0x9/0x10 [ 852.920231][T12568] ? copy_mount_string+0x40/0x40 [ 852.925183][T12568] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 852.931440][T12568] ? _copy_from_user+0x12c/0x1a0 [ 852.936383][T12568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 852.942626][T12568] ? copy_mount_options+0x2e8/0x3f0 [ 852.947829][T12568] ksys_mount+0xdb/0x150 [ 852.952072][T12568] __x64_sys_mount+0xbe/0x150 [ 852.956753][T12568] do_syscall_64+0xfd/0x6a0 [ 852.961264][T12568] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 852.967152][T12568] RIP: 0033:0x45c2ca [ 852.971053][T12568] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 852.990660][T12568] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 852.999076][T12568] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca 19:36:35 executing program 1: 19:36:35 executing program 2: 19:36:35 executing program 2: 19:36:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = gettid() ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000002c00) 19:36:35 executing program 1: [ 853.007053][T12568] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 853.015034][T12568] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 853.023017][T12568] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 853.030991][T12568] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:35 executing program 2: 19:36:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = gettid() ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000002c00) 19:36:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff1f, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:35 executing program 1: 19:36:35 executing program 3 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 853.254750][T12592] FAULT_INJECTION: forcing a failure. [ 853.254750][T12592] name failslab, interval 1, probability 0, space 0, times 0 [ 853.294513][T12592] CPU: 1 PID: 12592 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 853.302538][T12592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.312592][T12592] Call Trace: [ 853.315887][T12592] dump_stack+0x172/0x1f0 [ 853.320222][T12592] should_fail.cold+0xa/0x15 [ 853.324985][T12592] ? fault_create_debugfs_attr+0x180/0x180 [ 853.330793][T12592] ? generic_make_request+0x8d3/0xb50 [ 853.336253][T12592] __should_failslab+0x121/0x190 [ 853.341192][T12592] should_failslab+0x9/0x14 [ 853.345691][T12592] kmem_cache_alloc+0x47/0x710 [ 853.350482][T12592] ? ___might_sleep+0x163/0x280 [ 853.355417][T12592] ? mempool_alloc+0x380/0x380 [ 853.360176][T12592] mempool_alloc_slab+0x47/0x60 [ 853.365026][T12592] mempool_alloc+0x169/0x380 [ 853.369617][T12592] ? mempool_destroy+0x40/0x40 [ 853.374377][T12592] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 853.380096][T12592] ? guard_bio_eod+0x294/0x5a0 [ 853.384866][T12592] ? mark_held_locks+0xf0/0xf0 [ 853.389642][T12592] ? __unlock_page_memcg+0x53/0x100 [ 853.394845][T12592] bio_alloc_bioset+0x3b9/0x680 [ 853.399694][T12592] ? lock_acquire+0x190/0x410 [ 853.404373][T12592] ? task_css.constprop.0+0x120/0x120 [ 853.409751][T12592] ? bvec_alloc+0x2f0/0x2f0 [ 853.414260][T12592] submit_bh_wbc+0x1c5/0x900 [ 853.418850][T12592] __sync_dirty_buffer+0x12b/0x350 [ 853.423958][T12592] sync_dirty_buffer+0x1b/0x20 [ 853.428744][T12592] __ext4_handle_dirty_metadata+0x241/0x600 [ 853.434644][T12592] ext4_handle_dirty_dirblock+0x3ae/0x4c0 [ 853.440360][T12592] ? ext4_rename_dir_prepare+0x470/0x470 [ 853.445992][T12592] ? memcpy+0x46/0x50 [ 853.449983][T12592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 853.456218][T12592] ? ext4_init_dot_dotdot+0x39c/0x520 [ 853.461593][T12592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 853.467918][T12592] ext4_mkdir+0x6e0/0xe20 [ 853.472249][T12592] ? ext4_init_dot_dotdot+0x520/0x520 [ 853.477620][T12592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 853.483853][T12592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 853.490095][T12592] ? security_inode_permission+0xcb/0x100 [ 853.495815][T12592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 853.502048][T12592] ? security_inode_mkdir+0xe4/0x120 [ 853.507335][T12592] vfs_mkdir+0x42e/0x670 [ 853.511574][T12592] do_mkdirat+0x234/0x2a0 [ 853.515902][T12592] ? __ia32_sys_mknod+0xb0/0xb0 [ 853.520753][T12592] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 853.526845][T12592] ? trace_hardirqs_off_caller+0x65/0x230 [ 853.532563][T12592] __x64_sys_mkdir+0x5c/0x80 [ 853.537152][T12592] do_syscall_64+0xfd/0x6a0 [ 853.541656][T12592] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 853.549093][T12592] RIP: 0033:0x458c97 [ 853.552991][T12592] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 853.572589][T12592] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 853.580996][T12592] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 853.588959][T12592] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 853.596922][T12592] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 853.604890][T12592] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 853.612854][T12592] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:38 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_create(0x0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:36:38 executing program 2: 19:36:38 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = gettid() ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000002c00) 19:36:38 executing program 1: 19:36:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:38 executing program 3 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:38 executing program 1: [ 855.768163][T12599] FAULT_INJECTION: forcing a failure. [ 855.768163][T12599] name failslab, interval 1, probability 0, space 0, times 0 [ 855.796056][T12599] CPU: 1 PID: 12599 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 855.804083][T12599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 855.814146][T12599] Call Trace: [ 855.817454][T12599] dump_stack+0x172/0x1f0 [ 855.821796][T12599] should_fail.cold+0xa/0x15 [ 855.826398][T12599] ? fault_create_debugfs_attr+0x180/0x180 [ 855.832223][T12599] ? page_to_nid.part.0+0x20/0x20 [ 855.837258][T12599] ? ___might_sleep+0x163/0x280 [ 855.842114][T12599] __should_failslab+0x121/0x190 [ 855.847056][T12599] should_failslab+0x9/0x14 [ 855.853302][T12599] __kmalloc_track_caller+0x2dc/0x760 [ 855.858677][T12599] ? setup_sigcontext+0x7d0/0x7d0 [ 855.863703][T12599] ? __bad_area_nosemaphore+0xb3/0x420 [ 855.869158][T12599] ? strndup_user+0x77/0xd0 [ 855.873663][T12599] memdup_user+0x26/0xb0 [ 855.877903][T12599] strndup_user+0x77/0xd0 [ 855.882233][T12599] ksys_mount+0x3c/0x150 [ 855.886480][T12599] __x64_sys_mount+0xbe/0x150 [ 855.891163][T12599] do_syscall_64+0xfd/0x6a0 [ 855.895670][T12599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 855.901557][T12599] RIP: 0033:0x45c2ca [ 855.905455][T12599] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 855.925052][T12599] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 855.933462][T12599] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 855.941458][T12599] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 855.949425][T12599] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 855.957394][T12599] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 19:36:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:38 executing program 2: 19:36:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4365cc0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 855.965361][T12599] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:38 executing program 2: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x1, 0x2e}, 0x0, 0x0) 19:36:38 executing program 3 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 856.118625][T12614] ptrace attach of "/root/syz-executor.4"[12613] was attempted by "/root/syz-executor.4"[12614] [ 856.178995][T12622] FAULT_INJECTION: forcing a failure. [ 856.178995][T12622] name failslab, interval 1, probability 0, space 0, times 0 [ 856.199978][T12622] CPU: 1 PID: 12622 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 856.208023][T12622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 856.218088][T12622] Call Trace: [ 856.221388][T12622] dump_stack+0x172/0x1f0 [ 856.225727][T12622] should_fail.cold+0xa/0x15 [ 856.230322][T12622] ? do_syscall_64+0xfd/0x6a0 [ 856.235006][T12622] ? fault_create_debugfs_attr+0x180/0x180 [ 856.240817][T12622] ? page_to_nid.part.0+0x20/0x20 [ 856.245838][T12622] ? ___might_sleep+0x163/0x280 [ 856.250695][T12622] __should_failslab+0x121/0x190 [ 856.255637][T12622] should_failslab+0x9/0x14 [ 856.260140][T12622] kmem_cache_alloc+0x2aa/0x710 [ 856.264994][T12622] ? __kasan_check_write+0x14/0x20 [ 856.270108][T12622] getname_flags+0xd6/0x5b0 [ 856.274616][T12622] user_path_at_empty+0x2f/0x50 [ 856.279555][T12622] do_mount+0x150/0x1c30 [ 856.283795][T12622] ? kasan_kmalloc+0x9/0x10 [ 856.288296][T12622] ? copy_mount_string+0x40/0x40 [ 856.293236][T12622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 856.299481][T12622] ? copy_mount_options+0x2e8/0x3f0 [ 856.304679][T12622] ksys_mount+0xdb/0x150 [ 856.308924][T12622] __x64_sys_mount+0xbe/0x150 [ 856.313601][T12622] do_syscall_64+0xfd/0x6a0 [ 856.318112][T12622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 856.323999][T12622] RIP: 0033:0x45c2ca [ 856.327892][T12622] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 856.347927][T12622] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 856.356362][T12622] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 856.364332][T12622] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 856.372302][T12622] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 856.381233][T12622] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 856.389502][T12622] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:41 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:36:41 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, &(0x7f00000001c0)=0x20) 19:36:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:41 executing program 2: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000100), 0x0) 19:36:41 executing program 3 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0300000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:41 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000300)={&(0x7f0000a57000/0x9000)=nil, &(0x7f00008ec000/0x1000)=nil, 0x9000}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x800000}, 0x200000}) [ 858.939129][T12790] FAULT_INJECTION: forcing a failure. [ 858.939129][T12790] name failslab, interval 1, probability 0, space 0, times 0 [ 858.978470][T12790] CPU: 1 PID: 12790 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 858.986488][T12790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 858.996651][T12790] Call Trace: [ 858.999949][T12790] dump_stack+0x172/0x1f0 [ 859.004296][T12790] should_fail.cold+0xa/0x15 [ 859.008892][T12790] ? fault_create_debugfs_attr+0x180/0x180 [ 859.014700][T12790] ? page_to_nid.part.0+0x20/0x20 [ 859.019814][T12790] ? ___might_sleep+0x163/0x280 [ 859.024671][T12790] __should_failslab+0x121/0x190 [ 859.029612][T12790] should_failslab+0x9/0x14 [ 859.034122][T12790] __kmalloc_track_caller+0x2dc/0x760 [ 859.039499][T12790] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 859.045781][T12790] ? strndup_user+0x77/0xd0 [ 859.050281][T12790] memdup_user+0x26/0xb0 [ 859.054525][T12790] strndup_user+0x77/0xd0 [ 859.058860][T12790] ksys_mount+0x7b/0x150 [ 859.063106][T12790] __x64_sys_mount+0xbe/0x150 [ 859.067791][T12790] do_syscall_64+0xfd/0x6a0 [ 859.072298][T12790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 859.078197][T12790] RIP: 0033:0x45c2ca [ 859.082099][T12790] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 859.102162][T12790] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 859.110597][T12790] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 859.118575][T12790] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 859.126630][T12790] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 19:36:41 executing program 1: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 19:36:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 859.134624][T12790] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 859.142603][T12790] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:41 executing program 3 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0400000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 859.346439][T12956] FAULT_INJECTION: forcing a failure. [ 859.346439][T12956] name failslab, interval 1, probability 0, space 0, times 0 [ 859.363569][T12959] ptrace attach of "/root/syz-executor.4"[12957] was attempted by "/root/syz-executor.4"[12959] [ 859.380007][T12956] CPU: 1 PID: 12956 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 859.388047][T12956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 859.398108][T12956] Call Trace: [ 859.401412][T12956] dump_stack+0x172/0x1f0 [ 859.405750][T12956] should_fail.cold+0xa/0x15 [ 859.410347][T12956] ? fault_create_debugfs_attr+0x180/0x180 [ 859.416157][T12956] ? page_to_nid.part.0+0x20/0x20 [ 859.421185][T12956] ? ___might_sleep+0x163/0x280 [ 859.426045][T12956] __should_failslab+0x121/0x190 [ 859.430985][T12956] should_failslab+0x9/0x14 [ 859.435488][T12956] kmem_cache_alloc_trace+0x2d3/0x790 [ 859.440863][T12956] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 859.447098][T12956] ? _copy_from_user+0x12c/0x1a0 [ 859.452040][T12956] copy_mount_options+0x5c/0x3f0 [ 859.457328][T12956] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 859.463567][T12956] ksys_mount+0xa7/0x150 [ 859.467832][T12956] __x64_sys_mount+0xbe/0x150 [ 859.472513][T12956] do_syscall_64+0xfd/0x6a0 [ 859.477026][T12956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 859.482922][T12956] RIP: 0033:0x45c2ca [ 859.486817][T12956] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 859.506422][T12956] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 859.514840][T12956] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 859.522907][T12956] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 859.530880][T12956] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 859.538845][T12956] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 859.547895][T12956] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:42 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:36:42 executing program 1: r0 = userfaultfd(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x80000004}) epoll_pwait(r1, &(0x7f0000000300)=[{}], 0x1, 0x0, 0x0, 0x0) 19:36:42 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x0, 0x4480) recvfrom$inet6(r0, &(0x7f0000000100)=""/189, 0xbd, 0x40, &(0x7f00000002c0)={0xa, 0x4e21, 0x0, @rand_addr="5cfc16ae161b97e3661ec1f8e6182a46", 0x2}, 0x1c) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000000440)) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x101ff, 0x0, 0x6000, 0x2000, &(0x7f000000b000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 19:36:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0500000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:42 executing program 3 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 859.811068][T12969] FAULT_INJECTION: forcing a failure. [ 859.811068][T12969] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 859.824394][T12969] CPU: 0 PID: 12969 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 859.832374][T12969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 859.843154][T12969] Call Trace: [ 859.846469][T12969] dump_stack+0x172/0x1f0 [ 859.850825][T12969] should_fail.cold+0xa/0x15 [ 859.855423][T12969] ? do_syscall_64+0xfd/0x6a0 [ 859.860108][T12969] ? fault_create_debugfs_attr+0x180/0x180 [ 859.865915][T12969] ? __kasan_check_read+0x11/0x20 [ 859.870949][T12969] should_fail_alloc_page+0x50/0x60 [ 859.876150][T12969] __alloc_pages_nodemask+0x1a1/0x900 [ 859.881526][T12969] ? __alloc_pages_slowpath+0x2520/0x2520 [ 859.887260][T12969] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 859.892907][T12969] ? __kasan_check_read+0x11/0x20 [ 859.897936][T12969] ? fault_create_debugfs_attr+0x180/0x180 [ 859.903919][T12969] cache_grow_begin+0x90/0xd20 [ 859.908690][T12969] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 859.915254][T12969] kmem_cache_alloc_trace+0x6b3/0x790 [ 859.921528][T12969] copy_mount_options+0x5c/0x3f0 [ 859.926464][T12969] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 859.932713][T12969] ksys_mount+0xa7/0x150 [ 859.936963][T12969] __x64_sys_mount+0xbe/0x150 [ 859.941659][T12969] do_syscall_64+0xfd/0x6a0 [ 859.946170][T12969] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 859.952057][T12969] RIP: 0033:0x45c2ca [ 859.955947][T12969] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 859.975560][T12969] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 859.983970][T12969] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 859.992126][T12969] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 860.000090][T12969] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 19:36:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0600000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:42 executing program 1: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x90) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0xffff) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x4e22, 0x4, @local, 0x1e}]}, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffb, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) [ 860.008060][T12969] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 860.016029][T12969] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_smack_transmute(0x0, &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x3) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, &(0x7f0000000380)) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000400)='ramfs\x00\x9b\x95\x84\x10D\xfb\x9b\x81R#\x10O\xd3\xb4\xe8\xa3\x1f\x00\r\xf6\xd9\xbbt\x95f\x9e\x02\x06\xf946\\{(\xc8\xa7s\xd2>\x81\x88l\x0e\xc5%\x99\x00\x02\x9d\x85\xfc\xa9\\\x99:\xe4\x9c\xf9z>w\xe7\xa9\xa8=\xe9o\x9f\xfbKE\xd7\x9a\x1b\xf8\x86@\x8e\xe6\x9em\x89\xab\x19\xea1\x8e\xa1\xb5\xd7\xc6\xc62\x05\xc7\xe5\xd2m\xeczV\x1d\x84\xcd\xc0\xdf', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') write$binfmt_script(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x224) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)=0x0) getpgrp(r1) symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000040)='../file0\x00', 0x2) link(&(0x7f00000002c0)='./file0/file0/../file0\x00', &(0x7f0000000340)='./file1\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:36:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0700000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:42 executing program 3 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:42 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:36:42 executing program 1: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x90) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0xffff) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x4e22, 0x4, @local, 0x1e}]}, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffb, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) [ 860.238731][T13124] FAULT_INJECTION: forcing a failure. [ 860.238731][T13124] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 860.251983][T13124] CPU: 1 PID: 13124 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 860.259962][T13124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 860.270049][T13124] Call Trace: [ 860.273349][T13124] dump_stack+0x172/0x1f0 [ 860.277699][T13124] should_fail.cold+0xa/0x15 [ 860.282295][T13124] ? fault_create_debugfs_attr+0x180/0x180 [ 860.288117][T13124] ? stack_trace_save+0xac/0xe0 [ 860.293236][T13124] ? stack_trace_consume_entry+0x190/0x190 [ 860.299056][T13124] should_fail_alloc_page+0x50/0x60 [ 860.304268][T13124] __alloc_pages_nodemask+0x1a1/0x900 [ 860.309646][T13124] ? __alloc_pages_slowpath+0x2520/0x2520 [ 860.315368][T13124] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 860.321000][T13124] ? __kasan_check_read+0x11/0x20 [ 860.326032][T13124] ? fault_create_debugfs_attr+0x180/0x180 [ 860.331853][T13124] cache_grow_begin+0x90/0xd20 [ 860.336619][T13124] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 860.342857][T13124] kmem_cache_alloc+0x64e/0x710 [ 860.347711][T13124] getname_flags+0xd6/0x5b0 [ 860.352218][T13124] user_path_at_empty+0x2f/0x50 [ 860.357066][T13124] do_mount+0x150/0x1c30 [ 860.361306][T13124] ? kasan_kmalloc+0x9/0x10 [ 860.365804][T13124] ? copy_mount_string+0x40/0x40 [ 860.370743][T13124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 860.377070][T13124] ? copy_mount_options+0x2e8/0x3f0 [ 860.382265][T13124] ksys_mount+0xdb/0x150 [ 860.386510][T13124] __x64_sys_mount+0xbe/0x150 [ 860.391185][T13124] do_syscall_64+0xfd/0x6a0 [ 860.395688][T13124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 860.401574][T13124] RIP: 0033:0x45c2ca [ 860.405470][T13124] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 860.426129][T13124] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 19:36:43 executing program 2: syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81805) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x0, 0x5010, 0x0) fstat(r0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) signalfd(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x8) 19:36:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0003000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 860.434539][T13124] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 860.442510][T13124] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 860.450478][T13124] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 860.458445][T13124] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 860.466410][T13124] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0005000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:45 executing program 3 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:45 executing program 2: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5565dc19de47bf070") close(0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) unlink(0x0) r1 = gettid() pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(r1, 0x9) 19:36:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0006000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:45 executing program 