1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x2080c0, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000140)) r2 = fcntl$getown(0xffffffffffffffff, 0x9) sched_getparam(r2, &(0x7f0000000040)) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) creat(&(0x7f0000000000)='./bus\x00', 0x270) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000300)=0x80000001fe, 0x4) ftruncate(r6, 0x80006) sendfile(r5, r6, 0x0, 0x8000fffffffe) dup3(r4, r5, 0x0) 03:37:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:37:11 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x8c', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 429.695820][T18361] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a1e7 [ 429.695825][T18361] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000004 [ 429.695830][T18361] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 429.695835][T18361] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 429.695840][T18361] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 429.705292][T18361] ERROR: Out of memory at tomoyo_realpath_from_path. 03:37:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:37:11 executing program 4 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 429.979082][T18396] FAULT_INJECTION: forcing a failure. [ 429.979082][T18396] name failslab, interval 1, probability 0, space 0, times 0 [ 430.007017][T18396] CPU: 0 PID: 18396 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 430.014953][T18396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.025381][T18396] Call Trace: [ 430.028657][T18396] dump_stack+0x1fb/0x318 [ 430.032970][T18396] should_fail+0x555/0x770 [ 430.037374][T18396] __should_failslab+0x11a/0x160 [ 430.042305][T18396] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 430.048007][T18396] should_failslab+0x9/0x20 [ 430.052487][T18396] __kmalloc+0x7a/0x340 [ 430.056620][T18396] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 430.062318][T18396] tomoyo_realpath_from_path+0xdc/0x7c0 [ 430.067846][T18396] tomoyo_path_perm+0x192/0x850 [ 430.072695][T18396] tomoyo_path_truncate+0x1c/0x20 [ 430.077697][T18396] security_path_truncate+0xd5/0x150 [ 430.082962][T18396] do_sys_ftruncate+0x493/0x710 [ 430.087793][T18396] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 430.093510][T18396] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 430.098946][T18396] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 430.104640][T18396] ? do_syscall_64+0x1d/0x1c0 [ 430.109296][T18396] __x64_sys_ftruncate+0x60/0x70 [ 430.114211][T18396] do_syscall_64+0xf7/0x1c0 [ 430.118690][T18396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.124557][T18396] RIP: 0033:0x45a1e7 [ 430.128433][T18396] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 430.148015][T18396] RSP: 002b:00007fdb10196a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 430.156405][T18396] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a1e7 [ 430.164354][T18396] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000004 [ 430.172304][T18396] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 430.180250][T18396] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 430.188199][T18396] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 430.203406][T18396] ERROR: Out of memory at tomoyo_realpath_from_path. 03:37:11 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000040)=0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000140)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x8, 0x0, 0x40) write(0xffffffffffffffff, &(0x7f0000000400)="2400000025007f000000000000007701000000ff67194d8d83e7412f0fa857c83f05a19c107651a95d2e82eb4cf5cfaa34c7a111ddff89", 0x37) syz_open_procfs(0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f00000000c0)={0x800, 0x0, 0x1, 0x8, 0x7}) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r6, 0x4400ae8f, &(0x7f0000001a40)={"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"}) ioctl$KVM_SET_MP_STATE(r6, 0x4004ae99, &(0x7f0000000080)=0x10000000002) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) r7 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x0, 0x4000) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f0000000100)=0x8) ioctl$KVM_RUN(r6, 0xae80, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r9 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r8, r9, 0x0) setsockopt$TIPC_GROUP_LEAVE(r9, 0x10f, 0x88) 03:37:11 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\xf6', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:37:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:11 executing program 4 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:11 executing program 1: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 430.409310][T18415] FAULT_INJECTION: forcing a failure. [ 430.409310][T18415] name failslab, interval 1, probability 0, space 0, times 0 [ 430.485536][T18415] CPU: 0 PID: 18415 