1: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x90) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0xffff) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x4e22, 0x4, @local, 0x1e}]}, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffb, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) [ 862.846418][T13312] FAULT_INJECTION: forcing a failure. [ 862.846418][T13312] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 862.859670][T13312] CPU: 1 PID: 13312 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 862.867652][T13312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 862.877712][T13312] Call Trace: [ 862.881019][T13312] dump_stack+0x172/0x1f0 [ 862.885353][T13312] should_fail.cold+0xa/0x15 [ 862.889960][T13312] ? fault_create_debugfs_attr+0x180/0x180 [ 862.895887][T13312] ? quarantine_put+0x11c/0x1c0 [ 862.900785][T13312] should_fail_alloc_page+0x50/0x60 [ 862.906161][T13312] __alloc_pages_nodemask+0x1a1/0x900 [ 862.911542][T13312] ? putname+0xef/0x130 [ 862.916094][T13312] ? __alloc_pages_slowpath+0x2520/0x2520 [ 862.921820][T13312] ? filename_lookup+0x294/0x410 [ 862.926765][T13312] ? fault_create_debugfs_attr+0x180/0x180 [ 862.932570][T13312] ? nd_jump_link+0x1d0/0x1d0 [ 862.937247][T13312] cache_grow_begin+0x90/0xd20 [ 862.942012][T13312] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 862.948249][T13312] __kmalloc+0x6b2/0x770 [ 862.952494][T13312] ? kmem_cache_alloc+0x314/0x710 [ 862.957518][T13312] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 862.963234][T13312] tomoyo_realpath_from_path+0xcd/0x7b0 [ 862.968779][T13312] tomoyo_mount_acl+0x2cc/0x840 [ 862.973625][T13312] ? __kasan_check_read+0x11/0x20 [ 862.978655][T13312] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 862.984194][T13312] ? debug_check_no_obj_freed+0xc0/0x43f [ 862.989826][T13312] ? trace_hardirqs_off+0x62/0x240 [ 862.994946][T13312] ? lock_acquire+0x190/0x410 [ 862.999625][T13312] ? tomoyo_mount_permission+0x10a/0x410 [ 863.005257][T13312] tomoyo_mount_permission+0x16a/0x410 [ 863.010715][T13312] ? tomoyo_mount_permission+0x10a/0x410 [ 863.016342][T13312] ? tomoyo_mount_acl+0x840/0x840 [ 863.021366][T13312] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 863.027616][T13312] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 863.033851][T13312] ? strncpy_from_user+0x2b4/0x400 [ 863.038965][T13312] tomoyo_sb_mount+0x35/0x40 [ 863.043558][T13312] security_sb_mount+0x87/0xd0 [ 863.048330][T13312] do_mount+0x1d4/0x1c30 [ 863.052569][T13312] ? retint_kernel+0x2b/0x2b [ 863.057163][T13312] ? copy_mount_string+0x40/0x40 [ 863.062100][T13312] ? copy_mount_options+0x252/0x3f0 [ 863.067295][T13312] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 863.072838][T13312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 863.079077][T13312] ? copy_mount_options+0x2e8/0x3f0 [ 863.084278][T13312] ksys_mount+0xdb/0x150 [ 863.088524][T13312] __x64_sys_mount+0xbe/0x150 [ 863.093200][T13312] do_syscall_64+0xfd/0x6a0 [ 863.097705][T13312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 863.103591][T13312] RIP: 0033:0x45c2ca [ 863.107486][T13312] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 863.127090][T13312] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 863.135497][T13312] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca 19:36:45 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000001100)={@broadcast, @random="a23f9f7f4497", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2f, 0x0, @remote={0xfe, 0x80, [0x900]}, @local, {[], @udp={0x0, 0x77d58864, 0x8}}}}}}, 0x0) 19:36:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0007000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 863.143496][T13312] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 863.151466][T13312] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 863.159433][T13312] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 863.167399][T13312] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:45 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:36:45 executing program 1: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x90) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0xffff) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x4e22, 0x4, @local, 0x1e}]}, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffb, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 19:36:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed003f000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:45 executing program 3 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x10001000008912, &(0x7f00000000c0)="fadba5095e0bcfe47bf070") r1 = socket$inet(0x10, 0x20000000000002, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000001c0007071dfffd946f610500070000001f00000000000400080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 863.395672][T13432] FAULT_INJECTION: forcing a failure. [ 863.395672][T13432] name failslab, interval 1, probability 0, space 0, times 0 [ 863.427822][T13438] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 863.430239][T13432] CPU: 1 PID: 13432 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 863.445039][T13432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 863.455135][T13432] Call Trace: [ 863.458431][T13432] dump_stack+0x172/0x1f0 [ 863.462775][T13432] should_fail.cold+0xa/0x15 [ 863.467371][T13432] ? debug_check_no_obj_freed+0xc0/0x43f [ 863.473010][T13432] ? fault_create_debugfs_attr+0x180/0x180 [ 863.478821][T13432] ? page_to_nid.part.0+0x20/0x20 [ 863.483863][T13432] ? ___might_sleep+0x163/0x280 [ 863.488724][T13432] __should_failslab+0x121/0x190 [ 863.493668][T13432] should_failslab+0x9/0x14 [ 863.498172][T13432] kmem_cache_alloc+0x2aa/0x710 [ 863.503031][T13432] ? __kasan_check_write+0x14/0x20 [ 863.508153][T13432] getname_kernel+0x53/0x370 [ 863.512753][T13432] kern_path+0x20/0x40 [ 863.516832][T13432] tomoyo_mount_acl+0x28c/0x840 [ 863.521693][T13432] ? __kasan_check_read+0x11/0x20 [ 863.526723][T13432] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 863.532268][T13432] ? debug_check_no_obj_freed+0xc0/0x43f [ 863.537988][T13432] ? trace_hardirqs_off+0x62/0x240 [ 863.543108][T13432] ? lock_acquire+0x190/0x410 [ 863.549293][T13432] ? tomoyo_mount_permission+0x10a/0x410 [ 863.554930][T13432] tomoyo_mount_permission+0x16a/0x410 [ 863.560385][T13432] ? tomoyo_mount_permission+0x10a/0x410 [ 863.566012][T13432] ? tomoyo_mount_acl+0x840/0x840 [ 863.571909][T13432] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 863.578153][T13432] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 863.584389][T13432] ? strncpy_from_user+0x2b4/0x400 [ 863.590024][T13432] tomoyo_sb_mount+0x35/0x40 [ 863.594621][T13432] security_sb_mount+0x87/0xd0 [ 863.599387][T13432] do_mount+0x1d4/0x1c30 [ 863.603631][T13432] ? kasan_kmalloc+0x9/0x10 [ 863.609176][T13432] ? copy_mount_string+0x40/0x40 [ 863.614116][T13432] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 863.620355][T13432] ? _copy_from_user+0x12c/0x1a0 [ 863.625293][T13432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 863.631704][T13432] ? copy_mount_options+0x2e8/0x3f0 [ 863.636905][T13432] ksys_mount+0xdb/0x150 [ 863.641236][T13432] __x64_sys_mount+0xbe/0x150 [ 863.645922][T13432] do_syscall_64+0xfd/0x6a0 [ 863.650425][T13432] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 863.656335][T13432] RIP: 0033:0x45c2ca [ 863.660227][T13432] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 863.679831][T13432] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 863.688241][T13432] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 863.696206][T13432] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 863.704174][T13432] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 863.712168][T13432] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 863.720133][T13432] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:48 executing program 1: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x90) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0xffff) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x4e22, 0x4, @local, 0x1e}]}, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffb, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0xc0386106, &(0x7f0000000380)) 19:36:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) semop(0x0, &(0x7f0000000c80), 0x1c9) 19:36:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0040000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:48 executing program 3 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:48 executing program 1: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x90) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0xffff) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x4e22, 0x4, @local, 0x1e}]}, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffb, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0xc0386106, &(0x7f0000000380)) [ 865.942620][T13546] FAULT_INJECTION: forcing a failure. [ 865.942620][T13546] name failslab, interval 1, probability 0, space 0, times 0 [ 865.982071][T13546] CPU: 1 PID: 13546 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 865.990389][T13546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 865.990395][T13546] Call Trace: [ 865.990416][T13546] dump_stack+0x172/0x1f0 [ 865.990436][T13546] should_fail.cold+0xa/0x15 [ 865.990452][T13546] ? fault_create_debugfs_attr+0x180/0x180 [ 865.990473][T13546] ? ___might_sleep+0x163/0x280 [ 866.008180][T13546] __should_failslab+0x121/0x190 [ 866.008197][T13546] should_failslab+0x9/0x14 [ 866.008213][T13546] __kmalloc+0x2e0/0x770 [ 866.037397][T13546] ? save_stack+0x5c/0x90 [ 866.041740][T13546] ? save_stack+0x23/0x90 [ 866.046443][T13546] ? tomoyo_encode2.part.0+0xf5/0x400 [ 866.051830][T13546] tomoyo_encode2.part.0+0xf5/0x400 [ 866.057041][T13546] ? do_syscall_64+0xfd/0x6a0 [ 866.061728][T13546] tomoyo_encode+0x2b/0x50 [ 866.066168][T13546] tomoyo_mount_acl+0xe0/0x840 [ 866.070944][T13546] ? __kasan_check_read+0x11/0x20 [ 866.075978][T13546] ? __kasan_check_write+0x14/0x20 [ 866.081100][T13546] ? lock_downgrade+0x920/0x920 [ 866.085956][T13546] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 866.091512][T13546] ? debug_check_no_obj_freed+0xc0/0x43f [ 866.097154][T13546] ? trace_hardirqs_off+0x62/0x240 [ 866.102283][T13546] ? lock_acquire+0x190/0x410 [ 866.107149][T13546] ? tomoyo_mount_permission+0x10a/0x410 [ 866.112795][T13546] tomoyo_mount_permission+0x16a/0x410 [ 866.118332][T13546] ? tomoyo_mount_permission+0x10a/0x410 [ 866.124070][T13546] ? tomoyo_mount_acl+0x840/0x840 [ 866.129133][T13546] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 866.135393][T13546] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 866.141649][T13546] ? strncpy_from_user+0x2b4/0x400 [ 866.146858][T13546] tomoyo_sb_mount+0x35/0x40 [ 866.151460][T13546] security_sb_mount+0x87/0xd0 [ 866.156349][T13546] do_mount+0x1d4/0x1c30 [ 866.160629][T13546] ? kasan_kmalloc+0x9/0x10 [ 866.165144][T13546] ? copy_mount_string+0x40/0x40 [ 866.170282][T13546] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 866.176532][T13546] ? copy_mount_options+0x2e8/0x3f0 [ 866.181743][T13546] ksys_mount+0xdb/0x150 [ 866.186138][T13546] __x64_sys_mount+0xbe/0x150 [ 866.190833][T13546] do_syscall_64+0xfd/0x6a0 [ 866.195355][T13546] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 866.201249][T13546] RIP: 0033:0x45c2ca [ 866.205155][T13546] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 866.224768][T13546] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 866.233198][T13546] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca 19:36:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000020000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 866.241258][T13546] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 866.249248][T13546] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 866.259399][T13546] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 866.267553][T13546] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:48 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:36:48 executing program 3 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:48 executing program 1: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x90) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0xffff) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x4e22, 0x4, @local, 0x1e}]}, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffb, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0xc0386106, &(0x7f0000000380)) 19:36:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000100000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 866.467523][T13562] FAULT_INJECTION: forcing a failure. [ 866.467523][T13562] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 866.480940][T13562] CPU: 0 PID: 13562 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 866.489286][T13562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 866.499443][T13562] Call Trace: [ 866.502752][T13562] dump_stack+0x172/0x1f0 [ 866.507206][T13562] should_fail.cold+0xa/0x15 [ 866.511941][T13562] ? __kmalloc+0x163/0x770 [ 866.516403][T13562] ? fault_create_debugfs_attr+0x180/0x180 [ 866.522309][T13562] ? do_mount+0x1d4/0x1c30 [ 866.526825][T13562] ? ksys_mount+0xdb/0x150 [ 866.531342][T13562] ? __x64_sys_mount+0xbe/0x150 [ 866.536417][T13562] ? do_syscall_64+0xfd/0x6a0 [ 866.541106][T13562] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 866.547974][T13562] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 866.555433][T13562] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 866.560915][T13562] should_fail_alloc_page+0x50/0x60 [ 866.566174][T13562] __alloc_pages_nodemask+0x1a1/0x900 [ 866.571557][T13562] ? kernel_text_address+0x73/0xf0 [ 866.576763][T13562] ? __alloc_pages_slowpath+0x2520/0x2520 [ 866.582492][T13562] ? unwind_get_return_address+0x61/0xa0 [ 866.588134][T13562] ? profile_setup.cold+0xbb/0xbb [ 866.593170][T13562] ? should_fail+0x1de/0x852 [ 866.597779][T13562] ? fault_create_debugfs_attr+0x180/0x180 [ 866.603682][T13562] cache_grow_begin+0x90/0xd20 [ 866.608462][T13562] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 866.614715][T13562] __kmalloc+0x6b2/0x770 [ 866.619261][T13562] ? kasan_kmalloc+0x9/0x10 [ 866.623776][T13562] ? __kmalloc+0x351/0x770 [ 866.628298][T13562] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 866.634298][T13562] tomoyo_realpath_from_path+0xcd/0x7b0 [ 866.639855][T13562] tomoyo_mount_acl+0x149/0x840 [ 866.644720][T13562] ? __kasan_check_read+0x11/0x20 [ 866.649860][T13562] ? __kasan_check_write+0x14/0x20 [ 866.654978][T13562] ? lock_downgrade+0x920/0x920 [ 866.659836][T13562] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 866.665614][T13562] ? debug_check_no_obj_freed+0xc0/0x43f [ 866.671451][T13562] ? trace_hardirqs_off+0x62/0x240 [ 866.676586][T13562] ? lock_acquire+0x190/0x410 [ 866.681366][T13562] ? tomoyo_mount_permission+0x10a/0x410 [ 866.687030][T13562] tomoyo_mount_permission+0x16a/0x410 [ 866.693020][T13562] ? tomoyo_mount_permission+0x10a/0x410 [ 866.698660][T13562] ? tomoyo_mount_acl+0x840/0x840 [ 866.703834][T13562] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 866.710268][T13562] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 866.716548][T13562] ? strncpy_from_user+0x2b4/0x400 [ 866.721756][T13562] tomoyo_sb_mount+0x35/0x40 [ 866.726369][T13562] security_sb_mount+0x87/0xd0 [ 866.731146][T13562] do_mount+0x1d4/0x1c30 [ 866.735511][T13562] ? retint_kernel+0x2b/0x2b [ 866.740101][T13562] ? copy_mount_string+0x40/0x40 [ 866.745126][T13562] ? copy_mount_options+0x241/0x3f0 [ 866.750540][T13562] ? __sanitizer_cov_trace_pc+0x4/0x50 [ 866.755990][T13562] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 866.762305][T13562] ? copy_mount_options+0x2e8/0x3f0 [ 866.767494][T13562] ksys_mount+0xdb/0x150 [ 866.771728][T13562] __x64_sys_mount+0xbe/0x150 [ 866.776396][T13562] do_syscall_64+0xfd/0x6a0 [ 866.780984][T13562] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 866.786870][T13562] RIP: 0033:0x45c2ca [ 866.790760][T13562] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 19:36:49 executing program 1: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x90) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0xffff) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x4e22, 0x4, @local, 0x1e}]}, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffb, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) [ 866.810947][T13562] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 866.819392][T13562] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 866.827963][T13562] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 866.835928][T13562] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 866.844022][T13562] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 866.852336][T13562] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000200000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:49 executing program 2: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) inotify_add_watch(r0, &(0x7f0000001340)='./file0\x00', 0x4000000) recvmsg$kcm(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)=""/101, 0x65}, {&(0x7f0000000280)=""/91, 0x5}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x3}, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000001480)={0x1, @pix_mp={0x2, 0x6000000, 0x0, 0x6, 0x999335773c941b9d, [{0x1, 0x1ff}, {0x0, 0x100}, {0x4, 0x1}, {0x3, 0x101}, {0x100000000, 0x40}, {0x9, 0x8}, {0x1, 0x3}, {0x5, 0x5}], 0x7fffffff, 0x7, 0x1, 0x1, 0x6}}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) 19:36:49 executing program 3 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000300000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 867.045338][T13683] FAULT_INJECTION: forcing a failure. [ 867.045338][T13683] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 867.058882][T13683] CPU: 0 PID: 13683 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 867.067091][T13683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 867.077374][T13683] Call Trace: [ 867.080684][T13683] dump_stack+0x172/0x1f0 [ 867.085044][T13683] should_fail.cold+0xa/0x15 [ 867.089761][T13683] ? __kmalloc+0x163/0x770 [ 867.094203][T13683] ? fault_create_debugfs_attr+0x180/0x180 [ 867.100020][T13683] ? do_mount+0x1d4/0x1c30 [ 867.104449][T13683] ? ksys_mount+0xdb/0x150 [ 867.108873][T13683] ? __x64_sys_mount+0xbe/0x150 [ 867.113732][T13683] ? do_syscall_64+0xfd/0x6a0 [ 867.118419][T13683] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 867.124668][T13683] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 867.130524][T13683] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 867.136512][T13683] should_fail_alloc_page+0x50/0x60 [ 867.141719][T13683] __alloc_pages_nodemask+0x1a1/0x900 [ 867.147261][T13683] ? kernel_text_address+0x73/0xf0 [ 867.152392][T13683] ? __alloc_pages_slowpath+0x2520/0x2520 [ 867.158213][T13683] ? unwind_get_return_address+0x61/0xa0 [ 867.163997][T13683] ? profile_setup.cold+0xbb/0xbb [ 867.169061][T13683] ? should_fail+0x1de/0x852 [ 867.173758][T13683] ? fault_create_debugfs_attr+0x180/0x180 [ 867.179576][T13683] cache_grow_begin+0x90/0xd20 [ 867.184357][T13683] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 867.190719][T13683] __kmalloc+0x6b2/0x770 [ 867.195058][T13683] ? kasan_kmalloc+0x9/0x10 [ 867.199569][T13683] ? __kmalloc+0x351/0x770 [ 867.203996][T13683] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 867.209733][T13683] tomoyo_realpath_from_path+0xcd/0x7b0 [ 867.215307][T13683] tomoyo_mount_acl+0x149/0x840 [ 867.220262][T13683] ? __kasan_check_read+0x11/0x20 [ 867.225389][T13683] ? __kasan_check_write+0x14/0x20 [ 867.230522][T13683] ? lock_downgrade+0x920/0x920 [ 867.235383][T13683] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 867.241067][T13683] ? debug_check_no_obj_freed+0xc0/0x43f [ 867.246711][T13683] ? trace_hardirqs_off+0x62/0x240 [ 867.252012][T13683] ? lock_acquire+0x190/0x410 [ 867.256928][T13683] ? tomoyo_mount_permission+0x10a/0x410 [ 867.262830][T13683] tomoyo_mount_permission+0x16a/0x410 [ 867.268299][T13683] ? tomoyo_mount_permission+0x10a/0x410 [ 867.274023][T13683] ? tomoyo_mount_acl+0x840/0x840 [ 867.279042][T13683] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 867.285279][T13683] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 867.291519][T13683] ? strncpy_from_user+0x2b4/0x400 [ 867.296658][T13683] tomoyo_sb_mount+0x35/0x40 [ 867.301241][T13683] security_sb_mount+0x87/0xd0 [ 867.306089][T13683] do_mount+0x1d4/0x1c30 [ 867.310327][T13683] ? kasan_kmalloc+0x9/0x10 [ 867.314867][T13683] ? copy_mount_string+0x40/0x40 [ 867.319800][T13683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 867.326051][T13683] ? copy_mount_options+0x2e8/0x3f0 [ 867.331244][T13683] ksys_mount+0xdb/0x150 [ 867.335478][T13683] __x64_sys_mount+0xbe/0x150 [ 867.340143][T13683] do_syscall_64+0xfd/0x6a0 [ 867.344639][T13683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 867.350575][T13683] RIP: 0033:0x45c2ca [ 867.354594][T13683] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 867.374580][T13683] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 867.384650][T13683] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca 19:36:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x10001000008912, &(0x7f00000000c0)="fadba5095e0bcfe47bf070") r1 = socket$inet(0x10, 0x20000000000002, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000001e0007071dfffd946f610500070000001f00000000000400080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) 19:36:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000400000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 867.392622][T13683] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 867.400629][T13683] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 867.408864][T13683] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 867.416963][T13683] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:50 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(0x0, 0x1000000000013) 19:36:50 executing program 1: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x90) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0xffff) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x4e22, 0x4, @local, 0x1e}]}, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffb, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) [ 867.514050][T13791] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 19:36:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:51 executing program 3 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000500000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:51 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0x30}], 0x100000000000011f) 19:36:51 executing program 1: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x90) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0xffff) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x4e22, 0x4, @local, 0x1e}]}, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 19:36:51 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(0x0, 0x1000000000013) 19:36:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000600000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 869.537950][T13907] FAULT_INJECTION: forcing a failure. [ 869.537950][T13907] name failslab, interval 1, probability 0, space 0, times 0 [ 869.562425][T13907] CPU: 0 PID: 13907 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 869.570569][T13907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.570575][T13907] Call Trace: [ 869.570593][T13907] dump_stack+0x172/0x1f0 [ 869.570612][T13907] should_fail.cold+0xa/0x15 [ 869.570632][T13907] ? fault_create_debugfs_attr+0x180/0x180 [ 869.593486][T13907] ? nd_jump_link+0x1d0/0x1d0 [ 869.593504][T13907] ? ___might_sleep+0x163/0x280 [ 869.593521][T13907] __should_failslab+0x121/0x190 [ 869.593537][T13907] should_failslab+0x9/0x14 [ 869.593549][T13907] __kmalloc+0x2e0/0x770 [ 869.593562][T13907] ? kmem_cache_alloc+0x314/0x710 [ 869.593581][T13907] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 869.633832][T13907] tomoyo_realpath_from_path+0xcd/0x7b0 [ 869.635368][T13915] ptrace attach of "/root/syz-executor.4"[13914] was attempted by "/root/syz-executor.4"[13915] [ 869.639523][T13907] tomoyo_mount_acl+0x2cc/0x840 [ 869.639538][T13907] ? __kasan_check_read+0x11/0x20 [ 869.639553][T13907] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 869.639570][T13907] ? debug_check_no_obj_freed+0xc0/0x43f [ 869.671146][T13907] ? trace_hardirqs_off+0x62/0x240 [ 869.676292][T13907] ? lock_acquire+0x190/0x410 [ 869.680979][T13907] ? tomoyo_mount_permission+0x10a/0x410 [ 869.686628][T13907] tomoyo_mount_permission+0x16a/0x410 [ 869.693037][T13907] ? tomoyo_mount_permission+0x10a/0x410 [ 869.700405][T13907] ? tomoyo_mount_acl+0x840/0x840 [ 869.705593][T13907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 869.712291][T13907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 869.718627][T13907] ? strncpy_from_user+0x2b4/0x400 [ 869.723857][T13907] tomoyo_sb_mount+0x35/0x40 [ 869.728683][T13907] security_sb_mount+0x87/0xd0 [ 869.733458][T13907] do_mount+0x1d4/0x1c30 [ 869.737711][T13907] ? kasan_kmalloc+0x9/0x10 [ 869.742233][T13907] ? copy_mount_string+0x40/0x40 [ 869.747912][T13907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 869.754159][T13907] ? copy_mount_options+0x2e8/0x3f0 [ 869.759366][T13907] ksys_mount+0xdb/0x150 [ 869.763711][T13907] __x64_sys_mount+0xbe/0x150 [ 869.768398][T13907] do_syscall_64+0xfd/0x6a0 [ 869.773043][T13907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 869.778936][T13907] RIP: 0033:0x45c2ca [ 869.783098][T13907] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 869.802928][T13907] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 869.811478][T13907] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 869.819454][T13907] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 869.827448][T13907] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 19:36:52 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0x30}], 0x1000000000000129) 19:36:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 869.835522][T13907] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 869.843500][T13907] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 869.860268][T13907] ERROR: Out of memory at tomoyo_realpath_from_path. 19:36:52 executing program 2: 19:36:52 executing program 3 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000700000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:52 executing program 1: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x90) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0xffff) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 19:36:52 executing program 2: [ 870.038857][T13932] FAULT_INJECTION: forcing a failure. [ 870.038857][T13932] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 870.052353][T13932] CPU: 0 PID: 13932 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 870.060341][T13932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.070410][T13932] Call Trace: [ 870.073831][T13932] dump_stack+0x172/0x1f0 [ 870.078317][T13932] should_fail.cold+0xa/0x15 [ 870.082921][T13932] ? fault_create_debugfs_attr+0x180/0x180 [ 870.088743][T13932] ? tomoyo_mount_acl+0x149/0x840 [ 870.093864][T13932] ? tomoyo_mount_permission+0x16a/0x410 [ 870.099624][T13932] ? tomoyo_sb_mount+0x35/0x40 [ 870.104398][T13932] ? security_sb_mount+0x87/0xd0 [ 870.109344][T13932] ? do_mount+0x1d4/0x1c30 [ 870.113772][T13932] ? ksys_mount+0xdb/0x150 [ 870.118199][T13932] ? __x64_sys_mount+0xbe/0x150 [ 870.123055][T13932] ? do_syscall_64+0xfd/0x6a0 [ 870.127749][T13932] should_fail_alloc_page+0x50/0x60 [ 870.132957][T13932] __alloc_pages_nodemask+0x1a1/0x900 [ 870.138565][T13932] ? __kasan_check_read+0x11/0x20 [ 870.143595][T13932] ? __alloc_pages_slowpath+0x2520/0x2520 [ 870.149585][T13932] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 870.155231][T13932] ? __kasan_check_read+0x11/0x20 [ 870.160270][T13932] ? fault_create_debugfs_attr+0x180/0x180 [ 870.166115][T13932] cache_grow_begin+0x90/0xd20 [ 870.170892][T13932] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 870.177155][T13932] kmem_cache_alloc+0x64e/0x710 [ 870.182017][T13932] getname_kernel+0x53/0x370 [ 870.186615][T13932] kern_path+0x20/0x40 [ 870.190781][T13932] tomoyo_mount_acl+0x28c/0x840 [ 870.195646][T13932] ? __kasan_check_read+0x11/0x20 [ 870.200806][T13932] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 870.206360][T13932] ? debug_check_no_obj_freed+0xc0/0x43f [ 870.212002][T13932] ? trace_hardirqs_off+0x62/0x240 [ 870.217130][T13932] ? lock_acquire+0x190/0x410 [ 870.221953][T13932] ? tomoyo_mount_permission+0x10a/0x410 [ 870.227611][T13932] tomoyo_mount_permission+0x16a/0x410 [ 870.233334][T13932] ? tomoyo_mount_permission+0x10a/0x410 [ 870.239186][T13932] ? tomoyo_mount_acl+0x840/0x840 [ 870.244222][T13932] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 870.250478][T13932] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 870.256726][T13932] ? strncpy_from_user+0x2b4/0x400 [ 870.261849][T13932] tomoyo_sb_mount+0x35/0x40 [ 870.266452][T13932] security_sb_mount+0x87/0xd0 [ 870.271226][T13932] do_mount+0x1d4/0x1c30 [ 870.275474][T13932] ? kasan_kmalloc+0x9/0x10 [ 870.279990][T13932] ? copy_mount_string+0x40/0x40 [ 870.284938][T13932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 870.291303][T13932] ? copy_mount_options+0x2e8/0x3f0 [ 870.296601][T13932] ksys_mount+0xdb/0x150 [ 870.300866][T13932] __x64_sys_mount+0xbe/0x150 [ 870.305552][T13932] do_syscall_64+0xfd/0x6a0 [ 870.310239][T13932] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 870.316255][T13932] RIP: 0033:0x45c2ca [ 870.320155][T13932] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 19:36:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000003f00000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:52 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x800) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(0x0, 0x1000000000013) [ 870.340431][T13932] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 870.348867][T13932] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 870.357301][T13932] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 870.365551][T13932] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 870.373527][T13932] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 870.381501][T13932] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:52 executing program 2: 19:36:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000004000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:52 executing program 2: 19:36:53 executing program 3 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 870.572851][T13946] FAULT_INJECTION: forcing a failure. [ 870.572851][T13946] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 870.586609][T13946] CPU: 1 PID: 13946 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 870.594888][T13946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.604961][T13946] Call Trace: [ 870.608814][T13946] dump_stack+0x172/0x1f0 [ 870.613516][T13946] should_fail.cold+0xa/0x15 [ 870.618224][T13946] ? fault_create_debugfs_attr+0x180/0x180 [ 870.624189][T13946] ? tomoyo_mount_acl+0x149/0x840 [ 870.629223][T13946] ? tomoyo_mount_permission+0x16a/0x410 [ 870.635123][T13946] ? tomoyo_sb_mount+0x35/0x40 [ 870.639896][T13946] ? security_sb_mount+0x87/0xd0 [ 870.644839][T13946] ? do_mount+0x1d4/0x1c30 [ 870.649270][T13946] ? ksys_mount+0xdb/0x150 [ 870.653698][T13946] ? __x64_sys_mount+0xbe/0x150 [ 870.659382][T13946] ? do_syscall_64+0xfd/0x6a0 [ 870.664349][T13946] should_fail_alloc_page+0x50/0x60 [ 870.670287][T13946] __alloc_pages_nodemask+0x1a1/0x900 [ 870.675669][T13946] ? __kasan_check_read+0x11/0x20 [ 870.680926][T13946] ? __alloc_pages_slowpath+0x2520/0x2520 [ 870.686741][T13946] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 870.692483][T13946] ? __kasan_check_read+0x11/0x20 [ 870.697521][T13946] ? fault_create_debugfs_attr+0x180/0x180 [ 870.703334][T13946] cache_grow_begin+0x90/0xd20 [ 870.708111][T13946] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 870.714478][T13946] kmem_cache_alloc+0x64e/0x710 [ 870.719359][T13946] getname_kernel+0x53/0x370 [ 870.723959][T13946] kern_path+0x20/0x40 [ 870.728050][T13946] tomoyo_mount_acl+0x28c/0x840 [ 870.732908][T13946] ? __kasan_check_read+0x11/0x20 [ 870.738212][T13946] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 870.744034][T13946] ? debug_check_no_obj_freed+0xc0/0x43f [ 870.749681][T13946] ? trace_hardirqs_off+0x62/0x240 [ 870.754900][T13946] ? lock_acquire+0x190/0x410 [ 870.759812][T13946] ? tomoyo_mount_permission+0x10a/0x410 [ 870.765537][T13946] tomoyo_mount_permission+0x16a/0x410 [ 870.771006][T13946] ? tomoyo_mount_permission+0x10a/0x410 [ 870.776743][T13946] ? tomoyo_mount_acl+0x840/0x840 [ 870.781868][T13946] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 870.788139][T13946] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 870.794509][T13946] ? strncpy_from_user+0x2b4/0x400 [ 870.799716][T13946] tomoyo_sb_mount+0x35/0x40 [ 870.804567][T13946] security_sb_mount+0x87/0xd0 [ 870.809696][T13946] do_mount+0x1d4/0x1c30 [ 870.813950][T13946] ? kasan_kmalloc+0x9/0x10 [ 870.818691][T13946] ? copy_mount_string+0x40/0x40 [ 870.823729][T13946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 870.831173][T13946] ? copy_mount_options+0x2e8/0x3f0 [ 870.836388][T13946] ksys_mount+0xdb/0x150 [ 870.840641][T13946] __x64_sys_mount+0xbe/0x150 [ 870.845325][T13946] do_syscall_64+0xfd/0x6a0 [ 870.849934][T13946] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 870.855830][T13946] RIP: 0033:0x45c2ca [ 870.859909][T13946] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 870.879762][T13946] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 870.888192][T13946] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 870.896276][T13946] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 870.904396][T13946] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 870.912483][T13946] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 870.920567][T13946] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:55 executing program 2: 19:36:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0edfffffff600000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:55 executing program 1: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x90) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0xffff) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 19:36:55 executing program 3 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:55 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r0, 0x1000000000013) 19:36:55 executing program 2: [ 872.999744][T13956] FAULT_INJECTION: forcing a failure. [ 872.999744][T13956] name failslab, interval 1, probability 0, space 0, times 0 19:36:55 executing program 1: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x90) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0xffff) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) [ 873.042758][T13956] CPU: 1 PID: 13956 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 873.050815][T13956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 873.061251][T13956] Call Trace: [ 873.064563][T13956] dump_stack+0x172/0x1f0 [ 873.068908][T13956] should_fail.cold+0xa/0x15 [ 873.073926][T13956] ? fault_create_debugfs_attr+0x180/0x180 [ 873.079744][T13956] ? nd_jump_link+0x1d0/0x1d0 [ 873.084431][T13956] ? ___might_sleep+0x163/0x280 19:36:55 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r0, 0x1000000000013) [ 873.089300][T13956] __should_failslab+0x121/0x190 [ 873.094262][T13956] should_failslab+0x9/0x14 [ 873.098772][T13956] __kmalloc+0x2e0/0x770 [ 873.103054][T13956] ? kmem_cache_alloc+0x314/0x710 [ 873.108214][T13956] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 873.113960][T13956] tomoyo_realpath_from_path+0xcd/0x7b0 [ 873.119517][T13956] tomoyo_mount_acl+0x2cc/0x840 [ 873.124476][T13956] ? __kasan_check_read+0x11/0x20 [ 873.129515][T13956] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 873.135072][T13956] ? debug_check_no_obj_freed+0xc0/0x43f [ 873.141493][T13956] ? trace_hardirqs_off+0x62/0x240 [ 873.146623][T13956] ? lock_acquire+0x190/0x410 [ 873.151402][T13956] ? tomoyo_mount_permission+0x10a/0x410 [ 873.157080][T13956] tomoyo_mount_permission+0x16a/0x410 [ 873.162687][T13956] ? tomoyo_mount_permission+0x10a/0x410 [ 873.168330][T13956] ? tomoyo_mount_acl+0x840/0x840 [ 873.173359][T13956] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 873.179828][T13956] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 873.186079][T13956] ? strncpy_from_user+0x2b4/0x400 [ 873.191201][T13956] tomoyo_sb_mount+0x35/0x40 [ 873.195800][T13956] security_sb_mount+0x87/0xd0 [ 873.200674][T13956] do_mount+0x1d4/0x1c30 [ 873.204924][T13956] ? kasan_kmalloc+0x9/0x10 [ 873.209437][T13956] ? copy_mount_string+0x40/0x40 [ 873.214738][T13956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 873.221094][T13956] ? copy_mount_options+0x2e8/0x3f0 [ 873.226433][T13956] ksys_mount+0xdb/0x150 [ 873.230688][T13956] __x64_sys_mount+0xbe/0x150 [ 873.235390][T13956] do_syscall_64+0xfd/0x6a0 [ 873.239904][T13956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 873.245798][T13956] RIP: 0033:0x45c2ca [ 873.249702][T13956] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 873.269599][T13956] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 873.278201][T13956] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca 19:36:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0edfffffdfc00000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 873.286247][T13956] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 873.294223][T13956] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 873.302346][T13956] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 873.310324][T13956] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 873.786798][T14084] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 873.795226][T14084] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 873.803224][T14084] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 873.811389][T14084] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 873.819514][T14084] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 873.827590][T14084] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:56 executing program 1: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x90) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x4e22, 0x4, @local, 0x1e}]}, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 19:36:56 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) 19:36:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:36:58 executing program 5: r0 = fanotify_init(0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:36:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0edf6ffffff00000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:58 executing program 3 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:58 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) 19:36:58 executing program 1: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x90) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x4e22, 0x4, @local, 0x1e}]}, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) [ 876.469742][T14208] FAULT_INJECTION: forcing a failure. [ 876.469742][T14208] name failslab, interval 1, probability 0, space 0, times 0 [ 876.511654][T14208] CPU: 1 PID: 14208 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 876.519768][T14208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.529836][T14208] Call Trace: [ 876.533142][T14208] dump_stack+0x172/0x1f0 [ 876.537480][T14208] should_fail.cold+0xa/0x15 [ 876.542073][T14208] ? __kasan_check_read+0x11/0x20 [ 876.547101][T14208] ? fault_create_debugfs_attr+0x180/0x180 [ 876.552907][T14208] ? page_to_nid.part.0+0x20/0x20 [ 876.557936][T14208] ? ___might_sleep+0x163/0x280 [ 876.562800][T14208] __should_failslab+0x121/0x190 [ 876.567742][T14208] should_failslab+0x9/0x14 [ 876.572242][T14208] kmem_cache_alloc_trace+0x2d3/0x790 [ 876.577608][T14208] ? lockdep_init_map+0x1be/0x6d0 [ 876.582638][T14208] legacy_init_fs_context+0x48/0xe0 [ 876.587847][T14208] ? generic_parse_monolithic+0x200/0x200 [ 876.593565][T14208] alloc_fs_context+0x3d1/0x6c0 [ 876.598417][T14208] fs_context_for_mount+0x25/0x30 [ 876.603467][T14208] vfs_kern_mount.part.0+0x28/0xf0 [ 876.608578][T14208] vfs_kern_mount+0x40/0x60 [ 876.613081][T14208] btrfs_mount+0x2b4/0x15e2 [ 876.617581][T14208] ? __kasan_check_read+0x11/0x20 [ 876.622863][T14208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 876.629099][T14208] ? should_fail+0x1de/0x852 [ 876.633691][T14208] ? fault_create_debugfs_attr+0x180/0x180 [ 876.639500][T14208] ? btrfs_remount+0x10f0/0x10f0 [ 876.644437][T14208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 876.650735][T14208] ? refcount_sub_and_test_checked+0x154/0x200 [ 876.656885][T14208] ? refcount_dec_not_one+0x1f0/0x1f0 [ 876.662256][T14208] ? legacy_parse_param+0x116/0x880 [ 876.667457][T14208] ? __lookup_constant+0xd6/0x100 [ 876.672486][T14208] ? refcount_dec_and_test_checked+0x1b/0x20 [ 876.678461][T14208] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 876.685390][T14208] ? apparmor_capable+0x2ed/0x630 [ 876.690430][T14208] ? cap_capable+0x205/0x270 [ 876.695020][T14208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 876.701261][T14208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 876.707501][T14208] ? btrfs_remount+0x10f0/0x10f0 [ 876.712435][T14208] legacy_get_tree+0x108/0x220 [ 876.717195][T14208] ? legacy_get_tree+0x108/0x220 [ 876.722134][T14208] vfs_get_tree+0x8e/0x390 [ 876.726551][T14208] do_mount+0x13b3/0x1c30 [ 876.730887][T14208] ? copy_mount_string+0x40/0x40 [ 876.735823][T14208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 876.742143][T14208] ? copy_mount_options+0x2e8/0x3f0 [ 876.747339][T14208] ksys_mount+0xdb/0x150 [ 876.751677][T14208] __x64_sys_mount+0xbe/0x150 [ 876.756357][T14208] do_syscall_64+0xfd/0x6a0 [ 876.760859][T14208] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 876.766747][T14208] RIP: 0033:0x45c2ca [ 876.770641][T14208] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 876.790243][T14208] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 876.798648][T14208] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca 19:36:59 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) 19:36:59 executing program 1: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x90) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x4e22, 0x4, @local, 0x1e}]}, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 19:36:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0edfeffffff00000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 876.806616][T14208] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 876.814583][T14208] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 876.822545][T14208] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 876.830512][T14208] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:36:59 executing program 5: fanotify_init(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r0, 0x1000000000013) 19:36:59 executing program 3 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:36:59 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) [ 877.075017][T14228] FAULT_INJECTION: forcing a failure. [ 877.075017][T14228] name failslab, interval 1, probability 0, space 0, times 0 [ 877.088198][T14228] CPU: 1 PID: 14228 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 877.096198][T14228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.106250][T14228] Call Trace: [ 877.109547][T14228] dump_stack+0x172/0x1f0 [ 877.113879][T14228] should_fail.cold+0xa/0x15 [ 877.118469][T14228] ? __kasan_check_read+0x11/0x20 [ 877.123495][T14228] ? fault_create_debugfs_attr+0x180/0x180 [ 877.129305][T14228] ? page_to_nid.part.0+0x20/0x20 [ 877.134333][T14228] ? ___might_sleep+0x163/0x280 [ 877.139197][T14228] __should_failslab+0x121/0x190 [ 877.144138][T14228] should_failslab+0x9/0x14 [ 877.148638][T14228] kmem_cache_alloc_trace+0x2d3/0x790 [ 877.154010][T14228] ? lockdep_init_map+0x1be/0x6d0 [ 877.159036][T14228] legacy_init_fs_context+0x48/0xe0 [ 877.164232][T14228] ? generic_parse_monolithic+0x200/0x200 [ 877.169951][T14228] alloc_fs_context+0x3d1/0x6c0 [ 877.174889][T14228] fs_context_for_mount+0x25/0x30 [ 877.179914][T14228] do_mount+0x132d/0x1c30 [ 877.184248][T14228] ? copy_mount_string+0x40/0x40 [ 877.189199][T14228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 877.195437][T14228] ? copy_mount_options+0x2e8/0x3f0 [ 877.200634][T14228] ksys_mount+0xdb/0x150 [ 877.204878][T14228] __x64_sys_mount+0xbe/0x150 [ 877.209555][T14228] do_syscall_64+0xfd/0x6a0 [ 877.214059][T14228] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 877.219946][T14228] RIP: 0033:0x45c2ca [ 