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 430.493620][T18415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.503717][T18415] Call Trace: [ 430.507014][T18415] dump_stack+0x1fb/0x318 [ 430.511355][T18415] should_fail+0x555/0x770 [ 430.515786][T18415] __should_failslab+0x11a/0x160 [ 430.520736][T18415] ? tomoyo_encode2+0x273/0x5a0 [ 430.525605][T18415] should_failslab+0x9/0x20 [ 430.530115][T18415] __kmalloc+0x7a/0x340 [ 430.530133][T18415] tomoyo_encode2+0x273/0x5a0 [ 430.530152][T18415] ? dynamic_dname+0xf0/0xf0 [ 430.538951][T18415] tomoyo_realpath_from_path+0x769/0x7c0 [ 430.538971][T18415] tomoyo_path_perm+0x192/0x850 [ 430.539008][T18415] tomoyo_path_truncate+0x1c/0x20 [ 430.559029][T18415] security_path_truncate+0xd5/0x150 [ 430.564311][T18415] do_sys_ftruncate+0x493/0x710 [ 430.569153][T18415] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 430.574853][T18415] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 430.580287][T18415] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 430.585981][T18415] ? do_syscall_64+0x1d/0x1c0 [ 430.590636][T18415] __x64_sys_ftruncate+0x60/0x70 [ 430.595559][T18415] do_syscall_64+0xf7/0x1c0 [ 430.600046][T18415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.605914][T18415] RIP: 0033:0x45a1e7 [ 430.609806][T18415] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:37:12 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:12 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000040)=0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000140)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x8, 0x0, 0x40) write(0xffffffffffffffff, &(0x7f0000000400)="2400000025007f000000000000007701000000ff67194d8d83e7412f0fa857c83f05a19c107651a95d2e82eb4cf5cfaa34c7a111ddff89", 0x37) syz_open_procfs(0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f00000000c0)={0x800, 0x0, 0x1, 0x8, 0x7}) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r6, 0x4400ae8f, &(0x7f0000001a40)={"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"}) ioctl$KVM_SET_MP_STATE(r6, 0x4004ae99, &(0x7f0000000080)=0x10000000002) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) r7 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x0, 0x4000) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f0000000100)=0x8) ioctl$KVM_RUN(r6, 0xae80, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r9 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r8, r9, 0x0) setsockopt$TIPC_GROUP_LEAVE(r9, 0x10f, 0x88) [ 430.629676][T18415] RSP: 002b:00007fdb10196a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 430.638082][T18415] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a1e7 [ 430.646040][T18415] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000004 [ 430.653993][T18415] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 430.661944][T18415] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 430.669913][T18415] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:37:12 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 430.765051][T18415] ERROR: Out of memory at tomoyo_realpath_from_path. 03:37:12 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:12 executing program 3: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:12 executing program 4 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:12 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 431.238858][T18457] FAULT_INJECTION: forcing a failure. [ 431.238858][T18457] name fail_page_alloc, interval 1, probability 0, space 0, times 1 03:37:12 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:12 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001800000000000000000000001d01000008000e00", @ANYRES32=0x0, @ANYBLOB="1844a100400000000003"], 0x3}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x14f, 0x400}], 0x8, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000023c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000c76f4503775e3a23a7073a903fcb683e13e4cb99411d32a969f57fb87e54d66704d2654729"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)=@setlink={0x98, 0x13, 0x281, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_XDP={0x78, 0x2b, [@IFLA_XDP_FD={0x4, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}}]}]}, 0x98}}, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8, 0x7, 0x400, 0x0, 0x20, 0x80000000, r4}) [ 431.337283][T18457] CPU: 1 PID: 18457 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 431.345217][T18457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.355275][T18457] Call Trace: [ 431.358577][T18457] dump_stack+0x1fb/0x318 [ 431.363101][T18457] should_fail+0x555/0x770 [ 431.367538][T18457] should_fail_alloc_page+0x55/0x60 [ 431.372759][T18457] prepare_alloc_pages+0x283/0x460 [ 431.377880][T18457] __alloc_pages_nodemask+0xb2/0x5d0 [ 431.383179][T18457] alloc_pages_vma+0x4f7/0xd50 [ 431.388389][T18457] shmem_alloc_and_acct_page+0x425/0xbb0 [ 431.394037][T18457] shmem_getpage_gfp+0x2313/0x2a90 [ 431.399159][T18457] shmem_write_begin+0xcb/0x1b0 [ 431.403999][T18457] generic_perform_write+0x25d/0x4e0 [ 431.409272][T18457] __generic_file_write_iter+0x235/0x500 [ 431.414888][T18457] generic_file_write_iter+0x48e/0x630 [ 431.420330][T18457] __vfs_write+0x5a1/0x740 [ 431.424744][T18457] vfs_write+0x275/0x590 [ 431.428967][T18457] __x64_sys_pwrite64+0x162/0x1d0 [ 431.433974][T18457] do_syscall_64+0xf7/0x1c0 [ 431.438460][T18457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.444333][T18457] RIP: 0033:0x414017 [ 431.448219][T18457] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 431.467937][T18457] RSP: 002b:00007fdb10196a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 431.476419][T18457] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000414017 [ 431.484386][T18457] RDX: 0000000000000048 RSI: 00000000200002c0 RDI: 0000000000000004 [ 431.492357][T18457] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 431.500305][T18457] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 431.508270][T18457] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 431.642509][T18476] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 431.661158][T18471] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 431.705008][T18471] EXT4-fs (loop3): bad geometry: block count 1080 exceeds size of device (1 blocks) 03:37:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:37:15 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:15 executing program 4 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r2, @ANYBLOB="000000001fc737f53456ec86cd000000001c001200140001006272696467655f736c6180650000000004000500"], 0x3c}}, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x20280, 0x0) ioctl$BLKFRASET(r3, 0x1264, &(0x7f00000000c0)=0x1) socket$inet6_tcp(0xa, 0x1, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r5 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r4, r5, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r5, 0xc0104320, &(0x7f0000000240)={0x352b, &(0x7f00000001c0)="6c88154d7a3afeee972f4f10cd45a52d7fe8ff22e5dac1d7ec87fde92f62e2b4d3a8914f1ce6a5c19c3d850c6a0d4dc45796ef6e2273f43a685c15f246008fc4bb04e69b5b"}) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$BLKTRACETEARDOWN(r6, 0x1276, 0x0) 03:37:15 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0xd03a80, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./bus\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB, @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000040000,user', @ANYRESDEC=0x0, @ANYBLOB=',group_', @ANYRESDEC=0x0, @ANYBLOB=',aow_other\x00\x00,default_permissions,blksize=0x0000000000000000,default_permissions,allow_other,allow_other,blksize=0x0000000000000800,default_permissions,max_read=0x0000000000000001,blksize=0']) read$FUSE(r3, 0x0, 0x0) read$FUSE(r3, &(0x7f0000003000), 0x1150) mount(&(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='./file1/../file0\x00', &(0x7f00000002c0)='reiserfs\x00', 0x20000, &(0x7f0000000300)='io.stat\x00') ftruncate(r0, 0x48280) r4 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000004c0)='./file0\x00') rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00') write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x20000000000001cb, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x79, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) syz_open_procfs(0x0, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r5, r6, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r6, 0xae44, 0x2) [ 433.526639][T18493] FAULT_INJECTION: forcing a failure. [ 433.526639][T18493] name failslab, interval 1, probability 0, space 0, times 0 [ 433.539571][T18493] CPU: 0 PID: 18493 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 433.547459][T18493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.557506][T18493] Call Trace: [ 433.560784][T18493] dump_stack+0x1fb/0x318 [ 433.565100][T18493] should_fail+0x555/0x770 [ 433.569497][T18493] __should_failslab+0x11a/0x160 [ 433.574417][T18493] ? xas_create+0x1197/0x1910 [ 433.579069][T18493] should_failslab+0x9/0x20 [ 433.583577][T18493] kmem_cache_alloc+0x56/0x2e0 [ 433.588341][T18493] xas_create+0x1197/0x1910 [ 433.592955][T18493] xas_create_range+0x142/0x700 [ 433.597802][T18493] shmem_add_to_page_cache+0x91e/0x1290 [ 433.603344][T18493] shmem_getpage_gfp+0x121e/0x2a90 [ 433.608455][T18493] shmem_write_begin+0xcb/0x1b0 [ 433.613288][T18493] generic_perform_write+0x25d/0x4e0 [ 433.618560][T18493] __generic_file_write_iter+0x235/0x500 [ 433.624171][T18493] generic_file_write_iter+0x48e/0x630 [ 433.629613][T18493] __vfs_write+0x5a1/0x740 [ 433.634026][T18493] vfs_write+0x275/0x590 [ 433.638250][T18493] __x64_sys_pwrite64+0x162/0x1d0 [ 433.643253][T18493] do_syscall_64+0xf7/0x1c0 [ 433.647735][T18493] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.653605][T18493] RIP: 0033:0x414017 [ 433.657479][T18493] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 