877.223840][T14228] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 877.243443][T14228] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 877.251848][T14228] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 877.259816][T14228] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 877.267784][T14228] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 877.275748][T14228] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 877.283715][T14228] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:37:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:01 executing program 1: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x90) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x4e22, 0x4, @local, 0x1e}]}, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 19:37:01 executing program 5: fanotify_init(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r0, 0x1000000000013) 19:37:01 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) 19:37:01 executing program 3 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000003004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:02 executing program 2: lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) 19:37:02 executing program 5: fanotify_init(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r0, 0x1000000000013) [ 879.603425][T14236] FAULT_INJECTION: forcing a failure. [ 879.603425][T14236] name failslab, interval 1, probability 0, space 0, times 0 [ 879.678161][T14236] CPU: 1 PID: 14236 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 879.686300][T14236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 879.697552][T14236] Call Trace: [ 879.700860][T14236] dump_stack+0x172/0x1f0 [ 879.705209][T14236] should_fail.cold+0xa/0x15 [ 879.709808][T14236] ? __kasan_check_read+0x11/0x20 [ 879.714959][T14236] ? fault_create_debugfs_attr+0x180/0x180 [ 879.720785][T14236] ? page_to_nid.part.0+0x20/0x20 [ 879.725819][T14236] ? ___might_sleep+0x163/0x280 [ 879.730675][T14236] __should_failslab+0x121/0x190 [ 879.735879][T14236] should_failslab+0x9/0x14 [ 879.740382][T14236] kmem_cache_alloc_trace+0x2d3/0x790 [ 879.745748][T14236] ? lockdep_init_map+0x1be/0x6d0 [ 879.750778][T14236] legacy_init_fs_context+0x48/0xe0 [ 879.755997][T14236] ? generic_parse_monolithic+0x200/0x200 [ 879.761718][T14236] alloc_fs_context+0x3d1/0x6c0 [ 879.766668][T14236] fs_context_for_mount+0x25/0x30 [ 879.771778][T14236] do_mount+0x132d/0x1c30 [ 879.776113][T14236] ? copy_mount_string+0x40/0x40 [ 879.781661][T14236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 879.787899][T14236] ? copy_mount_options+0x2e8/0x3f0 [ 879.793108][T14236] ksys_mount+0xdb/0x150 [ 879.797350][T14236] __x64_sys_mount+0xbe/0x150 [ 879.802031][T14236] do_syscall_64+0xfd/0x6a0 [ 879.806535][T14236] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 879.812421][T14236] RIP: 0033:0x45c2ca [ 879.816316][T14236] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 879.835917][T14236] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 879.844328][T14236] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 879.853004][T14236] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 879.860974][T14236] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 879.868943][T14236] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 19:37:02 executing program 1: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x90) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x4e22, 0x4, @local, 0x1e}]}, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 19:37:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000005004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 879.876920][T14236] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:02 executing program 2: lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) 19:37:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:37:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000006004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:05 executing program 1: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x4e22, 0x4, @local, 0x1e}]}, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 19:37:05 executing program 5: r0 = fanotify_init(0x0, 0x0) readv(r0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:37:05 executing program 3 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:05 executing program 2: lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) [ 882.714432][T14263] FAULT_INJECTION: forcing a failure. [ 882.714432][T14263] name failslab, interval 1, probability 0, space 0, times 0 [ 882.735141][T14263] CPU: 1 PID: 14263 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 882.743201][T14263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 882.753261][T14263] Call Trace: [ 882.756568][T14263] dump_stack+0x172/0x1f0 [ 882.760916][T14263] should_fail.cold+0xa/0x15 [ 882.765510][T14263] ? fault_create_debugfs_attr+0x180/0x180 [ 882.771319][T14263] ? page_to_nid.part.0+0x20/0x20 [ 882.776346][T14263] ? ___might_sleep+0x163/0x280 [ 882.781206][T14263] __should_failslab+0x121/0x190 [ 882.786145][T14263] should_failslab+0x9/0x14 [ 882.790653][T14263] kmem_cache_alloc_trace+0x2d3/0x790 [ 882.796029][T14263] ? kasan_kmalloc+0x9/0x10 [ 882.800531][T14263] ? __kmalloc_node+0x4e/0x70 [ 882.805216][T14263] btrfs_mount_root+0x174/0x1290 [ 882.810160][T14263] ? btrfs_decode_error+0x70/0x70 [ 882.815207][T14263] ? logfc+0x700/0x700 [ 882.819289][T14263] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 882.825541][T14263] ? legacy_parse_param+0x116/0x880 [ 882.830747][T14263] ? __lookup_constant+0xd6/0x100 [ 882.835777][T14263] ? security_fs_context_parse_param+0x81/0xb0 [ 882.841930][T14263] ? logfc+0x700/0x700 [ 882.846007][T14263] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 882.852255][T14263] ? vfs_parse_fs_param+0xcd/0x540 [ 882.857373][T14263] ? kfree+0x1fd/0x2c0 [ 882.861460][T14263] ? vfs_parse_fs_string+0x116/0x170 [ 882.866761][T14263] ? vfs_parse_fs_param+0x540/0x540 [ 882.871970][T14263] ? btrfs_decode_error+0x70/0x70 [ 882.876999][T14263] legacy_get_tree+0x108/0x220 [ 882.881766][T14263] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 882.888005][T14263] vfs_get_tree+0x8e/0x390 [ 882.892419][T14263] fc_mount+0x17/0xc0 [ 882.896399][T14263] vfs_kern_mount.part.0+0xd8/0xf0 [ 882.901509][T14263] vfs_kern_mount+0x40/0x60 [ 882.906011][T14263] btrfs_mount+0x2b4/0x15e2 [ 882.910516][T14263] ? __kasan_check_read+0x11/0x20 19:37:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 882.915540][T14263] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 882.921776][T14263] ? should_fail+0x1de/0x852 [ 882.926375][T14263] ? fault_create_debugfs_attr+0x180/0x180 [ 882.932282][T14263] ? btrfs_remount+0x10f0/0x10f0 [ 882.937229][T14263] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 882.943465][T14263] ? refcount_sub_and_test_checked+0x154/0x200 [ 882.949619][T14263] ? refcount_dec_not_one+0x1f0/0x1f0 [ 882.954988][T14263] ? legacy_parse_param+0x116/0x880 [ 882.960189][T14263] ? __lookup_constant+0xd6/0x100 [ 882.965213][T14263] ? refcount_dec_and_test_checked+0x1b/0x20 [ 882.971200][T14263] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 882.977437][T14263] ? apparmor_capable+0x2ed/0x630 [ 882.982455][T14263] ? cap_capable+0x205/0x270 [ 882.987047][T14263] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 882.993290][T14263] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 882.999528][T14263] ? btrfs_remount+0x10f0/0x10f0 [ 883.004467][T14263] legacy_get_tree+0x108/0x220 [ 883.009227][T14263] ? legacy_get_tree+0x108/0x220 [ 883.014168][T14263] vfs_get_tree+0x8e/0x390 [ 883.018586][T14263] do_mount+0x13b3/0x1c30 [ 883.022917][T14263] ? copy_mount_string+0x40/0x40 [ 883.027854][T14263] ? copy_mount_options+0x260/0x3f0 [ 883.033054][T14263] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 883.039294][T14263] ? copy_mount_options+0x2e8/0x3f0 [ 883.044496][T14263] ksys_mount+0xdb/0x150 [ 883.048738][T14263] __x64_sys_mount+0xbe/0x150 [ 883.053415][T14263] do_syscall_64+0xfd/0x6a0 [ 883.057924][T14263] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 883.063810][T14263] RIP: 0033:0x45c2ca [ 883.067705][T14263] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 883.087396][T14263] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 883.095807][T14263] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 883.103779][T14263] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 19:37:05 executing program 2: mkdir(0x0, 0x0) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) 19:37:05 executing program 1: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 19:37:05 executing program 5: r0 = fanotify_init(0x0, 0x0) readv(r0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:37:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed000000000018cd0a004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 883.111747][T14263] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 883.119718][T14263] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 883.127684][T14263] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:05 executing program 2: mkdir(0x0, 0x0) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) 19:37:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed000000000000000f004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:05 executing program 5: r0 = fanotify_init(0x0, 0x0) readv(r0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:37:05 executing program 3 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:05 executing program 2: mkdir(0x0, 0x0) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) 19:37:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000020004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 883.356154][T14297] FAULT_INJECTION: forcing a failure. [ 883.356154][T14297] name failslab, interval 1, probability 0, space 0, times 0 [ 883.383102][T14297] CPU: 0 PID: 14297 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 883.391118][T14297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 883.401181][T14297] Call Trace: [ 883.404486][T14297] dump_stack+0x172/0x1f0 [ 883.408821][T14297] should_fail.cold+0xa/0x15 [ 883.413412][T14297] ? __x64_sys_mount+0xbe/0x150 [ 883.418267][T14297] ? fault_create_debugfs_attr+0x180/0x180 [ 883.424069][T14297] ? page_to_nid.part.0+0x20/0x20 [ 883.429096][T14297] ? ___might_sleep+0x163/0x280 [ 883.433947][T14297] __should_failslab+0x121/0x190 [ 883.438970][T14297] should_failslab+0x9/0x14 [ 883.443472][T14297] kmem_cache_alloc_trace+0x2d3/0x790 [ 883.448843][T14297] ? debug_check_no_obj_freed+0xc0/0x43f [ 883.454485][T14297] alloc_fs_context+0x5a/0x6c0 [ 883.459249][T14297] fs_context_for_mount+0x25/0x30 [ 883.464275][T14297] vfs_kern_mount.part.0+0x28/0xf0 [ 883.469382][T14297] vfs_kern_mount+0x40/0x60 [ 883.473888][T14297] btrfs_mount+0x2b4/0x15e2 [ 883.478385][T14297] ? __kasan_check_read+0x11/0x20 [ 883.483408][T14297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 883.489648][T14297] ? should_fail+0x1de/0x852 [ 883.494240][T14297] ? fault_create_debugfs_attr+0x180/0x180 [ 883.500130][T14297] ? btrfs_remount+0x10f0/0x10f0 [ 883.505096][T14297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 883.511334][T14297] ? refcount_sub_and_test_checked+0x154/0x200 [ 883.517487][T14297] ? refcount_dec_not_one+0x1f0/0x1f0 [ 883.522860][T14297] ? legacy_parse_param+0x116/0x880 [ 883.528061][T14297] ? __lookup_constant+0xd6/0x100 [ 883.533089][T14297] ? refcount_dec_and_test_checked+0x1b/0x20 [ 883.539155][T14297] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 883.546164][T14297] ? apparmor_capable+0x2ed/0x630 [ 883.551190][T14297] ? cap_capable+0x205/0x270 [ 883.555783][T14297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 883.562022][T14297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 883.568259][T14297] ? btrfs_remount+0x10f0/0x10f0 [ 883.573199][T14297] legacy_get_tree+0x108/0x220 [ 883.577971][T14297] ? legacy_get_tree+0x108/0x220 [ 883.582911][T14297] vfs_get_tree+0x8e/0x390 [ 883.587325][T14297] do_mount+0x13b3/0x1c30 [ 883.591658][T14297] ? copy_mount_string+0x40/0x40 [ 883.596660][T14297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 883.602989][T14297] ? copy_mount_options+0x2e8/0x3f0 [ 883.608193][T14297] ksys_mount+0xdb/0x150 [ 883.612524][T14297] __x64_sys_mount+0xbe/0x150 [ 883.617202][T14297] do_syscall_64+0xfd/0x6a0 [ 883.621709][T14297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 883.627600][T14297] RIP: 0033:0x45c2ca [ 883.631520][T14297] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 19:37:06 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) [ 883.651122][T14297] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 883.659563][T14297] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 883.667534][T14297] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 883.675500][T14297] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 883.683469][T14297] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 883.691435][T14297] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:08 executing program 3 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:08 executing program 5: r0 = fanotify_init(0x0, 0x0) readv(r0, &(0x7f0000000100), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:37:08 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) 19:37:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000040004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:08 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:37:08 executing program 1: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 19:37:08 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) 19:37:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed000000007fffffff004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:08 executing program 5: r0 = fanotify_init(0x0, 0x0) readv(r0, &(0x7f0000000100), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) [ 886.276778][T14313] FAULT_INJECTION: forcing a failure. [ 886.276778][T14313] name failslab, interval 1, probability 0, space 0, times 0 [ 886.343812][T14313] CPU: 1 PID: 14313 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 886.351836][T14313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 886.361902][T14313] Call Trace: [ 886.365203][T14313] dump_stack+0x172/0x1f0 [ 886.369543][T14313] should_fail.cold+0xa/0x15 [ 886.374896][T14313] ? __kasan_check_read+0x11/0x20 [ 886.379917][T14313] ? fault_create_debugfs_attr+0x180/0x180 [ 886.385725][T14313] ? page_to_nid.part.0+0x20/0x20 [ 886.391039][T14313] ? ___might_sleep+0x163/0x280 [ 886.395899][T14313] __should_failslab+0x121/0x190 [ 886.400839][T14313] should_failslab+0x9/0x14 [ 886.405346][T14313] kmem_cache_alloc_trace+0x2d3/0x790 [ 886.410715][T14313] ? lockdep_init_map+0x1be/0x6d0 [ 886.415742][T14313] legacy_init_fs_context+0x48/0xe0 [ 886.420940][T14313] ? generic_parse_monolithic+0x200/0x200 [ 886.426660][T14313] alloc_fs_context+0x3d1/0x6c0 [ 886.431515][T14313] fs_context_for_mount+0x25/0x30 [ 886.436539][T14313] vfs_kern_mount.part.0+0x28/0xf0 [ 886.441650][T14313] vfs_kern_mount+0x40/0x60 [ 886.446156][T14313] btrfs_mount+0x2b4/0x15e2 [ 886.450656][T14313] ? __kasan_check_read+0x11/0x20 [ 886.455678][T14313] ? __kasan_check_write+0x14/0x20 [ 886.460789][T14313] ? lock_downgrade+0x920/0x920 [ 886.465641][T14313] ? rwlock_bug.part.0+0x90/0x90 [ 886.470581][T14313] ? btrfs_remount+0x10f0/0x10f0 [ 886.475524][T14313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 886.481763][T14313] ? refcount_sub_and_test_checked+0x154/0x200 [ 886.487913][T14313] ? refcount_dec_not_one+0x1f0/0x1f0 [ 886.493282][T14313] ? legacy_parse_param+0x116/0x880 [ 886.498476][T14313] ? __lookup_constant+0xd6/0x100 [ 886.503499][T14313] ? refcount_dec_and_test_checked+0x1b/0x20 [ 886.509479][T14313] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 886.515717][T14313] ? apparmor_capable+0x2ed/0x630 [ 886.520736][T14313] ? cap_capable+0x205/0x270 [ 886.525326][T14313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 886.531565][T14313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 886.537905][T14313] ? btrfs_remount+0x10f0/0x10f0 [ 886.542839][T14313] legacy_get_tree+0x108/0x220 [ 886.547612][T14313] ? legacy_get_tree+0x108/0x220 [ 886.552553][T14313] vfs_get_tree+0x8e/0x390 [ 886.556967][T14313] do_mount+0x13b3/0x1c30 [ 886.561296][T14313] ? copy_mount_string+0x40/0x40 [ 886.566248][T14313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 886.572583][T14313] ? copy_mount_options+0x2e8/0x3f0 [ 886.577787][T14313] ksys_mount+0xdb/0x150 [ 886.582035][T14313] __x64_sys_mount+0xbe/0x150 [ 886.586716][T14313] do_syscall_64+0xfd/0x6a0 [ 886.591220][T14313] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 886.597115][T14313] RIP: 0033:0x45c2ca [ 886.601006][T14313] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 886.620736][T14313] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 886.629229][T14313] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 886.637220][T14313] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 886.645187][T14313] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 886.653152][T14313] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 886.661205][T14313] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:09 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) 19:37:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0edffffffffffffffff004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:09 executing program 3 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:09 executing program 5: r0 = fanotify_init(0x0, 0x0) readv(r0, &(0x7f0000000100), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:37:09 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) 19:37:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0002000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 886.840659][T14334] FAULT_INJECTION: forcing a failure. [ 886.840659][T14334] name failslab, interval 1, probability 0, space 0, times 0 [ 886.860726][T14334] CPU: 1 PID: 14334 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 886.868738][T14334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 886.878798][T14334] Call Trace: [ 886.882098][T14334] dump_stack+0x172/0x1f0 [ 886.886443][T14334] should_fail.cold+0xa/0x15 [ 886.891062][T14334] ? fault_create_debugfs_attr+0x180/0x180 [ 886.896876][T14334] ? page_to_nid.part.0+0x20/0x20 [ 886.901901][T14334] ? ___might_sleep+0x163/0x280 [ 886.906756][T14334] __should_failslab+0x121/0x190 [ 886.911704][T14334] should_failslab+0x9/0x14 [ 886.916203][T14334] __kmalloc_track_caller+0x2dc/0x760 [ 886.921573][T14334] ? kasan_kmalloc+0x9/0x10 [ 886.926072][T14334] ? kmem_cache_alloc_trace+0x346/0x790 [ 886.931616][T14334] ? kasan_kmalloc+0x9/0x10 [ 886.936201][T14334] ? btrfs_mount_root+0x2b8/0x1290 [ 886.941310][T14334] kstrdup+0x3a/0x70 [ 886.945203][T14334] btrfs_mount_root+0x2b8/0x1290 [ 886.950141][T14334] ? btrfs_decode_error+0x70/0x70 [ 886.955162][T14334] ? logfc+0x700/0x700 [ 886.959241][T14334] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 886.965481][T14334] ? legacy_parse_param+0x116/0x880 [ 886.970676][T14334] ? __lookup_constant+0xd6/0x100 [ 886.975699][T14334] ? security_fs_context_parse_param+0x81/0xb0 [ 886.981857][T14334] ? logfc+0x700/0x700 [ 886.985924][T14334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 886.992162][T14334] ? vfs_parse_fs_param+0xcd/0x540 [ 886.997268][T14334] ? kfree+0x1fd/0x2c0 [ 887.001334][T14334] ? vfs_parse_fs_string+0x116/0x170 [ 887.006620][T14334] ? vfs_parse_fs_param+0x540/0x540 [ 887.011824][T14334] ? btrfs_decode_error+0x70/0x70 [ 887.016850][T14334] legacy_get_tree+0x108/0x220 [ 887.021616][T14334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 887.027857][T14334] vfs_get_tree+0x8e/0x390 [ 887.032270][T14334] fc_mount+0x17/0xc0 [ 887.036249][T14334] vfs_kern_mount.part.0+0xd8/0xf0 [ 887.041452][T14334] vfs_kern_mount+0x40/0x60 [ 887.045960][T14334] btrfs_mount+0x2b4/0x15e2 [ 887.050458][T14334] ? __kasan_check_read+0x11/0x20 [ 887.055481][T14334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 887.061716][T14334] ? should_fail+0x1de/0x852 [ 887.066311][T14334] ? fault_create_debugfs_attr+0x180/0x180 [ 887.072120][T14334] ? btrfs_remount+0x10f0/0x10f0 [ 887.077060][T14334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 887.083383][T14334] ? refcount_sub_and_test_checked+0x154/0x200 [ 887.089556][T14334] ? refcount_dec_not_one+0x1f0/0x1f0 [ 887.094931][T14334] ? legacy_parse_param+0x116/0x880 [ 887.100126][T14334] ? __lookup_constant+0xd6/0x100 [ 887.105155][T14334] ? refcount_dec_and_test_checked+0x1b/0x20 [ 887.111131][T14334] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 887.117369][T14334] ? apparmor_capable+0x2ed/0x630 [ 887.122390][T14334] ? cap_capable+0x205/0x270 [ 887.126980][T14334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 887.133218][T14334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 887.139457][T14334] ? btrfs_remount+0x10f0/0x10f0 [ 887.144392][T14334] legacy_get_tree+0x108/0x220 [ 887.149156][T14334] ? legacy_get_tree+0x108/0x220 [ 887.154097][T14334] vfs_get_tree+0x8e/0x390 [ 887.158511][T14334] do_mount+0x13b3/0x1c30 [ 887.162847][T14334] ? copy_mount_string+0x40/0x40 [ 887.167777][T14334] ? memdup_user+0x5b/0xb0 [ 887.172201][T14334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 887.178442][T14334] ? copy_mount_options+0x2e8/0x3f0 [ 887.183641][T14334] ksys_mount+0xdb/0x150 [ 887.187970][T14334] __x64_sys_mount+0xbe/0x150 [ 887.192645][T14334] do_syscall_64+0xfd/0x6a0 [ 887.197149][T14334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 887.203035][T14334] RIP: 0033:0x45c2ca [ 887.206931][T14334] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 887.226530][T14334] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 887.234958][T14334] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 887.242926][T14334] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 887.250896][T14334] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 887.258872][T14334] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 887.266842][T14334] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:09 executing program 5: r0 = fanotify_init(0x0, 0x0) readv(r0, &(0x7f0000000100)=[{0x0}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:37:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:37:11 executing program 1: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 19:37:11 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) 19:37:11 executing program 3 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0003000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:11 executing program 5: r0 = fanotify_init(0x0, 0x0) readv(r0, &(0x7f0000000100)=[{0x0}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) [ 889.360723][T14349] FAULT_INJECTION: forcing a failure. [ 889.360723][T14349] name failslab, interval 1, probability 0, space 0, times 0 [ 889.376768][T14349] CPU: 0 PID: 14349 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 889.384768][T14349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.394820][T14349] Call Trace: [ 889.398111][T14349] dump_stack+0x172/0x1f0 [ 889.402453][T14349] should_fail.cold+0xa/0x15 [ 889.407045][T14349] ? legacy_get_tree+0x108/0x220 [ 889.411998][T14349] ? fault_create_debugfs_attr+0x180/0x180 [ 889.417807][T14349] ? page_to_nid.part.0+0x20/0x20 [ 889.422835][T14349] ? ___might_sleep+0x163/0x280 [ 889.427694][T14349] __should_failslab+0x121/0x190 [ 889.432641][T14349] should_failslab+0x9/0x14 [ 889.437156][T14349] __kmalloc_track_caller+0x2dc/0x760 [ 889.442535][T14349] ? kasan_unpoison_shadow+0x35/0x50 [ 889.447824][T14349] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 889.453641][T14349] ? vfs_parse_fs_string+0xe8/0x170 [ 889.458848][T14349] kmemdup_nul+0x31/0xa0 [ 889.463095][T14349] vfs_parse_fs_string+0xe8/0x170 [ 889.468123][T14349] ? vfs_parse_fs_param+0x540/0x540 [ 889.468142][T14349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.468159][T14349] ? alloc_fs_context+0x422/0x6c0 [ 889.484607][T14349] vfs_kern_mount.part.0+0x73/0xf0 [ 889.484623][T14349] vfs_kern_mount+0x40/0x60 [ 889.484640][T14349] btrfs_mount+0x2b4/0x15e2 [ 889.484658][T14349] ? __kasan_check_read+0x11/0x20 [ 889.503759][T14349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.510011][T14349] ? should_fail+0x1de/0x852 [ 889.514610][T14349] ? fault_create_debugfs_attr+0x180/0x180 [ 889.520422][T14349] ? btrfs_remount+0x10f0/0x10f0 [ 889.525362][T14349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.532032][T14349] ? refcount_sub_and_test_checked+0x154/0x200 [ 889.538185][T14349] ? refcount_dec_not_one+0x1f0/0x1f0 [ 889.543565][T14349] ? legacy_parse_param+0x116/0x880 [ 889.548764][T14349] ? __lookup_constant+0xd6/0x100 [ 889.553792][T14349] ? refcount_dec_and_test_checked+0x1b/0x20 19:37:11 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) 19:37:11 executing program 5: r0 = fanotify_init(0x0, 0x0) readv(r0, &(0x7f0000000100)=[{0x0}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:37:11 executing program 5: r0 = fanotify_init(0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, 0x0, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) [ 889.559779][T14349] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 889.566020][T14349] ? apparmor_capable+0x2ed/0x630 [ 889.571046][T14349] ? cap_capable+0x205/0x270 [ 889.575645][T14349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.581898][T14349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.588146][T14349] ? btrfs_remount+0x10f0/0x10f0 [ 889.593091][T14349] legacy_get_tree+0x108/0x220 [ 889.597876][T14349] ? legacy_get_tree+0x108/0x220 [ 889.602814][T14349] vfs_get_tree+0x8e/0x390 [ 889.602831][T14349] do_mount+0x13b3/0x1c30 [ 889.602848][T14349] ? copy_mount_string+0x40/0x40 [ 889.602866][T14349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.602879][T14349] ? copy_mount_options+0x2e8/0x3f0 [ 889.602897][T14349] ksys_mount+0xdb/0x150 [ 889.611609][T14349] __x64_sys_mount+0xbe/0x150 [ 889.611627][T14349] do_syscall_64+0xfd/0x6a0 [ 889.611645][T14349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 889.611655][T14349] RIP: 0033:0x45c2ca [ 889.611669][T14349] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 889.611676][T14349] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 889.611688][T14349] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 889.611695][T14349] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 889.611708][T14349] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 19:37:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0004000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 889.630000][T14363] ptrace attach of "/root/syz-executor.4"[14362] was attempted by "/root/syz-executor.4"[14363] [ 889.632265][T14349] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 889.632274][T14349] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:12 executing program 3 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:12 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) 19:37:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 889.852047][T14374] FAULT_INJECTION: forcing a failure. [ 889.852047][T14374] name failslab, interval 1, probability 0, space 0, times 0 [ 889.871335][T14374] CPU: 0 PID: 14374 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 889.879346][T14374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.889401][T14374] Call Trace: [ 889.892699][T14374] dump_stack+0x172/0x1f0 [ 889.897031][T14374] should_fail.cold+0xa/0x15 [ 889.901623][T14374] ? fault_create_debugfs_attr+0x180/0x180 [ 889.907430][T14374] ? page_to_nid.part.0+0x20/0x20 [ 889.912454][T14374] ? ___might_sleep+0x163/0x280 [ 889.917308][T14374] __should_failslab+0x121/0x190 [ 889.919463][T14379] cgroup: fork rejected by pids controller in /syz4 [ 889.922246][T14374] should_failslab+0x9/0x14 [ 889.922264][T14374] kmem_cache_alloc_trace+0x2d3/0x790 [ 889.938689][T14374] ? kasan_kmalloc+0x9/0x10 [ 889.943204][T14374] ? __kmalloc_node+0x4e/0x70 [ 889.947893][T14374] btrfs_mount_root+0x174/0x1290 [ 889.952841][T14374] ? btrfs_decode_error+0x70/0x70 [ 889.957870][T14374] ? logfc+0x700/0x700 [ 889.961948][T14374] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 889.968186][T14374] ? legacy_parse_param+0x116/0x880 [ 889.973380][T14374] ? __lookup_constant+0xd6/0x100 [ 889.978402][T14374] ? security_fs_context_parse_param+0x81/0xb0 [ 889.984548][T14374] ? logfc+0x700/0x700 [ 889.988613][T14374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.994847][T14374] ? vfs_parse_fs_param+0xcd/0x540 [ 889.999950][T14374] ? kfree+0x1fd/0x2c0 [ 890.004013][T14374] ? vfs_parse_fs_string+0x116/0x170 [ 890.009313][T14374] ? vfs_parse_fs_param+0x540/0x540 [ 890.014507][T14374] ? btrfs_decode_error+0x70/0x70 [ 890.019533][T14374] legacy_get_tree+0x108/0x220 [ 890.024305][T14374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.030548][T14374] vfs_get_tree+0x8e/0x390 [ 890.034967][T14374] fc_mount+0x17/0xc0 [ 890.038951][T14374] vfs_kern_mount.part.0+0xd8/0xf0 [ 890.044077][T14374] vfs_kern_mount+0x40/0x60 [ 890.048577][T14374] btrfs_mount+0x2b4/0x15e2 [ 890.053078][T14374] ? __kasan_check_read+0x11/0x20 [ 890.058109][T14374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.064345][T14374] ? should_fail+0x1de/0x852 [ 890.068932][T14374] ? fault_create_debugfs_attr+0x180/0x180 [ 890.074736][T14374] ? btrfs_remount+0x10f0/0x10f0 [ 890.079669][T14374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.085907][T14374] ? refcount_sub_and_test_checked+0x154/0x200 [ 890.092060][T14374] ? refcount_dec_not_one+0x1f0/0x1f0 [ 890.097429][T14374] ? legacy_parse_param+0x116/0x880 [ 890.102628][T14374] ? __lookup_constant+0xd6/0x100 [ 890.107649][T14374] ? refcount_dec_and_test_checked+0x1b/0x20 [ 890.113713][T14374] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 890.119947][T14374] ? apparmor_capable+0x2ed/0x630 [ 890.124965][T14374] ? cap_capable+0x205/0x270 [ 890.129550][T14374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.135786][T14374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.142023][T14374] ? btrfs_remount+0x10f0/0x10f0 [ 890.146962][T14374] legacy_get_tree+0x108/0x220 [ 890.151725][T14374] ? legacy_get_tree+0x108/0x220 [ 890.156667][T14374] vfs_get_tree+0x8e/0x390 [ 890.161177][T14374] do_mount+0x13b3/0x1c30 [ 890.165510][T14374] ? copy_mount_string+0x40/0x40 [ 890.170448][T14374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.176772][T14374] ? copy_mount_options+0x2e8/0x3f0 [ 890.181969][T14374] ksys_mount+0xdb/0x150 [ 890.186213][T14374] __x64_sys_mount+0xbe/0x150 [ 890.190976][T14374] do_syscall_64+0xfd/0x6a0 [ 890.195653][T14374] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 890.201534][T14374] RIP: 0033:0x45c2ca [ 890.205423][T14374] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 890.225022][T14374] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 890.233441][T14374] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 890.241412][T14374] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 19:37:12 executing program 1: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 19:37:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0005000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:12 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000000)=""/16, 0x10) 19:37:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 890.249377][T14374] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 890.257340][T14374] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 890.265306][T14374] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:12 executing program 3 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:12 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(0x0, &(0x7f0000000000)=""/16, 0x10) 19:37:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0006000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 890.440581][T14397] FAULT_INJECTION: forcing a failure. [ 890.440581][T14397] name failslab, interval 1, probability 0, space 0, times 0 [ 890.453294][T14397] CPU: 1 PID: 14397 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 890.461279][T14397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.471332][T14397] Call Trace: [ 890.474625][T14397] dump_stack+0x172/0x1f0 [ 890.478959][T14397] should_fail.cold+0xa/0x15 [ 890.483552][T14397] ? trace_hardirqs_off+0x62/0x240 [ 890.488667][T14397] ? fault_create_debugfs_attr+0x180/0x180 [ 890.494471][T14397] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 890.500276][T14397] ? debug_object_active_state+0x28a/0x350 [ 890.506079][T14397] ? try_to_free_buffers+0x3a0/0x7e0 [ 890.511367][T14397] __should_failslab+0x121/0x190 [ 890.516305][T14397] should_failslab+0x9/0x14 [ 890.520802][T14397] kmem_cache_alloc+0x47/0x710 [ 890.525733][T14397] ? try_charge+0x9e4/0x1440 [ 890.530320][T14397] xas_alloc+0x346/0x460 [ 890.534560][T14397] xas_create+0x2cd/0x1060 [ 890.538972][T14397] ? mark_held_locks+0xf0/0xf0 [ 890.545215][T14397] xas_store+0x9a/0x1a00 [ 890.549458][T14397] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 890.555693][T14397] ? xas_start+0x166/0x560 [ 890.560110][T14397] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 890.566344][T14397] ? xas_load+0x67/0x150 [ 890.570586][T14397] __add_to_page_cache_locked+0x5d8/0xec0 [ 890.576300][T14397] ? __kasan_check_read+0x11/0x20 [ 890.581323][T14397] ? __page_cache_alloc+0x480/0x480 [ 890.586533][T14397] ? __alloc_pages_nodemask+0x578/0x900 [ 890.592069][T14397] ? xas_start+0x166/0x560 [ 890.596486][T14397] ? shadow_lru_isolate+0x430/0x430 [ 890.601682][T14397] ? find_get_entry+0x535/0x880 [ 890.606540][T14397] add_to_page_cache_lru+0x1d8/0x790 [ 890.611821][T14397] ? add_to_page_cache_locked+0x40/0x40 [ 890.617367][T14397] ? __page_cache_alloc+0x116/0x480 [ 890.622565][T14397] pagecache_get_page+0x371/0x880 [ 890.627592][T14397] __getblk_gfp+0x281/0xa10 [ 890.632091][T14397] ? __kasan_check_write+0x14/0x20 [ 890.637199][T14397] __bread_gfp+0x2f/0x370 [ 890.641544][T14397] btrfs_read_dev_one_super+0xb6/0x2a0 [ 890.647000][T14397] btrfs_read_dev_super+0x6c/0xd0 [ 890.652020][T14397] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 890.657742][T14397] btrfs_get_bdev_and_sb+0xff/0x300 [ 890.662939][T14397] open_fs_devices+0x6e7/0xc40 [ 890.667705][T14397] ? btrfs_uuid_rescan_kthread+0x60/0x60 [ 890.673332][T14397] ? btrfs_scan_one_device+0x5ac/0x710 [ 890.678790][T14397] btrfs_open_devices+0x140/0x160 [ 890.683813][T14397] btrfs_mount_root+0x793/0x1290 [ 890.688750][T14397] ? btrfs_decode_error+0x70/0x70 [ 890.693771][T14397] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 890.700004][T14397] ? legacy_parse_param+0x116/0x880 [ 890.705195][T14397] ? __lookup_constant+0xd6/0x100 [ 890.710215][T14397] ? security_fs_context_parse_param+0x81/0xb0 [ 890.716360][T14397] ? logfc+0x700/0x700 [ 890.720425][T14397] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.726658][T14397] ? vfs_parse_fs_param+0xcd/0x540 [ 890.731761][T14397] ? kfree+0x1fd/0x2c0 [ 890.735826][T14397] ? vfs_parse_fs_string+0x116/0x170 [ 890.741110][T14397] ? vfs_parse_fs_param+0x540/0x540 [ 890.746301][T14397] ? btrfs_decode_error+0x70/0x70 [ 890.751323][T14397] legacy_get_tree+0x108/0x220 [ 890.756088][T14397] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.762327][T14397] vfs_get_tree+0x8e/0x390 [ 890.766737][T14397] fc_mount+0x17/0xc0 [ 890.770714][T14397] vfs_kern_mount.part.0+0xd8/0xf0 [ 890.775822][T14397] vfs_kern_mount+0x40/0x60 [ 890.780317][T14397] btrfs_mount+0x2b4/0x15e2 [ 890.784817][T14397] ? __kasan_check_read+0x11/0x20 [ 890.789836][T14397] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.796071][T14397] ? should_fail+0x1de/0x852 [ 890.800664][T14397] ? fault_create_debugfs_attr+0x180/0x180 [ 890.806467][T14397] ? btrfs_remount+0x10f0/0x10f0 [ 890.811404][T14397] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.817642][T14397] ? refcount_sub_and_test_checked+0x154/0x200 [ 890.823787][T14397] ? refcount_dec_not_one+0x1f0/0x1f0 [ 890.829153][T14397] ? legacy_parse_param+0x116/0x880 [ 890.834345][T14397] ? __lookup_constant+0xd6/0x100 [ 890.839371][T14397] ? refcount_dec_and_test_checked+0x1b/0x20 [ 890.845346][T14397] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 890.851582][T14397] ? apparmor_capable+0x2ed/0x630 [ 890.856601][T14397] ? cap_capable+0x205/0x270 [ 890.861187][T14397] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.867423][T14397] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.873656][T14397] ? btrfs_remount+0x10f0/0x10f0 [ 890.878595][T14397] legacy_get_tree+0x108/0x220 [ 890.883352][T14397] ? legacy_get_tree+0x108/0x220 [ 890.888284][T14397] vfs_get_tree+0x8e/0x390 [ 890.892696][T14397] do_mount+0x13b3/0x1c30 [ 890.897111][T14397] ? copy_mount_string+0x40/0x40 [ 890.902044][T14397] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 890.908277][T14397] ? _copy_from_user+0x12c/0x1a0 [ 890.913211][T14397] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.919449][T14397] ? copy_mount_options+0x2e8/0x3f0 [ 890.924647][T14397] ksys_mount+0xdb/0x150 [ 890.928886][T14397] __x64_sys_mount+0xbe/0x150 [ 890.933564][T14397] do_syscall_64+0xfd/0x6a0 [ 890.938068][T14397] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 890.943956][T14397] RIP: 0033:0x45c2ca [ 890.947861][T14397] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 890.967457][T14397] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 890.975862][T14397] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 890.983830][T14397] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 890.991801][T14397] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 890.999765][T14397] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 891.007730][T14397] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:14 executing program 5: r0 = fanotify_init(0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, 0x0, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:37:14 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(0x0, &(0x7f0000000000)=""/16, 0x10) 19:37:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0007000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:14 executing program 3 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:14 executing program 1: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) [ 892.723236][T14408] FAULT_INJECTION: forcing a failure. [ 892.723236][T14408] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 892.736479][T14408] CPU: 1 PID: 14408 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 892.744832][T14408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.754896][T14408] Call Trace: [ 892.758199][T14408] dump_stack+0x172/0x1f0 [ 892.762560][T14408] should_fail.cold+0xa/0x15 [ 892.767189][T14408] ? kasan_kmalloc+0x9/0x10 [ 892.771717][T14408] ? fault_create_debugfs_attr+0x180/0x180 [ 892.777530][T14408] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 892.782823][T14408] ? vfs_kern_mount+0x40/0x60 [ 892.787508][T14408] ? btrfs_mount+0x2b4/0x15e2 [ 892.792197][T14408] ? legacy_get_tree+0x108/0x220 [ 892.797147][T14408] ? vfs_get_tree+0x8e/0x390 [ 892.801749][T14408] ? do_mount+0x13b3/0x1c30 [ 892.806622][T14408] ? ksys_mount+0xdb/0x150 [ 892.811041][T14408] ? __x64_sys_mount+0xbe/0x150 [ 892.815902][T14408] should_fail_alloc_page+0x50/0x60 [ 892.821105][T14408] __alloc_pages_nodemask+0x1a1/0x900 [ 892.826587][T14408] ? lock_downgrade+0x920/0x920 [ 892.831682][T14408] ? __alloc_pages_slowpath+0x2520/0x2520 [ 892.837399][T14408] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 892.843039][T14408] ? __kasan_check_read+0x11/0x20 [ 892.849553][T14408] ? fault_create_debugfs_attr+0x180/0x180 [ 892.855378][T14408] cache_grow_begin+0x90/0xd20 [ 892.860252][T14408] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 892.866524][T14408] kmem_cache_alloc_trace+0x6b3/0x790 [ 892.871905][T14408] ? kasan_kmalloc+0x9/0x10 [ 892.876423][T14408] btrfs_mount_root+0x174/0x1290 [ 892.881371][T14408] ? btrfs_decode_error+0x70/0x70 [ 892.886419][T14408] ? logfc+0x700/0x700 [ 892.890520][T14408] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 892.896763][T14408] ? legacy_parse_param+0x116/0x880 [ 892.901960][T14408] ? __lookup_constant+0xd6/0x100 [ 892.906991][T14408] ? security_fs_context_parse_param+0x81/0xb0 [ 892.913150][T14408] ? logfc+0x700/0x700 [ 892.917220][T14408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.923467][T14408] ? vfs_parse_fs_param+0xcd/0x540 [ 892.928587][T14408] ? kfree+0x1fd/0x2c0 [ 892.932667][T14408] ? vfs_parse_fs_string+0x116/0x170 [ 892.937960][T14408] ? vfs_parse_fs_param+0x540/0x540 [ 892.943243][T14408] ? btrfs_decode_error+0x70/0x70 [ 892.948276][T14408] legacy_get_tree+0x108/0x220 [ 892.953331][T14408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.959581][T14408] vfs_get_tree+0x8e/0x390 [ 892.964007][T14408] fc_mount+0x17/0xc0 [ 892.967993][T14408] vfs_kern_mount.part.0+0xd8/0xf0 [ 892.973108][T14408] vfs_kern_mount+0x40/0x60 [ 892.977621][T14408] btrfs_mount+0x2b4/0x15e2 [ 892.982483][T14408] ? __kasan_check_read+0x11/0x20 [ 892.987526][T14408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.993856][T14408] ? should_fail+0x1de/0x852 [ 892.998449][T14408] ? fault_create_debugfs_attr+0x180/0x180 [ 893.004359][T14408] ? btrfs_remount+0x10f0/0x10f0 [ 893.009474][T14408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.015881][T14408] ? refcount_sub_and_test_checked+0x154/0x200 [ 893.022036][T14408] ? refcount_dec_not_one+0x1f0/0x1f0 [ 893.027504][T14408] ? legacy_parse_param+0x116/0x880 [ 893.032711][T14408] ? __lookup_constant+0xd6/0x100 [ 893.037741][T14408] ? refcount_dec_and_test_checked+0x1b/0x20 [ 893.043725][T14408] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 893.049980][T14408] ? apparmor_capable+0x2ed/0x630 [ 893.055184][T14408] ? cap_capable+0x205/0x270 [ 893.059777][T14408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.066051][T14408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.072291][T14408] ? btrfs_remount+0x10f0/0x10f0 [ 893.077238][T14408] legacy_get_tree+0x108/0x220 [ 893.082010][T14408] ? legacy_get_tree+0x108/0x220 [ 893.086956][T14408] vfs_get_tree+0x8e/0x390 [ 893.091380][T14408] do_mount+0x13b3/0x1c30 [ 893.095719][T14408] ? copy_mount_string+0x40/0x40 [ 893.100663][T14408] ? copy_mount_options+0x22b/0x3f0 [ 893.105867][T14408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.112112][T14408] ? copy_mount_options+0x2e8/0x3f0 [ 893.117318][T14408] ksys_mount+0xdb/0x150 [ 893.121566][T14408] __x64_sys_mount+0xbe/0x150 [ 893.126252][T14408] do_syscall_64+0xfd/0x6a0 [ 893.130768][T14408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 893.136656][T14408] RIP: 0033:0x45c2ca [ 893.140649][T14408] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 893.160351][T14408] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 19:37:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000030000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:15 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(0x0, &(0x7f0000000000)=""/16, 0x10) [ 893.168769][T14408] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 893.176742][T14408] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 893.184791][T14408] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 893.192772][T14408] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 893.200746][T14408] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:15 executing program 3 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:15 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) 19:37:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:37:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000050000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 893.398491][T14522] FAULT_INJECTION: forcing a failure. [ 893.398491][T14522] name failslab, interval 1, probability 0, space 0, times 0 [ 893.417479][T14522] CPU: 1 PID: 14522 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 893.425503][T14522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 893.435655][T14522] Call Trace: [ 893.438966][T14522] dump_stack+0x172/0x1f0 [ 893.443398][T14522] should_fail.cold+0xa/0x15 [ 893.448034][T14522] ? fault_create_debugfs_attr+0x180/0x180 [ 893.453849][T14522] ? page_to_nid.part.0+0x20/0x20 [ 893.458881][T14522] ? ___might_sleep+0x163/0x280 [ 893.463844][T14522] __should_failslab+0x121/0x190 [ 893.468789][T14522] should_failslab+0x9/0x14 [ 893.473296][T14522] kmem_cache_alloc_trace+0x2d3/0x790 [ 893.478669][T14522] ? kasan_kmalloc+0x9/0x10 [ 893.483179][T14522] btrfs_mount_root+0x1d0/0x1290 [ 893.488129][T14522] ? btrfs_decode_error+0x70/0x70 [ 893.493157][T14522] ? logfc+0x700/0x700 [ 893.497233][T14522] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 893.503476][T14522] ? legacy_parse_param+0x116/0x880 [ 893.508682][T14522] ? __lookup_constant+0xd6/0x100 [ 