433.677075][T18493] RSP: 002b:00007fdb10196a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 433.685470][T18493] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000414017 [ 433.693422][T18493] RDX: 0000000000000048 RSI: 00000000200002c0 RDI: 0000000000000004 [ 433.701378][T18493] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 433.709328][T18493] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 433.717278][T18493] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 433.736151][T18494] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 03:37:15 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 433.769363][ T26] audit: type=1804 audit(2000000235.289:57): pid=18490 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir312005040/syzkaller.lJMcXL/280/bus" dev="sda1" ino=17041 res=1 03:37:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 433.892405][ T26] audit: type=1804 audit(2000000235.349:58): pid=18490 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir312005040/syzkaller.lJMcXL/280/bus" dev="sda1" ino=17041 res=1 03:37:15 executing program 4 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:15 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x2, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 434.125402][T18520] FAULT_INJECTION: forcing a failure. [ 434.125402][T18520] name failslab, interval 1, probability 0, space 0, times 0 [ 434.145869][T18520] CPU: 1 PID: 18520 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 434.153890][T18520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.163952][T18520] Call Trace: [ 434.167275][T18520] dump_stack+0x1fb/0x318 [ 434.171613][T18520] should_fail+0x555/0x770 [ 434.176031][T18520] __should_failslab+0x11a/0x160 [ 434.180968][T18520] ? getname_flags+0xba/0x640 [ 434.185643][T18520] should_failslab+0x9/0x20 [ 434.190147][T18520] kmem_cache_alloc+0x56/0x2e0 [ 434.194910][T18520] ? check_preemption_disabled+0xb7/0x2a0 [ 434.200632][T18520] getname_flags+0xba/0x640 [ 434.205131][T18520] getname+0x19/0x20 [ 434.209018][T18520] do_sys_open+0x261/0x560 [ 434.213431][T18520] __x64_sys_open+0x87/0x90 [ 434.217928][T18520] do_syscall_64+0xf7/0x1c0 [ 434.222425][T18520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.228311][T18520] RIP: 0033:0x413fb1 [ 434.232198][T18520] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 434.251808][T18520] RSP: 002b:00007fdb10196a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 434.260220][T18520] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413fb1 [ 434.268190][T18520] RDX: 00007fdb10196b0a RSI: 0000000000000002 RDI: 00007fdb10196b00 [ 434.277195][T18520] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 434.285163][T18520] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 434.293128][T18520] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:37:15 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x3, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 434.332953][ T26] audit: type=1804 audit(2000000235.849:59): pid=18490 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir312005040/syzkaller.lJMcXL/280/bus" dev="sda1" ino=17041 res=1 03:37:15 executing program 4 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:16 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x300, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 434.485721][T18494] bridge0: port 1(bridge_slave_0) entered disabled state [ 434.511765][T18536] FAULT_INJECTION: forcing a failure. [ 434.511765][T18536] name failslab, interval 1, probability 0, space 0, times 0 [ 434.585332][T18536] CPU: 1 PID: 18536 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 434.593276][T18536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.603337][T18536] Call Trace: [ 434.606632][T18536] dump_stack+0x1fb/0x318 [ 434.610965][T18536] should_fail+0x555/0x770 [ 434.615382][T18536] __should_failslab+0x11a/0x160 [ 434.620316][T18536] ? getname_flags+0xba/0x640 [ 434.624993][T18536] should_failslab+0x9/0x20 [ 434.629521][T18536] kmem_cache_alloc+0x56/0x2e0 [ 434.634281][T18536] ? check_preemption_disabled+0xb7/0x2a0 [ 434.639978][T18536] getname_flags+0xba/0x640 [ 434.644476][T18536] getname+0x19/0x20 [ 434.648363][T18536] do_sys_open+0x261/0x560 [ 434.652788][T18536] __x64_sys_open+0x87/0x90 [ 434.657333][T18536] do_syscall_64+0xf7/0x1c0 [ 434.661828][T18536] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.667712][T18536] RIP: 0033:0x413fb1 [ 434.671599][T18536] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 434.691206][T18536] RSP: 002b:00007fdb10196a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 434.699599][T18536] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413fb1 [ 434.707552][T18536] RDX: 00007fdb10196b0a RSI: 0000000000000002 RDI: 00007fdb10196b00 [ 434.715503][T18536] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 434.723549][T18536] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 