893.513715][T14522] ? security_fs_context_parse_param+0x81/0xb0 [ 893.519874][T14522] ? logfc+0x700/0x700 [ 893.523959][T14522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.530301][T14522] ? vfs_parse_fs_param+0xcd/0x540 [ 893.535416][T14522] ? kfree+0x1fd/0x2c0 [ 893.539490][T14522] ? vfs_parse_fs_string+0x116/0x170 [ 893.544789][T14522] ? vfs_parse_fs_param+0x540/0x540 [ 893.549993][T14522] ? btrfs_decode_error+0x70/0x70 [ 893.555019][T14522] legacy_get_tree+0x108/0x220 [ 893.559791][T14522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.566033][T14522] vfs_get_tree+0x8e/0x390 [ 893.570626][T14522] fc_mount+0x17/0xc0 [ 893.575047][T14522] vfs_kern_mount.part.0+0xd8/0xf0 [ 893.580160][T14522] vfs_kern_mount+0x40/0x60 [ 893.584672][T14522] btrfs_mount+0x2b4/0x15e2 [ 893.589177][T14522] ? __kasan_check_read+0x11/0x20 [ 893.594208][T14522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.600548][T14522] ? should_fail+0x1de/0x852 [ 893.605145][T14522] ? fault_create_debugfs_attr+0x180/0x180 [ 893.611217][T14522] ? btrfs_remount+0x10f0/0x10f0 [ 893.616167][T14522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.622413][T14522] ? refcount_sub_and_test_checked+0x154/0x200 [ 893.628570][T14522] ? refcount_dec_not_one+0x1f0/0x1f0 [ 893.633977][T14522] ? legacy_parse_param+0x116/0x880 [ 893.639181][T14522] ? __lookup_constant+0xd6/0x100 [ 893.644214][T14522] ? refcount_dec_and_test_checked+0x1b/0x20 [ 893.650202][T14522] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 893.656529][T14522] ? apparmor_capable+0x2ed/0x630 [ 893.661638][T14522] ? cap_capable+0x205/0x270 [ 893.666232][T14522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.672478][T14522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.678718][T14522] ? btrfs_remount+0x10f0/0x10f0 [ 893.683653][T14522] legacy_get_tree+0x108/0x220 [ 893.688506][T14522] ? legacy_get_tree+0x108/0x220 [ 893.693452][T14522] vfs_get_tree+0x8e/0x390 [ 893.697873][T14522] do_mount+0x13b3/0x1c30 [ 893.702206][T14522] ? copy_mount_string+0x40/0x40 [ 893.707171][T14522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.713412][T14522] ? copy_mount_options+0x2e8/0x3f0 [ 893.718619][T14522] ksys_mount+0xdb/0x150 [ 893.722865][T14522] __x64_sys_mount+0xbe/0x150 [ 893.727551][T14522] do_syscall_64+0xfd/0x6a0 [ 893.732060][T14522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 893.737949][T14522] RIP: 0033:0x45c2ca [ 893.741849][T14522] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 893.761474][T14522] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 893.770071][T14522] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 893.778040][T14522] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 893.786021][T14522] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 19:37:16 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) [ 893.793994][T14522] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 893.801967][T14522] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000060000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:18 executing program 5: r0 = fanotify_init(0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, 0x0, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:37:18 executing program 1: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 19:37:18 executing program 3 (fault-call:0 fault-nth:80): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:18 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:apt_lock\x10\xedO\xee0\x00\xff\xc0B\x97)\xd3\x11+O\xa9F\xecD\xd9#\\\x8b\xb8\xebnp\xedL\xa4\n\x83T<\xff\xd4\xc8\xbdp%\xe2\x88\xb5\xb0\xff9x\x18P\xd0\x8a3S\xed\x9fK\xfb\xf4\x00\xdd\xa1[X\xa1m\xc5n\xa9\xdc\xd9\xd7\xd5\xd5\xcb\x19\x897\xf8\x1b\xa1\x0f\xf1c\xa1\x82\xc9\x1bL\x80oT\x03\x9d\xbc\xa0\xbb\x19\xb2V<\x8d\xee\xb3j\xa1\x9a(c2\xbd\x90\x14G\x17h}\x18hatu\xef\xb3\xe6%\x12\x9e\xee\xc6\x05!\xc6\x9c\x16\x80\xe0f\t>a\xc8\xa3O\x9f\x9e\x92\xcbx\xa5\\\x84Vv\xa5\x8a\'\x1e\x7f`Q/\xf9N \xb0\xe3\x05$\xdd\xbf\'4\x8f\xfb\xfe\xf1\x1d!:|\xa3<\x9b\x18\xca\xfd*\xedYR\xb9\tG\xc4\xb7S\x1cJ\xd9J#\xe2\xe4\x17q<\xb6\x95n\a\xb9\xca\xa7\xf9\xef\x13@\x05k', 0xf5, 0x0) listxattr(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) 19:37:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000070000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 895.806014][T14538] FAULT_INJECTION: forcing a failure. [ 895.806014][T14538] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 895.819249][T14538] CPU: 0 PID: 14538 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 895.827231][T14538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 895.837288][T14538] Call Trace: [ 895.840592][T14538] dump_stack+0x172/0x1f0 [ 895.844934][T14538] should_fail.cold+0xa/0x15 [ 895.849534][T14538] ? vfs_get_tree+0x8e/0x390 [ 895.854147][T14538] ? fault_create_debugfs_attr+0x180/0x180 [ 895.859964][T14538] ? do_mount+0x13b3/0x1c30 [ 895.864580][T14538] ? ksys_mount+0xdb/0x150 [ 895.869010][T14538] ? __x64_sys_mount+0xbe/0x150 [ 895.873872][T14538] ? do_syscall_64+0xfd/0x6a0 [ 895.878565][T14538] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 895.884727][T14538] should_fail_alloc_page+0x50/0x60 [ 895.889936][T14538] __alloc_pages_nodemask+0x1a1/0x900 [ 895.895316][T14538] ? cache_grow_end+0xa4/0x190 [ 895.900092][T14538] ? __alloc_pages_slowpath+0x2520/0x2520 [ 895.905905][T14538] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 895.911541][T14538] ? __kasan_check_read+0x11/0x20 [ 895.916584][T14538] ? fault_create_debugfs_attr+0x180/0x180 [ 895.922407][T14538] cache_grow_begin+0x90/0xd20 [ 895.927197][T14538] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 895.933529][T14538] kmem_cache_alloc_trace+0x6b3/0x790 [ 895.938922][T14538] ? kasan_kmalloc+0x9/0x10 [ 895.943432][T14538] btrfs_mount_root+0x1d0/0x1290 [ 895.948376][T14538] ? btrfs_decode_error+0x70/0x70 [ 895.953406][T14538] ? logfc+0x700/0x700 [ 895.957481][T14538] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 895.963728][T14538] ? legacy_parse_param+0x116/0x880 [ 895.968937][T14538] ? __lookup_constant+0xd6/0x100 [ 895.973964][T14538] ? security_fs_context_parse_param+0x81/0xb0 [ 895.980118][T14538] ? logfc+0x700/0x700 [ 895.984192][T14538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 895.990434][T14538] ? vfs_parse_fs_param+0xcd/0x540 [ 895.995543][T14538] ? kfree+0x1fd/0x2c0 [ 895.999727][T14538] ? vfs_parse_fs_string+0x116/0x170 [ 896.005013][T14538] ? vfs_parse_fs_param+0x540/0x540 [ 896.010211][T14538] ? btrfs_decode_error+0x70/0x70 [ 896.015237][T14538] legacy_get_tree+0x108/0x220 [ 896.020006][T14538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.026253][T14538] vfs_get_tree+0x8e/0x390 [ 896.030674][T14538] fc_mount+0x17/0xc0 [ 896.034674][T14538] vfs_kern_mount.part.0+0xd8/0xf0 [ 896.039902][T14538] vfs_kern_mount+0x40/0x60 [ 896.044413][T14538] btrfs_mount+0x2b4/0x15e2 [ 896.048921][T14538] ? __kasan_check_read+0x11/0x20 [ 896.053950][T14538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.060293][T14538] ? should_fail+0x1de/0x852 [ 896.064891][T14538] ? fault_create_debugfs_attr+0x180/0x180 [ 896.070793][T14538] ? btrfs_remount+0x10f0/0x10f0 [ 896.075918][T14538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.082157][T14538] ? refcount_sub_and_test_checked+0x154/0x200 [ 896.088322][T14538] ? refcount_dec_not_one+0x1f0/0x1f0 [ 896.093696][T14538] ? legacy_parse_param+0x116/0x880 [ 896.098898][T14538] ? __lookup_constant+0xd6/0x100 [ 896.103930][T14538] ? refcount_dec_and_test_checked+0x1b/0x20 [ 896.109998][T14538] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 896.116239][T14538] ? apparmor_capable+0x2ed/0x630 [ 896.121267][T14538] ? cap_capable+0x205/0x270 [ 896.125951][T14538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.132195][T14538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.138455][T14538] ? btrfs_remount+0x10f0/0x10f0 [ 896.143393][T14538] legacy_get_tree+0x108/0x220 [ 896.148158][T14538] ? legacy_get_tree+0x108/0x220 [ 896.153102][T14538] vfs_get_tree+0x8e/0x390 [ 896.157611][T14538] do_mount+0x13b3/0x1c30 [ 896.161949][T14538] ? copy_mount_string+0x40/0x40 [ 896.166896][T14538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.173135][T14538] ? copy_mount_options+0x2e8/0x3f0 [ 896.178346][T14538] ksys_mount+0xdb/0x150 [ 896.182602][T14538] __x64_sys_mount+0xbe/0x150 [ 896.187281][T14538] do_syscall_64+0xfd/0x6a0 [ 896.191889][T14538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 896.197778][T14538] RIP: 0033:0x45c2ca [ 896.201676][T14538] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 896.221279][T14538] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 896.229829][T14538] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 896.238015][T14538] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 896.245998][T14538] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 19:37:18 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000001480)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f00000000c0)) [ 896.253970][T14538] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 896.261942][T14538] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed00003f0000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:18 executing program 3 (fault-call:0 fault-nth:81): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 896.443095][T14555] FAULT_INJECTION: forcing a failure. [ 896.443095][T14555] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 896.460024][T14555] CPU: 1 PID: 14555 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 896.468039][T14555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 896.478177][T14555] Call Trace: [ 896.481475][T14555] dump_stack+0x172/0x1f0 [ 896.485818][T14555] should_fail.cold+0xa/0x15 [ 896.490413][T14555] ? fault_create_debugfs_attr+0x180/0x180 [ 896.496227][T14555] ? ___might_sleep+0x163/0x280 [ 896.501087][T14555] should_fail_alloc_page+0x50/0x60 [ 896.506294][T14555] __alloc_pages_nodemask+0x1a1/0x900 [ 896.511668][T14555] ? __alloc_pages_slowpath+0x2520/0x2520 [ 896.517396][T14555] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 896.523639][T14555] alloc_pages_current+0x107/0x210 [ 896.528772][T14555] __page_cache_alloc+0x2a2/0x480 [ 896.533801][T14555] ? iput+0x535/0x8b0 [ 896.537791][T14555] do_read_cache_page+0x476/0xb90 [ 896.544317][T14555] read_cache_page_gfp+0x28/0x30 [ 896.549262][T14555] btrfs_scan_one_device+0x19b/0x710 [ 896.554554][T14555] ? device_list_add+0x14f0/0x14f0 [ 896.559667][T14555] ? trace_hardirqs_on+0x20/0x240 [ 896.564694][T14555] ? btrfs_mount_root+0xb2f/0x1290 [ 896.569894][T14555] btrfs_mount_root+0x711/0x1290 [ 896.574837][T14555] ? btrfs_decode_error+0x70/0x70 [ 896.579865][T14555] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 896.586642][T14555] ? legacy_parse_param+0x116/0x880 [ 896.591845][T14555] ? __lookup_constant+0xd6/0x100 [ 896.596870][T14555] ? security_fs_context_parse_param+0x81/0xb0 [ 896.603040][T14555] ? logfc+0x700/0x700 [ 896.607115][T14555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.613358][T14555] ? vfs_parse_fs_param+0xcd/0x540 [ 896.618471][T14555] ? kfree+0x1fd/0x2c0 [ 896.622546][T14555] ? vfs_parse_fs_string+0x116/0x170 [ 896.627849][T14555] ? vfs_parse_fs_param+0x540/0x540 [ 896.633048][T14555] ? btrfs_decode_error+0x70/0x70 [ 896.638073][T14555] legacy_get_tree+0x108/0x220 [ 896.642843][T14555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.649085][T14555] vfs_get_tree+0x8e/0x390 [ 896.653501][T14555] fc_mount+0x17/0xc0 [ 896.657484][T14555] vfs_kern_mount.part.0+0xd8/0xf0 [ 896.662603][T14555] vfs_kern_mount+0x40/0x60 [ 896.667121][T14555] btrfs_mount+0x2b4/0x15e2 [ 896.671629][T14555] ? __kasan_check_read+0x11/0x20 [ 896.676664][T14555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.682907][T14555] ? should_fail+0x1de/0x852 [ 896.687505][T14555] ? fault_create_debugfs_attr+0x180/0x180 [ 896.693316][T14555] ? btrfs_remount+0x10f0/0x10f0 [ 896.698259][T14555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.704607][T14555] ? refcount_sub_and_test_checked+0x154/0x200 [ 896.710765][T14555] ? refcount_dec_not_one+0x1f0/0x1f0 [ 896.716151][T14555] ? legacy_parse_param+0x116/0x880 [ 896.721382][T14555] ? __lookup_constant+0xd6/0x100 [ 896.726414][T14555] ? refcount_dec_and_test_checked+0x1b/0x20 [ 896.732400][T14555] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 896.738656][T14555] ? apparmor_capable+0x2ed/0x630 [ 896.743681][T14555] ? cap_capable+0x205/0x270 [ 896.748277][T14555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.754525][T14555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.760766][T14555] ? btrfs_remount+0x10f0/0x10f0 [ 896.765809][T14555] legacy_get_tree+0x108/0x220 [ 896.770589][T14555] ? legacy_get_tree+0x108/0x220 [ 896.775528][T14555] vfs_get_tree+0x8e/0x390 [ 896.779947][T14555] do_mount+0x13b3/0x1c30 [ 896.784285][T14555] ? copy_mount_string+0x40/0x40 [ 896.789234][T14555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.795472][T14555] ? copy_mount_options+0x2e8/0x3f0 [ 896.800775][T14555] ksys_mount+0xdb/0x150 [ 896.805121][T14555] __x64_sys_mount+0xbe/0x150 [ 896.809805][T14555] do_syscall_64+0xfd/0x6a0 [ 896.814398][T14555] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 896.820289][T14555] RIP: 0033:0x45c2ca [ 896.824185][T14555] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 896.843876][T14555] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 896.852287][T14555] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 896.860343][T14555] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 896.868320][T14555] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 896.876381][T14555] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 896.884439][T14555] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:37:19 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 19:37:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000400000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:19 executing program 1: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x3c, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}]}, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 19:37:21 executing program 5: r0 = fanotify_init(0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:37:21 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x10, 0x0, &(0x7f0000000000)=0xffffff7d) 19:37:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000200000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:21 executing program 3 (fault-call:0 fault-nth:82): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:21 executing program 1: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x3c, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}]}, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) [ 898.885690][T14573] FAULT_INJECTION: forcing a failure. [ 898.885690][T14573] name failslab, interval 1, probability 0, space 0, times 0 [ 898.911051][T14573] CPU: 1 PID: 14573 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 898.919075][T14573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 898.929125][T14573] Call Trace: [ 898.932420][T14573] dump_stack+0x172/0x1f0 [ 898.936754][T14573] should_fail.cold+0xa/0x15 [ 898.941347][T14573] ? fault_create_debugfs_attr+0x180/0x180 [ 898.947154][T14573] ? page_to_nid.part.0+0x20/0x20 [ 898.952180][T14573] ? ___might_sleep+0x163/0x280 [ 898.957036][T14573] __should_failslab+0x121/0x190 [ 898.962032][T14573] should_failslab+0x9/0x14 [ 898.966709][T14573] kmem_cache_alloc+0x2aa/0x710 [ 898.971556][T14573] ? _raw_spin_unlock_irq+0x5e/0x90 [ 898.976752][T14573] ? finish_task_switch+0x147/0x720 [ 898.981946][T14573] ? finish_task_switch+0x119/0x720 [ 898.987145][T14573] getname_kernel+0x53/0x370 [ 898.991742][T14573] kern_path+0x20/0x40 [ 898.995813][T14573] lookup_bdev.part.0+0x7b/0x1b0 [ 899.000745][T14573] ? blkdev_open+0x290/0x290 [ 899.005332][T14573] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 899.010794][T14573] blkdev_get_by_path+0x81/0x130 [ 899.015731][T14573] btrfs_scan_one_device+0xd3/0x710 [ 899.020925][T14573] ? device_list_add+0x14f0/0x14f0 [ 899.026028][T14573] ? trace_hardirqs_on+0x5e/0x240 [ 899.031049][T14573] ? kfree+0x239/0x2c0 [ 899.035116][T14573] btrfs_mount_root+0x711/0x1290 [ 899.040053][T14573] ? btrfs_decode_error+0x70/0x70 [ 899.045078][T14573] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 899.051316][T14573] ? legacy_parse_param+0x116/0x880 [ 899.056513][T14573] ? __lookup_constant+0xd6/0x100 [ 899.061530][T14573] ? security_fs_context_parse_param+0x81/0xb0 [ 899.067676][T14573] ? logfc+0x700/0x700 [ 899.071745][T14573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 899.077982][T14573] ? vfs_parse_fs_param+0xcd/0x540 [ 899.083084][T14573] ? kfree+0x1fd/0x2c0 [ 899.087151][T14573] ? vfs_parse_fs_string+0x116/0x170 [ 899.092613][T14573] ? vfs_parse_fs_param+0x540/0x540 [ 899.097807][T14573] ? btrfs_decode_error+0x70/0x70 [ 899.102826][T14573] legacy_get_tree+0x108/0x220 [ 899.107588][T14573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 899.113825][T14573] vfs_get_tree+0x8e/0x390 [ 899.118242][T14573] fc_mount+0x17/0xc0 [ 899.122224][T14573] vfs_kern_mount.part.0+0xd8/0xf0 [ 899.127332][T14573] vfs_kern_mount+0x40/0x60 [ 899.131831][T14573] btrfs_mount+0x2b4/0x15e2 [ 899.136328][T14573] ? __kasan_check_read+0x11/0x20 [ 899.141350][T14573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 899.147585][T14573] ? should_fail+0x1de/0x852 [ 899.152183][T14573] ? fault_create_debugfs_attr+0x180/0x180 [ 899.157990][T14573] ? btrfs_remount+0x10f0/0x10f0 [ 899.162930][T14573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 899.169164][T14573] ? refcount_sub_and_test_checked+0x154/0x200 [ 899.175309][T14573] ? refcount_dec_not_one+0x1f0/0x1f0 [ 899.180683][T14573] ? legacy_parse_param+0x116/0x880 [ 899.185884][T14573] ? __lookup_constant+0xd6/0x100 [ 899.190904][T14573] ? refcount_dec_and_test_checked+0x1b/0x20 [ 899.196884][T14573] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 899.203119][T14573] ? apparmor_capable+0x2ed/0x630 [ 899.208138][T14573] ? cap_capable+0x205/0x270 [ 899.212728][T14573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 899.218967][T14573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 899.225211][T14573] ? btrfs_remount+0x10f0/0x10f0 [ 899.230147][T14573] legacy_get_tree+0x108/0x220 [ 899.234905][T14573] ? legacy_get_tree+0x108/0x220 [ 899.239838][T14573] vfs_get_tree+0x8e/0x390 [ 899.244257][T14573] do_mount+0x13b3/0x1c30 [ 899.248586][T14573] ? copy_mount_string+0x40/0x40 [ 899.253525][T14573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 899.259768][T14573] ? copy_mount_options+0x2e8/0x3f0 [ 899.264971][T14573] ksys_mount+0xdb/0x150 [ 899.269210][T14573] __x64_sys_mount+0xbe/0x150 [ 899.273888][T14573] do_syscall_64+0xfd/0x6a0 [ 899.278396][T14573] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 899.284279][T14573] RIP: 0033:0x45c2ca [ 899.288173][T14573] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 899.307943][T14573] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 899.316351][T14573] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 899.324319][T14573] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 19:37:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000001000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:21 executing program 2: r0 = socket(0x10, 0x80803, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x7f) write(r0, &(0x7f0000000300)="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", 0xfc) [ 899.332286][T14573] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 899.340248][T14573] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 899.348388][T14573] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000002000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:37:22 executing program 3 (fault-call:0 fault-nth:83): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:22 executing program 2: r0 = socket(0x2, 0x8002, 0x0) open(0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3}, 0xc) 19:37:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000003000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 900.145816][T14692] FAULT_INJECTION: forcing a failure. [ 900.145816][T14692] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 900.159045][T14692] CPU: 0 PID: 14692 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 900.167022][T14692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 900.177067][T14692] Call Trace: [ 900.180397][T14692] dump_stack+0x172/0x1f0 [ 900.184736][T14692] should_fail.cold+0xa/0x15 [ 900.189333][T14692] ? fault_create_debugfs_attr+0x180/0x180 [ 900.189355][T14692] ? is_bpf_text_address+0xd3/0x170 [ 900.200310][T14692] ? kernel_text_address+0x73/0xf0 [ 900.200330][T14692] should_fail_alloc_page+0x50/0x60 [ 900.200342][T14692] __alloc_pages_nodemask+0x1a1/0x900 [ 900.200359][T14692] ? __alloc_pages_slowpath+0x2520/0x2520 [ 900.221687][T14692] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 900.227331][T14692] ? __kasan_check_read+0x11/0x20 [ 900.232359][T14692] ? fault_create_debugfs_attr+0x180/0x180 [ 900.238161][T14692] cache_grow_begin+0x90/0xd20 [ 900.242939][T14692] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 900.249172][T14692] kmem_cache_alloc+0x64e/0x710 [ 900.254023][T14692] ? fc_mount+0x17/0xc0 [ 900.258184][T14692] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 900.263462][T14692] ? vfs_kern_mount+0x40/0x60 [ 900.268139][T14692] ? legacy_get_tree+0x108/0x220 [ 900.273077][T14692] getname_kernel+0x53/0x370 [ 900.277664][T14692] kern_path+0x20/0x40 [ 900.281730][T14692] lookup_bdev.part.0+0x7b/0x1b0 [ 900.286661][T14692] ? blkdev_open+0x290/0x290 [ 900.291681][T14692] ? debug_check_no_obj_freed+0xc0/0x43f [ 900.297317][T14692] blkdev_get_by_path+0x81/0x130 [ 900.302255][T14692] btrfs_scan_one_device+0xd3/0x710 [ 900.307454][T14692] ? device_list_add+0x14f0/0x14f0 [ 900.312562][T14692] ? trace_hardirqs_on+0x20/0x240 [ 900.317590][T14692] ? btrfs_mount_root+0xb2f/0x1290 [ 900.322698][T14692] btrfs_mount_root+0x711/0x1290 [ 900.327639][T14692] ? btrfs_decode_error+0x70/0x70 [ 900.332660][T14692] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 900.338897][T14692] ? legacy_parse_param+0x116/0x880 [ 900.344095][T14692] ? __lookup_constant+0xd6/0x100 [ 900.349117][T14692] ? security_fs_context_parse_param+0x81/0xb0 [ 900.355269][T14692] ? logfc+0x700/0x700 [ 900.359337][T14692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.365571][T14692] ? vfs_parse_fs_param+0xcd/0x540 [ 900.370675][T14692] ? kfree+0x1fd/0x2c0 [ 900.374744][T14692] ? vfs_parse_fs_string+0x116/0x170 [ 900.380025][T14692] ? vfs_parse_fs_param+0x540/0x540 [ 900.385223][T14692] ? btrfs_decode_error+0x70/0x70 [ 900.390246][T14692] legacy_get_tree+0x108/0x220 [ 900.395006][T14692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.401246][T14692] vfs_get_tree+0x8e/0x390 [ 900.405659][T14692] fc_mount+0x17/0xc0 [ 900.409634][T14692] vfs_kern_mount.part.0+0xd8/0xf0 [ 900.414745][T14692] vfs_kern_mount+0x40/0x60 [ 900.419259][T14692] btrfs_mount+0x2b4/0x15e2 [ 900.423758][T14692] ? __kasan_check_read+0x11/0x20 [ 900.428778][T14692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.435017][T14692] ? should_fail+0x1de/0x852 [ 900.439606][T14692] ? fault_create_debugfs_attr+0x180/0x180 [ 900.445416][T14692] ? btrfs_remount+0x10f0/0x10f0 [ 900.450352][T14692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.456673][T14692] ? refcount_sub_and_test_checked+0x154/0x200 [ 900.462821][T14692] ? refcount_dec_not_one+0x1f0/0x1f0 [ 900.468194][T14692] ? legacy_parse_param+0x116/0x880 [ 900.473392][T14692] ? __lookup_constant+0xd6/0x100 [ 900.478424][T14692] ? refcount_dec_and_test_checked+0x1b/0x20 [ 900.484398][T14692] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 900.490631][T14692] ? apparmor_capable+0x2ed/0x630 [ 900.495646][T14692] ? cap_capable+0x205/0x270 [ 900.500250][T14692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.506499][T14692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.512738][T14692] ? btrfs_remount+0x10f0/0x10f0 [ 900.517671][T14692] legacy_get_tree+0x108/0x220 [ 900.522466][T14692] ? legacy_get_tree+0x108/0x220 [ 900.527400][T14692] vfs_get_tree+0x8e/0x390 [ 900.531814][T14692] do_mount+0x13b3/0x1c30 [ 900.536255][T14692] ? copy_mount_string+0x40/0x40 [ 900.542024][T14692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.548264][T14692] ? copy_mount_options+0x2e8/0x3f0 [ 900.553468][T14692] ksys_mount+0xdb/0x150 [ 900.557716][T14692] __x64_sys_mount+0xbe/0x150 [ 900.562490][T14692] do_syscall_64+0xfd/0x6a0 [ 900.566997][T14692] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 900.572881][T14692] RIP: 0033:0x45c2ca [ 900.576772][T14692] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 900.596432][T14692] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 900.604850][T14692] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 900.612988][T14692] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 900.620956][T14692] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 900.628923][T14692] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 900.637063][T14692] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:24 executing program 5: r0 = fanotify_init(0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:37:24 executing program 1: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x3c, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}]}, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 19:37:24 executing program 2: close(0xffffffffffffffff) setrlimit(0x8, &(0x7f0000000000)={0x7, 0x95}) r0 = syz_open_pts(0xffffffffffffffff, 0x0) close(r0) syz_open_pts(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000500)="280b4130044b87def1023ea5833c1c857c10b83d6fc4cdd8e14b5addf93ffd54cdb08339c439efa93e42c19ed71cf761a29c2eb69739f4d7481d630dd7a7bbf2fd723f51b29c62056115526c54a72c41beb3a8719d6b6209e956c29c74d8973a3f1a17473bf920bf90541c9bb036d0af60a775f39dbb2f4b9fdddc12db378cb7237fe06f3e569cf731ea62c2bb96df7fce145386c6018d6df0ef9e6a4ec83590cbaa00faf8c1993693c929b1c4f9edd7f28910b3382c07c7b72ac0232f8063abbdf2f698e7a2d1c8db4e59b7adfd9cb956eb7efb2832a2eda961c7f90e913568e3b9972ba37f763fdd3ec55821ff019ef737181df253444aad4dfd2dd5ea85f9b25b4e7d88647a9bc8f1fe89cd1d0228f7a49d62f8a65b97d6cb017b68f5035e00ae01e553f37e981e7e95d1c9d00cb3d1f2cc8d12a0110afd581c9cc95c6d2f0ab83441140e67f2b85f76ae1eb65fc62141a31710695f9fc1fde63d7395f09637e320e5476e599938b7c53cd5b6346b6fbebd405782599a564ffbe6b6206e8c4a5851e4909b6df0749741c46d4bc804724747a95ac2fd0bdb4d2a3fbcbf2908ce3f3d3f012a32d0f532f47b8a532a051d0404d1e56561b87dd8c85f70f1ded6a700b6c40d30b35f94d153442cfde234925e3326f43290834d609ac494838d40578f418b9de6c3b44e8801423bf899dc6c831a55e6d20dbc1e443d51d6eef549556266db26f1203deac7931652c10ca82d7c95d195c84c6e8e7611bec601704bc0f1d2b63fd28780334686cbc85653144da2dfd9b82588751c01143e3cdb8d28d5123ccf39b2518aaecd6e8d9e10033f54e588365d1e523b8b55cee9bbc49687d26272a862984751a2ffa2697a8f1b6ca7ef208fa915473be49295be7bd30a021cf2f78179462c97dc17eed203ae811128780fe81e8572b50dd8a5186b293ec576b199fa46bdc75f212dba7ee7e800e8bb77b1daab63331c27b7ce6954218d6920344b3fcb0624f20d9a73789540a03e7e1cf3537f3d7c533d71e42e7cb9b505b472ce717c9029c26eb023555b73025b55ab16088c2b54b4a4ecf24f0b718865876d7e13177f09a18548f5014ac3c5e8d365169f072eb9d868abebc397b66cc99b24157d74679127bde82dbfbc62bac7373fedfae8e2bf31e2fa3f945cfebe37cee5cd83582e6465b4e259363d3d7a855fee302e237dfdfed7acfb43782409b69ba262119ad8ba1b2d89df9b06beed8e2c6fc56a4ebe2f1e1da37b0b5e7dee1c1aa8d5748228ad65b97a635e8e8886dbf4e87f0a228a5129f0f9b4b72f70de8cc95db923f786772b158386c3cecaf060071ac8a963a65c895c076b2d14d77f38cbdb5cf94905fd6bd3ecf3a420888dfc28dd75a2c224a07b4108802a9803cceb97cf0184eeec2df1ea7e35527a44be274dfb1b2934799b051098efe015857bd19b92eb1732bffb49e699687ca33576a5698b3e6478783886794ea765f228996de9892923cfbb8d4eaabbef17c179eaff28cf4a0aaf05eade8857adc14249a3125779ca8ae1ab960dbae33d7a8cf5db2abbe83bb45666eb83aaf13330243387cfe8c5c9561f44bbe7c66bc34d0584cd37333173f8dae64648913e47a59d770aae7ffe26043cd63e6264a36e4461b2923cbefa828d990a9dca67ceb8a03a1cb15cee30b8b9bd741500f75e8753c733b03271529317414ac10280e36c42886552c3c379c32b42abf7ff89fe70e5bc2f442728eb6a050e9141e2fe68ab6f772a8aa9ef205eeee9eebc7d932fdb84d91a15f463a6b81f0961a23aca8f96a07cb90935d8e6f561e6fcd9bc32ca17d7c815", 0x50e) 19:37:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:24 executing program 3 (fault-call:0 fault-nth:84): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 901.982074][T14800] FAULT_INJECTION: forcing a failure. [ 901.982074][T14800] name failslab, interval 1, probability 0, space 0, times 0 [ 901.994703][T14800] CPU: 0 PID: 14800 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 902.002865][T14800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 902.013559][T14800] Call Trace: [ 902.013581][T14800] dump_stack+0x172/0x1f0 [ 902.013600][T14800] should_fail.cold+0xa/0x15 [ 902.013620][T14800] ? fault_create_debugfs_attr+0x180/0x180 [ 902.021200][T14800] ? putname+0xef/0x130 [ 902.021216][T14800] ? filename_lookup+0x28f/0x410 [ 902.021229][T14800] ? lookup_bdev.part.0+0x7b/0x1b0 [ 902.021250][T14800] ? mark_held_locks+0xf0/0xf0 [ 902.050522][T14800] ? legacy_get_tree+0x108/0x220 [ 902.055468][T14800] __should_failslab+0x121/0x190 [ 902.060412][T14800] should_failslab+0x9/0x14 [ 902.064922][T14800] kmem_cache_alloc+0x47/0x710 [ 902.069685][T14800] ? try_charge+0x9e4/0x1440 [ 902.074279][T14800] xas_alloc+0x346/0x460 [ 902.078522][T14800] xas_create+0x2cd/0x1060 [ 902.082942][T14800] ? mark_held_locks+0xf0/0xf0 [ 902.087706][T14800] xas_store+0x9a/0x1a00 [ 902.091950][T14800] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 902.098192][T14800] ? xas_start+0x166/0x560 [ 902.102615][T14800] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 902.108851][T14800] ? xas_load+0x67/0x150 [ 902.113098][T14800] __add_to_page_cache_locked+0x5d8/0xec0 [ 902.118816][T14800] ? __kasan_check_read+0x11/0x20 [ 902.123846][T14800] ? __page_cache_alloc+0x480/0x480 [ 902.129047][T14800] ? __alloc_pages_nodemask+0x578/0x900 [ 902.134591][T14800] ? shadow_lru_isolate+0x430/0x430 [ 902.139790][T14800] add_to_page_cache_lru+0x1d8/0x790 [ 902.145079][T14800] ? add_to_page_cache_locked+0x40/0x40 [ 902.150624][T14800] ? __page_cache_alloc+0x116/0x480 [ 902.155819][T14800] ? iput+0x535/0x8b0 [ 902.159804][T14800] do_read_cache_page+0x499/0xb90 [ 902.164837][T14800] read_cache_page_gfp+0x28/0x30 [ 902.169775][T14800] btrfs_scan_one_device+0x19b/0x710 [ 902.175064][T14800] ? device_list_add+0x14f0/0x14f0 [ 902.180169][T14800] ? trace_hardirqs_on+0x20/0x240 [ 902.185193][T14800] ? btrfs_mount_root+0xb2f/0x1290 [ 902.190304][T14800] btrfs_mount_root+0x711/0x1290 [ 902.195244][T14800] ? btrfs_decode_error+0x70/0x70 [ 902.200268][T14800] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 902.206505][T14800] ? legacy_parse_param+0x116/0x880 [ 902.211700][T14800] ? __lookup_constant+0xd6/0x100 [ 902.216723][T14800] ? security_fs_context_parse_param+0x81/0xb0 [ 902.222875][T14800] ? logfc+0x700/0x700 [ 902.226941][T14800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 902.233196][T14800] ? vfs_parse_fs_param+0xcd/0x540 [ 902.238302][T14800] ? kfree+0x1fd/0x2c0 [ 902.242374][T14800] ? vfs_parse_fs_string+0x116/0x170 [ 902.247656][T14800] ? vfs_parse_fs_param+0x540/0x540 [ 902.252879][T14800] ? btrfs_decode_error+0x70/0x70 [ 902.257900][T14800] legacy_get_tree+0x108/0x220 [ 902.262667][T14800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 902.268905][T14800] vfs_get_tree+0x8e/0x390 [ 902.273318][T14800] fc_mount+0x17/0xc0 [ 902.277301][T14800] vfs_kern_mount.part.0+0xd8/0xf0 [ 902.282412][T14800] vfs_kern_mount+0x40/0x60 [ 902.286914][T14800] btrfs_mount+0x2b4/0x15e2 [ 902.291414][T14800] ? __kasan_check_read+0x11/0x20 [ 902.296435][T14800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 902.302672][T14800] ? should_fail+0x1de/0x852 [ 902.307260][T14800] ? fault_create_debugfs_attr+0x180/0x180 [ 902.313071][T14800] ? btrfs_remount+0x10f0/0x10f0 [ 902.318011][T14800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 902.324250][T14800] ? refcount_sub_and_test_checked+0x154/0x200 [ 902.330400][T14800] ? refcount_dec_not_one+0x1f0/0x1f0 [ 902.335772][T14800] ? legacy_parse_param+0x116/0x880 [ 902.340966][T14800] ? __lookup_constant+0xd6/0x100 [ 902.346005][T14800] ? refcount_dec_and_test_checked+0x1b/0x20 [ 902.351980][T14800] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 902.358223][T14800] ? apparmor_capable+0x2ed/0x630 [ 902.363242][T14800] ? cap_capable+0x205/0x270 [ 902.367829][T14800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 902.374067][T14800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 902.380305][T14800] ? btrfs_remount+0x10f0/0x10f0 [ 902.385250][T14800] legacy_get_tree+0x108/0x220 [ 902.390019][T14800] ? legacy_get_tree+0x108/0x220 [ 902.394958][T14800] vfs_get_tree+0x8e/0x390 [ 902.399411][T14800] do_mount+0x13b3/0x1c30 [ 902.403768][T14800] ? copy_mount_string+0x40/0x40 [ 902.408705][T14800] ? __sanitizer_cov_trace_const_cmp2+0x20/0x20 [ 902.414942][T14800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 902.421178][T14800] ? copy_mount_options+0x2e8/0x3f0 [ 902.426374][T14800] ksys_mount+0xdb/0x150 [ 902.430615][T14800] __x64_sys_mount+0xbe/0x150 [ 902.435314][T14800] do_syscall_64+0xfd/0x6a0 [ 902.439816][T14800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 902.445704][T14800] RIP: 0033:0x45c2ca [ 902.449605][T14800] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 902.469202][T14800] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 19:37:24 executing program 2: r0 = open$dir(&(0x7f0000000800)='./file0\x00', 0x40000400000002c2, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000002280)="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", 0x9dc}], 0x1) write(r0, &(0x7f0000000840)="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", 0x625) writev(r0, &(0x7f0000000000)=[{&(0x7f0000003280)="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", 0x1000}], 0x1) 19:37:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000005000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 902.477611][T14800] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 902.485579][T14800] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 902.493546][T14800] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 902.501516][T14800] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 902.509483][T14800] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:24 executing program 3 (fault-call:0 fault-nth:85): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 902.756396][T15017] FAULT_INJECTION: forcing a failure. [ 902.756396][T15017] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 902.769643][T15017] CPU: 1 PID: 15017 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 902.777616][T15017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 902.787667][T15017] Call Trace: [ 902.790966][T15017] dump_stack+0x172/0x1f0 [ 902.795299][T15017] should_fail.cold+0xa/0x15 [ 902.799890][T15017] ? fault_create_debugfs_attr+0x180/0x180 [ 902.805694][T15017] ? is_bpf_text_address+0xd3/0x170 [ 902.810889][T15017] ? kernel_text_address+0x73/0xf0 [ 902.816002][T15017] should_fail_alloc_page+0x50/0x60 [ 902.821217][T15017] __alloc_pages_nodemask+0x1a1/0x900 [ 902.826684][T15017] ? __alloc_pages_slowpath+0x2520/0x2520 [ 902.832412][T15017] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 902.838048][T15017] ? __kasan_check_read+0x11/0x20 [ 902.843072][T15017] ? fault_create_debugfs_attr+0x180/0x180 [ 902.848883][T15017] cache_grow_begin+0x90/0xd20 [ 902.853650][T15017] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 902.859888][T15017] kmem_cache_alloc+0x64e/0x710 [ 902.864735][T15017] ? fc_mount+0x17/0xc0 [ 902.868888][T15017] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 902.874164][T15017] ? vfs_kern_mount+0x40/0x60 [ 902.878844][T15017] ? legacy_get_tree+0x108/0x220 [ 902.883784][T15017] getname_kernel+0x53/0x370 [ 902.888409][T15017] kern_path+0x20/0x40 [ 902.892480][T15017] lookup_bdev.part.0+0x7b/0x1b0 [ 902.897426][T15017] ? blkdev_open+0x290/0x290 [ 902.902023][T15017] ? debug_check_no_obj_freed+0xc0/0x43f [ 902.907657][T15017] blkdev_get_by_path+0x81/0x130 [ 902.912601][T15017] btrfs_scan_one_device+0xd3/0x710 [ 902.917796][T15017] ? device_list_add+0x14f0/0x14f0 [ 902.922903][T15017] ? trace_hardirqs_on+0x20/0x240 [ 902.927933][T15017] ? btrfs_mount_root+0xb2f/0x1290 [ 902.933043][T15017] btrfs_mount_root+0x711/0x1290 [ 902.937993][T15017] ? btrfs_decode_error+0x70/0x70 [ 902.943019][T15017] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 902.949256][T15017] ? legacy_parse_param+0x116/0x880 [ 902.954454][T15017] ? __lookup_constant+0xd6/0x100 [ 902.959481][T15017] ? security_fs_context_parse_param+0x81/0xb0 [ 902.965632][T15017] ? logfc+0x700/0x700 [ 902.969697][T15017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 902.975932][T15017] ? vfs_parse_fs_param+0xcd/0x540 [ 902.981036][T15017] ? kfree+0x1fd/0x2c0 [ 902.985107][T15017] ? vfs_parse_fs_string+0x116/0x170 [ 902.990401][T15017] ? vfs_parse_fs_param+0x540/0x540 [ 902.995594][T15017] ? btrfs_decode_error+0x70/0x70 [ 903.000612][T15017] legacy_get_tree+0x108/0x220 [ 903.005396][T15017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 903.011634][T15017] vfs_get_tree+0x8e/0x390 [ 903.016047][T15017] fc_mount+0x17/0xc0 [ 903.020028][T15017] vfs_kern_mount.part.0+0xd8/0xf0 [ 903.025137][T15017] vfs_kern_mount+0x40/0x60 [ 903.029639][T15017] btrfs_mount+0x2b4/0x15e2 [ 903.034135][T15017] ? __kasan_check_read+0x11/0x20 [ 903.039166][T15017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 903.045402][T15017] ? should_fail+0x1de/0x852 [ 903.050000][T15017] ? fault_create_debugfs_attr+0x180/0x180 [ 903.055803][T15017] ? btrfs_remount+0x10f0/0x10f0 [ 903.060739][T15017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 903.066990][T15017] ? refcount_sub_and_test_checked+0x154/0x200 [ 903.073142][T15017] ? refcount_dec_not_one+0x1f0/0x1f0 [ 903.078513][T15017] ? legacy_parse_param+0x116/0x880 [ 903.083706][T15017] ? __lookup_constant+0xd6/0x100 [ 903.088727][T15017] ? refcount_dec_and_test_checked+0x1b/0x20 [ 903.094711][T15017] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 903.100952][T15017] ? apparmor_capable+0x2ed/0x630 [ 903.106032][T15017] ? cap_capable+0x205/0x270 [ 903.110623][T15017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 903.116858][T15017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 903.123096][T15017] ? btrfs_remount+0x10f0/0x10f0 [ 903.128031][T15017] legacy_get_tree+0x108/0x220 [ 903.132793][T15017] ? legacy_get_tree+0x108/0x220 [ 903.137734][T15017] vfs_get_tree+0x8e/0x390 [ 903.142150][T15017] do_mount+0x13b3/0x1c30 [ 903.146479][T15017] ? copy_mount_string+0x40/0x40 [ 903.151418][T15017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 903.157658][T15017] ? copy_mount_options+0x2e8/0x3f0 [ 903.162853][T15017] ksys_mount+0xdb/0x150 [ 903.167097][T15017] __x64_sys_mount+0xbe/0x150 [ 903.171774][T15017] do_syscall_64+0xfd/0x6a0 [ 903.176281][T15017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 903.182174][T15017] RIP: 0033:0x45c2ca [ 903.186067][T15017] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 903.205668][T15017] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 903.214087][T15017] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 903.222056][T15017] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 903.230024][T15017] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 903.238084][T15017] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 903.246069][T15017] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:25 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000001100), 0x0) 19:37:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000006000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:25 executing program 5: r0 = fanotify_init(0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:37:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:37:25 executing program 1: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x0, 0x4, @local, 0x1e}]}, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 19:37:25 executing program 3 (fault-call:0 fault-nth:86): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 903.748852][T15026] FAULT_INJECTION: forcing a failure. [ 903.748852][T15026] name failslab, interval 1, probability 0, space 0, times 0 [ 903.761568][T15026] CPU: 0 PID: 15026 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 903.769540][T15026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 903.769547][T15026] Call Trace: [ 903.769567][T15026] dump_stack+0x172/0x1f0 [ 903.769592][T15026] should_fail.cold+0xa/0x15 [ 903.782931][T15026] ? fault_create_debugfs_attr+0x180/0x180 [ 903.782954][T15026] __should_failslab+0x121/0x190 [ 903.782973][T15026] should_failslab+0x9/0x14 [ 903.807066][T15026] kmem_cache_alloc+0x47/0x710 [ 903.811837][T15026] ? __kasan_check_read+0x11/0x20 [ 903.816875][T15026] ? try_charge+0xb52/0x1440 [ 903.821470][T15026] xas_alloc+0x346/0x460 [ 903.825712][T15026] xas_create+0x2cd/0x1060 [ 903.830132][T15026] ? mark_held_locks+0xf0/0xf0 [ 903.834901][T15026] xas_store+0x9a/0x1a00 [ 903.839145][T15026] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 903.845383][T15026] ? xas_start+0x166/0x560 [ 903.849817][T15026] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 903.856054][T15026] ? xas_load+0x67/0x150 [ 903.860309][T15026] __add_to_page_cache_locked+0x5d8/0xec0 [ 903.866043][T15026] ? __kasan_check_read+0x11/0x20 [ 903.871078][T15026] ? __page_cache_alloc+0x480/0x480 [ 903.876276][T15026] ? __alloc_pages_nodemask+0x578/0x900 [ 903.881828][T15026] ? shadow_lru_isolate+0x430/0x430 [ 903.887169][T15026] add_to_page_cache_lru+0x1d8/0x790 [ 903.892458][T15026] ? add_to_page_cache_locked+0x40/0x40 [ 903.898015][T15026] ? __page_cache_alloc+0x116/0x480 [ 903.903214][T15026] ? iput+0x535/0x8b0 [ 903.907205][T15026] do_read_cache_page+0x499/0xb90 [ 903.912235][T15026] read_cache_page_gfp+0x28/0x30 [ 903.917181][T15026] btrfs_scan_one_device+0x19b/0x710 [ 903.922466][T15026] ? device_list_add+0x14f0/0x14f0 [ 903.927575][T15026] ? trace_hardirqs_on+0x20/0x240 [ 903.932598][T15026] ? btrfs_mount_root+0xb2f/0x1290 [ 903.937707][T15026] btrfs_mount_root+0x711/0x1290 [ 903.942651][T15026] ? btrfs_decode_error+0x70/0x70 [ 903.947677][T15026] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 903.953917][T15026] ? legacy_parse_param+0x116/0x880 [ 903.959112][T15026] ? __lookup_constant+0xd6/0x100 [ 903.964423][T15026] ? security_fs_context_parse_param+0x81/0xb0 [ 903.970573][T15026] ? logfc+0x700/0x700 [ 903.974641][T15026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 903.980888][T15026] ? vfs_parse_fs_param+0xcd/0x540 [ 903.985999][T15026] ? kfree+0x1fd/0x2c0 [ 903.990071][T15026] ? vfs_parse_fs_string+0x116/0x170 [ 903.995351][T15026] ? vfs_parse_fs_param+0x540/0x540 [ 904.000544][T15026] ? btrfs_decode_error+0x70/0x70 [ 904.005564][T15026] legacy_get_tree+0x108/0x220 [ 904.010326][T15026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 904.016588][T15026] vfs_get_tree+0x8e/0x390 [ 904.021001][T15026] fc_mount+0x17/0xc0 [ 904.024986][T15026] vfs_kern_mount.part.0+0xd8/0xf0 [ 904.030461][T15026] vfs_kern_mount+0x40/0x60 [ 904.034967][T15026] btrfs_mount+0x2b4/0x15e2 [ 904.039557][T15026] ? __kasan_check_read+0x11/0x20 [ 904.044579][T15026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 904.050817][T15026] ? should_fail+0x1de/0x852 [ 904.055412][T15026] ? fault_create_debugfs_attr+0x180/0x180 [ 904.061215][T15026] ? btrfs_remount+0x10f0/0x10f0 [ 904.066149][T15026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 904.072385][T15026] ? refcount_sub_and_test_checked+0x154/0x200 [ 904.078539][T15026] ? refcount_dec_not_one+0x1f0/0x1f0 [ 904.083908][T15026] ? legacy_parse_param+0x116/0x880 [ 904.089102][T15026] ? __lookup_constant+0xd6/0x100 [ 904.094131][T15026] ? refcount_dec_and_test_checked+0x1b/0x20 [ 904.100107][T15026] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 904.106341][T15026] ? apparmor_capable+0x2ed/0x630 [ 904.111358][T15026] ? cap_capable+0x205/0x270 [ 904.115945][T15026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 904.122182][T15026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 904.128418][T15026] ? btrfs_remount+0x10f0/0x10f0 [ 904.133349][T15026] legacy_get_tree+0x108/0x220 [ 904.138113][T15026] ? legacy_get_tree+0x108/0x220 [ 904.143051][T15026] vfs_get_tree+0x8e/0x390 [ 904.147470][T15026] do_mount+0x13b3/0x1c30 [ 904.151800][T15026] ? copy_mount_string+0x40/0x40 [ 904.156743][T15026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 904.162980][T15026] ? copy_mount_options+0x2e8/0x3f0 [ 904.168179][T15026] ksys_mount+0xdb/0x150 [ 904.172421][T15026] __x64_sys_mount+0xbe/0x150 [ 904.177097][T15026] do_syscall_64+0xfd/0x6a0 [ 904.181599][T15026] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 904.187497][T15026] RIP: 0033:0x45c2ca [ 904.191389][T15026] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 904.210986][T15026] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 904.219388][T15026] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 904.227350][T15026] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 904.235313][T15026] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 19:37:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000007000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:26 executing program 2: poll(&(0x7f0000000000)=[{}, {}], 0x2, 0xff) [ 904.243280][T15026] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 904.251253][T15026] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:26 executing program 1: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x0, 0x0, @local, 0x1e}]}, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 19:37:26 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:37:26 executing program 3 (fault-call:0 fault-nth:87): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:26 executing program 1: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x0, 0x0, @local}]}, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 19:37:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed000000003f000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 904.493951][T15146] FAULT_INJECTION: forcing a failure. [ 904.493951][T15146] name failslab, interval 1, probability 0, space 0, times 0 [ 904.514431][T15146] CPU: 1 PID: 15146 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 904.522445][T15146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 904.532611][T15146] Call Trace: [ 904.535902][T15146] dump_stack+0x172/0x1f0 [ 904.540235][T15146] should_fail.cold+0xa/0x15 [ 904.546329][T15146] ? fault_create_debugfs_attr+0x180/0x180 [ 904.552133][T15146] ? page_to_nid.part.0+0x20/0x20 [ 904.557156][T15146] ? ___might_sleep+0x163/0x280 [ 904.562003][T15146] __should_failslab+0x121/0x190 [ 904.566939][T15146] should_failslab+0x9/0x14 [ 904.571439][T15146] kmem_cache_alloc+0x2aa/0x710 [ 904.576285][T15146] ? __wait_on_bit+0x180/0x180 [ 904.581052][T15146] ? var_wake_function+0x140/0x140 [ 904.586162][T15146] getname_kernel+0x53/0x370 [ 904.590752][T15146] kern_path+0x20/0x40 [ 904.594832][T15146] lookup_bdev.part.0+0x7b/0x1b0 [ 904.599778][T15146] ? blkdev_open+0x290/0x290 [ 904.604367][T15146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 904.610602][T15146] ? btrfs_read_dev_super+0x8e/0xd0 [ 904.615795][T15146] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 904.621513][T15146] blkdev_get_by_path+0x81/0x130 [ 904.626452][T15146] btrfs_get_bdev_and_sb+0x38/0x300 [ 904.631645][T15146] open_fs_devices+0x6e7/0xc40 [ 904.636414][T15146] ? btrfs_uuid_rescan_kthread+0x60/0x60 [ 904.642050][T15146] ? btrfs_scan_one_device+0x5ac/0x710 [ 904.647512][T15146] btrfs_open_devices+0x140/0x160 [ 904.652537][T15146] btrfs_mount_root+0x793/0x1290 [ 904.657476][T15146] ? btrfs_decode_error+0x70/0x70 [ 904.662679][T15146] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 904.668917][T15146] ? legacy_parse_param+0x116/0x880 [ 904.674114][T15146] ? __lookup_constant+0xd6/0x100 [ 904.679134][T15146] ? security_fs_context_parse_param+0x81/0xb0 [ 904.685283][T15146] ? logfc+0x700/0x700 [ 904.689360][T15146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 904.695608][T15146] ? vfs_parse_fs_param+0xcd/0x540 [ 904.700713][T15146] ? kfree+0x1fd/0x2c0 [ 904.704788][T15146] ? vfs_parse_fs_string+0x116/0x170 [ 904.710074][T15146] ? vfs_parse_fs_param+0x540/0x540 [ 904.715284][T15146] ? btrfs_decode_error+0x70/0x70 [ 904.720323][T15146] legacy_get_tree+0x108/0x220 [ 904.725093][T15146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 904.731336][T15146] vfs_get_tree+0x8e/0x390 [ 904.735750][T15146] fc_mount+0x17/0xc0 [ 904.739735][T15146] vfs_kern_mount.part.0+0xd8/0xf0 [ 904.744931][T15146] vfs_kern_mount+0x40/0x60 [ 904.749435][T15146] btrfs_mount+0x2b4/0x15e2 [ 904.753936][T15146] ? __kasan_check_read+0x11/0x20 [ 904.758959][T15146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 904.765201][T15146] ? should_fail+0x1de/0x852 [ 904.769790][T15146] ? fault_create_debugfs_attr+0x180/0x180 [ 904.775594][T15146] ? btrfs_remount+0x10f0/0x10f0 [ 904.780530][T15146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 904.786768][T15146] ? refcount_sub_and_test_checked+0x154/0x200 [ 904.792917][T15146] ? refcount_dec_not_one+0x1f0/0x1f0 [ 904.798296][T15146] ? legacy_parse_param+0x116/0x880 [ 904.803495][T15146] ? __lookup_constant+0xd6/0x100 [ 904.808518][T15146] ? refcount_dec_and_test_checked+0x1b/0x20 [ 904.814497][T15146] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 904.820738][T15146] ? apparmor_capable+0x2ed/0x630 [ 904.825760][T15146] ? cap_capable+0x205/0x270 [ 904.830346][T15146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 904.836584][T15146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 904.842823][T15146] ? btrfs_remount+0x10f0/0x10f0 [ 904.847762][T15146] legacy_get_tree+0x108/0x220 [ 904.852532][T15146] ? legacy_get_tree+0x108/0x220 [ 904.857476][T15146] vfs_get_tree+0x8e/0x390 [ 904.861890][T15146] do_mount+0x13b3/0x1c30 [ 904.866219][T15146] ? copy_mount_string+0x40/0x40 [ 904.871158][T15146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 904.877397][T15146] ? copy_mount_options+0x2e8/0x3f0 [ 904.882597][T15146] ksys_mount+0xdb/0x150 [ 904.886837][T15146] __x64_sys_mount+0xbe/0x150 [ 904.891515][T15146] do_syscall_64+0xfd/0x6a0 [ 904.896019][T15146] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 904.901904][T15146] RIP: 0033:0x45c2ca [ 904.905804][T15146] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 904.925404][T15146] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 904.933902][T15146] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca 19:37:27 executing program 2: r0 = semget(0x1, 0x0, 0x0) semctl$GETPID(r0, 0x0, 0x4, 0x0) [ 904.942390][T15146] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 904.950360][T15146] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 904.958326][T15146] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 904.966295][T15146] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:28 executing program 5: r0 = fanotify_init(0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:37:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000200)="28c62b70e63eb6757a615135d306e9de83caa6601aac0a92fe20d3ea025a778066d68fad7964c1e5e47f14d399dc26", 0x2000022f}, {&(0x7f0000000400)="2652119f0cf50516307ba26108fba275a2c87f5634700b814812f9755cca1d98322c52b4e91de4fa1701d4885fba2612701d175c98dc90abdc8460dbcc608201280f2803e62298af633c5bd433a76df6705fd682db42588a628abb4471e33c86494bbe4e16ecbfd21639435d1b5fffbf51486052742d7413dd50144c6c83f8314b8c104b7acdeac50526d5bb75a35c1005eba6c901f8403d74fc059a23fdb75756cadf1bf1d3f39308f7d73596d6f937e4ee55a6b3b7f102053327cb55ffb46c97fb9e553af2f2eaa2ea296de41ff7733e60826e244e75f3393661e2ee1c19fe7b66021b3608e39a66bd131c0423e09164c855a3", 0xf4}, {&(0x7f0000001a40)="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", 0x26e}], 0x3}, 0x0) 19:37:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000040000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:28 executing program 3 (fault-call:0 fault-nth:88): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:28 executing program 1: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x0, 0x0, @local}]}, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) [ 906.774474][T15156] FAULT_INJECTION: forcing a failure. [ 906.774474][T15156] name failslab, interval 1, probability 0, space 0, times 0 [ 906.802636][T15156] CPU: 0 PID: 15156 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 906.810651][T15156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 906.820703][T15156] Call Trace: 19:37:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed00fffffff6000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 906.824183][T15156] dump_stack+0x172/0x1f0 [ 906.828525][T15156] should_fail.cold+0xa/0x15 [ 906.833121][T15156] ? alloc_page_buffers+0x16a/0x5c0 [ 906.838323][T15156] ? fault_create_debugfs_attr+0x180/0x180 [ 906.844133][T15156] ? btrfs_open_devices+0x140/0x160 [ 906.849335][T15156] ? find_get_entry+0x50e/0x880 [ 906.854189][T15156] ? __kasan_check_read+0x11/0x20 [ 906.859221][T15156] __should_failslab+0x121/0x190 [ 906.864158][T15156] should_failslab+0x9/0x14 [ 906.868667][T15156] kmem_cache_alloc+0x47/0x710 [ 906.873435][T15156] ? ___might_sleep+0x163/0x280 [ 906.878289][T15156] ? mempool_alloc+0x380/0x380 [ 906.883055][T15156] mempool_alloc_slab+0x47/0x60 [ 906.887911][T15156] mempool_alloc+0x169/0x380 [ 906.892504][T15156] ? workingset_refault+0xba0/0xba0 [ 906.897706][T15156] ? mempool_destroy+0x40/0x40 [ 906.902471][T15156] ? __kasan_check_write+0x14/0x20 [ 906.907587][T15156] ? lock_downgrade+0x920/0x920 [ 906.912447][T15156] ? rwlock_bug.part.0+0x90/0x90 [ 906.917385][T15156] ? __find_get_block+0x555/0xdb0 19:37:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed00fffffdfc000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 906.922416][T15156] bio_alloc_bioset+0x3b9/0x680 [ 906.927276][T15156] ? __find_get_block+0x330/0xdb0 [ 906.932302][T15156] ? bvec_alloc+0x2f0/0x2f0 [ 906.936805][T15156] ? __getblk_gfp+0x5c/0xa10 [ 906.941397][T15156] submit_bh_wbc+0x1c5/0x900 [ 906.946007][T15156] __bread_gfp+0x164/0x370 [ 906.950427][T15156] btrfs_read_dev_one_super+0xb6/0x2a0 [ 906.955889][T15156] btrfs_read_dev_super+0x6c/0xd0 [ 906.960917][T15156] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 906.966645][T15156] btrfs_get_bdev_and_sb+0xff/0x300 [ 906.971939][T15156] open_fs_devices+0x6e7/0xc40 [ 906.976719][T15156] ? btrfs_uuid_rescan_kthread+0x60/0x60 [ 906.982366][T15156] ? btrfs_scan_one_device+0x5ac/0x710 [ 906.987830][T15156] btrfs_open_devices+0x140/0x160 [ 906.992861][T15156] btrfs_mount_root+0x793/0x1290 [ 906.997803][T15156] ? btrfs_decode_error+0x70/0x70 [ 907.002833][T15156] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 907.009075][T15156] ? legacy_parse_param+0x116/0x880 [ 907.014268][T15156] ? __lookup_constant+0xd6/0x100 [ 907.019287][T15156] ? security_fs_context_parse_param+0x81/0xb0 [ 907.025445][T15156] ? logfc+0x700/0x700 [ 907.029519][T15156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 907.035762][T15156] ? vfs_parse_fs_param+0xcd/0x540 [ 907.040877][T15156] ? kfree+0x1fd/0x2c0 [ 907.044956][T15156] ? vfs_parse_fs_string+0x116/0x170 [ 907.050252][T15156] ? vfs_parse_fs_param+0x540/0x540 [ 907.055460][T15156] ? btrfs_decode_error+0x70/0x70 [ 907.060497][T15156] legacy_get_tree+0x108/0x220 [ 907.065266][T15156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 907.071511][T15156] vfs_get_tree+0x8e/0x390 [ 907.075927][T15156] fc_mount+0x17/0xc0 [ 907.079908][T15156] vfs_kern_mount.part.0+0xd8/0xf0 [ 907.085018][T15156] vfs_kern_mount+0x40/0x60 [ 907.089537][T15156] btrfs_mount+0x2b4/0x15e2 [ 907.094041][T15156] ? __kasan_check_read+0x11/0x20 [ 907.099063][T15156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 907.105303][T15156] ? should_fail+0x1de/0x852 [ 907.109891][T15156] ? fault_create_debugfs_attr+0x180/0x180 [ 907.115698][T15156] ? btrfs_remount+0x10f0/0x10f0 [ 907.120639][T15156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 907.126877][T15156] ? refcount_sub_and_test_checked+0x154/0x200 [ 907.133113][T15156] ? refcount_dec_not_one+0x1f0/0x1f0 [ 907.145522][T15156] ? legacy_parse_param+0x116/0x880 [ 907.150717][T15156] ? __lookup_constant+0xd6/0x100 [ 907.155739][T15156] ? refcount_dec_and_test_checked+0x1b/0x20 [ 907.161716][T15156] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 907.167953][T15156] ? apparmor_capable+0x2ed/0x630 [ 907.172969][T15156] ? cap_capable+0x205/0x270 [ 907.177555][T15156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 907.183799][T15156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 907.190208][T15156] ? btrfs_remount+0x10f0/0x10f0 [ 907.195141][T15156] legacy_get_tree+0x108/0x220 [ 907.199903][T15156] ? legacy_get_tree+0x108/0x220 [ 907.204839][T15156] vfs_get_tree+0x8e/0x390 [ 907.209255][T15156] do_mount+0x13b3/0x1c30 [ 907.213588][T15156] ? copy_mount_string+0x40/0x40 [ 907.218525][T15156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 907.224774][T15156] ? copy_mount_options+0x2e8/0x3f0 [ 907.229975][T15156] ksys_mount+0xdb/0x150 [ 907.234215][T15156] __x64_sys_mount+0xbe/0x150 [ 907.238890][T15156] do_syscall_64+0xfd/0x6a0 [ 907.243396][T15156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 907.249283][T15156] RIP: 0033:0x45c2ca [ 907.253178][T15156] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 907.272773][T15156] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 907.281177][T15156] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 907.289164][T15156] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 907.297137][T15156] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 907.305106][T15156] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 907.313070][T15156] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 19:37:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = gettid() ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 19:37:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed00fffffffe000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-aes-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292eabeef915d564c90c2000000", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfeed, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000000900)=""/4096, 0x1000, 0x0, 0x0, 0x0) 19:37:29 executing program 3 (fault-call:0 fault-nth:89): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 907.490970][T15280] FAULT_INJECTION: forcing a failure. [ 907.490970][T15280] name failslab, interval 1, probability 0, space 0, times 0 [ 907.517712][T15280] CPU: 1 PID: 15280 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 907.525719][T15280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 907.535778][T15280] Call Trace: [ 907.539085][T15280] dump_stack+0x172/0x1f0 [ 907.543421][T15280] should_fail.cold+0xa/0x15 [ 907.548013][T15280] ? fault_create_debugfs_attr+0x180/0x180 [ 907.553825][T15280] ? ___might_sleep+0x163/0x280 [ 907.558680][T15280] __should_failslab+0x121/0x190 [ 907.563616][T15280] should_failslab+0x9/0x14 [ 907.568114][T15280] __kmalloc+0x2e0/0x770 [ 907.572352][T15280] ? mark_held_locks+0xf0/0xf0 [ 907.577125][T15280] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 907.582845][T15280] tomoyo_realpath_from_path+0xcd/0x7b0 [ 907.588388][T15280] ? tomoyo_path_number_perm+0x193/0x520 [ 907.594023][T15280] tomoyo_path_number_perm+0x1dd/0x520 [ 907.599484][T15280] ? tomoyo_path_number_perm+0x193/0x520 [ 907.605120][T15280] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 907.610925][T15280] ? save_stack+0x5c/0x90 [ 907.615249][T15280] ? save_stack+0x23/0x90 [ 907.619574][T15280] ? __kasan_slab_free+0x102/0x150 [ 907.624687][T15280] ? kasan_slab_free+0xe/0x10 [ 907.629369][T15280] ? __kasan_check_read+0x11/0x20 [ 907.634400][T15280] ? __fget+0x384/0x560 [ 907.638554][T15280] ? ksys_dup3+0x3e0/0x3e0 [ 907.642970][T15280] tomoyo_file_ioctl+0x23/0x30 [ 907.647742][T15280] security_file_ioctl+0x77/0xc0 [ 907.652685][T15280] ksys_ioctl+0x57/0xd0 [ 907.656837][T15280] __x64_sys_ioctl+0x73/0xb0 [ 907.661425][T15280] do_syscall_64+0xfd/0x6a0 [ 907.666033][T15280] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 907.671927][T15280] RIP: 0033:0x4596e7 19:37:29 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r1) close(r2) pipe(&(0x7f0000000240)) splice(r0, 0x0, r2, 0x0, 0x2, 0x0) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="4c741cd9a56b6e0d728320f58d0c23c8f09a04acbb5bb110f989a35ab79d1f00000000000000b32b192252514f25430744b9ff0b225732b8761c3676073ffbcca2ec919039c40e5fe16061561f24abe9ca0f2f5a1414d1e8852a725f2027cc47495c0e"], 0x20000184) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write(r2, &(0x7f0000000200)='8', 0x1) ioctl$int_in(r2, 0x5421, &(0x7f0000000040)=0x3ff) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="9a", 0x1}], 0x1, 0x0) write(r0, &(0x7f0000000140)="2400000012005f3414f9f40700090400818a0400"/36, 0x24) [ 907.675821][T15280] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 907.695423][T15280] RSP: 002b:00007f901b50ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 907.703831][T15280] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 00000000004596e7 [ 907.711802][T15280] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 907.719767][T15280] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 907.727735][T15280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 19:37:29 executing program 5: r0 = fanotify_init(0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/133, 0x17}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r1, 0x1000000000013) 19:37:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed00fcfdffff000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:29 executing program 1: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x0, 0x0, @local}]}, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) [ 907.735726][T15280] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 907.751745][T15280] ERROR: Out of memory at tomoyo_realpath_from_path. 19:37:30 executing program 3 (fault-call:0 fault-nth:90): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed00f6ffffff000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:37:30 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) [ 907.912477][T15501] FAULT_INJECTION: forcing a failure. [ 907.912477][T15501] name failslab, interval 1, probability 0, space 0, times 0 [ 907.935397][T15501] CPU: 1 PID: 15501 Comm: syz-executor.3 Not tainted 5.3.0-rc6 #127 [ 907.943402][T15501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 907.953455][T15501] Call Trace: [ 907.956747][T15501] dump_stack+0x172/0x1f0 [ 907.961270][T15501] should_fail.cold+0xa/0x15 [ 907.965864][T15501] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 907.971937][T15501] ? fault_create_debugfs_attr+0x180/0x180 [ 907.977743][T15501] ? page_to_nid.part.0+0x20/0x20 [ 907.982766][T15501] ? ___might_sleep+0x163/0x280 [ 907.987622][T15501] __should_failslab+0x121/0x190 [ 907.992558][T15501] should_failslab+0x9/0x14 [ 907.997056][T15501] __kmalloc+0x2e0/0x770 [ 908.001295][T15501] ? fault_create_debugfs_attr+0x180/0x180 [ 908.007096][T15501] ? bio_alloc_bioset+0x40f/0x680 [ 908.012123][T15501] bio_alloc_bioset+0x40f/0x680 [ 908.016976][T15501] ? bvec_alloc+0x2f0/0x2f0 [ 908.021479][T15501] ? bd_set_size+0xb0/0xb0 [ 908.025889][T15501] ? wait_for_completion+0x440/0x440 [ 908.031174][T15501] ? blkdev_put+0xc0/0x560 [ 908.035590][T15501] btrfs_alloc_device+0xd3/0x720 [ 908.040521][T15501] ? btrfs_find_device_by_devspec+0x620/0x620 [ 908.046665][T15501] ? blkdev_put+0x98/0x560 [ 908.051089][T15501] close_fs_devices.part.0+0x1f2/0x7d0 [ 908.056549][T15501] btrfs_close_devices+0xa0/0x200 [ 908.061576][T15501] btrfs_mount_root+0xf42/0x1290 [ 908.066509][T15501] ? btrfs_decode_error+0x70/0x70 [ 908.071535][T15501] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 908.077779][T15501] ? legacy_parse_param+0x116/0x880 [ 908.082975][T15501] ? __lookup_constant+0xd6/0x100 [ 908.088000][T15501] ? security_fs_context_parse_param+0x81/0xb0 [ 908.094157][T15501] ? logfc+0x700/0x700 [ 908.098235][T15501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 908.104471][T15501] ? vfs_parse_fs_param+0xcd/0x540 [ 908.109583][T15501] ? kfree+0x1fd/0x2c0 [ 908.113655][T15501] ? vfs_parse_fs_string+0x116/0x170 [ 908.118940][T15501] ? vfs_parse_fs_param+0x540/0x540 [ 908.124136][T15501] ? btrfs_decode_error+0x70/0x70 [ 908.129157][T15501] legacy_get_tree+0x108/0x220 [ 908.133925][T15501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 908.140162][T15501] vfs_get_tree+0x8e/0x390 [ 908.144575][T15501] fc_mount+0x17/0xc0 [ 908.148554][T15501] vfs_kern_mount.part.0+0xd8/0xf0 [ 908.153664][T15501] vfs_kern_mount+0x40/0x60 [ 908.158167][T15501] btrfs_mount+0x2b4/0x15e2 [ 908.162663][T15501] ? __kasan_check_read+0x11/0x20 [ 908.167687][T15501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 908.173928][T15501] ? should_fail+0x1de/0x852 [ 908.178627][T15501] ? fault_create_debugfs_attr+0x180/0x180 [ 908.184431][T15501] ? btrfs_remount+0x10f0/0x10f0 [ 908.189371][T15501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 908.195607][T15501] ? refcount_sub_and_test_checked+0x154/0x200 [ 908.201756][T15501] ? refcount_dec_not_one+0x1f0/0x1f0 [ 908.207129][T15501] ? legacy_parse_param+0x116/0x880 [ 908.212413][T15501] ? __lookup_constant+0xd6/0x100 [ 908.217441][T15501] ? refcount_dec_and_test_checked+0x1b/0x20 [ 908.223416][T15501] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 908.229647][T15501] ? apparmor_capable+0x2ed/0x630 [ 908.234668][T15501] ? cap_capable+0x205/0x270 [ 908.239254][T15501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 908.245490][T15501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 908.251732][T15501] ? btrfs_remount+0x10f0/0x10f0 [ 908.256668][T15501] legacy_get_tree+0x108/0x220 [ 908.261433][T15501] ? legacy_get_tree+0x108/0x220 [ 908.266370][T15501] vfs_get_tree+0x8e/0x390 [ 908.270785][T15501] do_mount+0x13b3/0x1c30 [ 908.275117][T15501] ? copy_mount_string+0x40/0x40 [ 908.280055][T15501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 908.286290][T15501] ? copy_mount_options+0x2e8/0x3f0 [ 908.291490][T15501] ksys_mount+0xdb/0x150 [ 908.295740][T15501] __x64_sys_mount+0xbe/0x150 [ 908.300416][T15501] do_syscall_64+0xfd/0x6a0 [ 908.304925][T15501] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 908.310810][T15501] RIP: 0033:0x45c2ca [ 908.314704][T15501] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 908.334301][T15501] RSP: 002b:00007f901b50ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 908.342707][T15501] RAX: ffffffffffffffda RBX: 00007f901b50bb40 RCX: 000000000045c2ca [ 908.350671][T15501] RDX: 00007f901b50bae0 RSI: 0000000020000100 RDI: 00007f901b50bb00 [ 908.358643][T15501] RBP: 0000000000000001 R08: 00007f901b50bb40 R09: 00007f901b50bae0 [ 908.366609][T15501] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 908.374576][T15501] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 908.386229][T15501] ------------[ cut here ]------------