03:37:16 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x4000, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef559", 0x98, 0x10000}], 0x0, 0x0) [ 434.731522][T18536] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 434.758135][T18501] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 03:37:16 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x600) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_aout(r3, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r3, 0x0, 0x8}) ioctl$LOOP_SET_FD(r3, 0x4c00, r0) ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, 0x0) gettid() chmod(&(0x7f0000000440)='./file0\x00', 0x44) 03:37:16 executing program 4 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:16 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x1000000, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 434.932128][T18557] FAULT_INJECTION: forcing a failure. [ 434.932128][T18557] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 434.945401][T18557] CPU: 0 PID: 18557 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 434.953287][T18557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.963353][T18557] Call Trace: [ 434.966652][T18557] dump_stack+0x1fb/0x318 [ 434.970995][T18557] should_fail+0x555/0x770 [ 434.975429][T18557] should_fail_alloc_page+0x55/0x60 [ 434.980632][T18557] prepare_alloc_pages+0x283/0x460 [ 434.985748][T18557] __alloc_pages_nodemask+0xb2/0x5d0 [ 434.991035][T18557] ? __kasan_check_write+0x14/0x20 [ 434.996410][T18557] kmem_getpages+0x4d/0xa00 [ 435.000913][T18557] cache_grow_begin+0x7e/0x2c0 [ 435.005680][T18557] cache_alloc_refill+0x311/0x3f0 [ 435.010710][T18557] ? check_preemption_disabled+0xb7/0x2a0 [ 435.016439][T18557] kmem_cache_alloc+0x2b9/0x2e0 [ 435.021290][T18557] ? getname_flags+0xba/0x640 [ 435.029187][T18557] getname_flags+0xba/0x640 [ 435.033699][T18557] getname+0x19/0x20 [ 435.037588][T18557] do_sys_open+0x261/0x560 [ 435.042007][T18557] __x64_sys_open+0x87/0x90 [ 435.046511][T18557] do_syscall_64+0xf7/0x1c0 [ 435.051015][T18557] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.056903][T18557] RIP: 0033:0x413fb1 [ 435.060798][T18557] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 435.080407][T18557] RSP: 002b:00007fdb10196a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 435.088820][T18557] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413fb1 [ 435.096797][T18557] RDX: 00007fdb10196b0a RSI: 0000000000000002 RDI: 00007fdb10196b00 [ 435.103747][ T26] audit: type=1804 audit(2000000236.479:60): pid=18556 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir866761161/syzkaller.dTzqIa/492/file0" dev="sda1" ino=17330 res=1 [ 435.104761][T18557] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 435.104771][T18557] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 435.144375][T18557] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 435.178265][ T26] audit: type=1804 audit(2000000236.529:61): pid=18556 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir866761161/syzkaller.dTzqIa/492/file0" dev="sda1" ino=17330 res=1 [ 435.790397][ T26] audit: type=1804 audit(2000000237.309:62): pid=18573 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir866761161/syzkaller.dTzqIa/492/file0" dev="sda1" ino=17330 res=1 03:37:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:37:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:18 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x2000000, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:18 executing program 3: clock_gettime(0x0, &(0x7f0000000340)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x124) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x18d, 0x6c00) 03:37:18 executing program 4 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) mq_open(&(0x7f0000000300)='%\x00', 0x800, 0x1, &(0x7f0000000340)) [ 436.990161][T18584] FAULT_INJECTION: forcing a failure. [ 436.990161][T18584] name failslab, interval 1, probability 0, space 0, times 0 [ 437.013706][T18584] CPU: 0 PID: 18584 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 437.021644][T18584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.031705][T18584] Call Trace: [ 437.034990][T18584] dump_stack+0x1fb/0x318 [ 437.039308][T18584] should_fail+0x555/0x770 [ 437.044496][T18584] __should_failslab+0x11a/0x160 [ 437.049414][T18584] ? tomoyo_encode2+0x273/0x5a0 [ 437.054244][T18584] should_failslab+0x9/0x20 [ 437.058725][T18584] __kmalloc+0x7a/0x340 [ 437.062859][T18584] tomoyo_encode2+0x273/0x5a0 [ 437.067516][T18584] tomoyo_realpath_from_path+0x769/0x7c0 [ 437.073135][T18584] tomoyo_check_open_permission+0x1ce/0x9d0 [ 437.079021][T18584] tomoyo_file_open+0x141/0x190 [ 437.083860][T18584] security_file_open+0x65/0x2f0 [ 437.088779][T18584] do_dentry_open+0x351/0x10c0 [ 437.093525][T18584] vfs_open+0x73/0x80 [ 437.097506][T18584] path_openat+0x1397/0x4420 [ 437.102100][T18584] do_filp_open+0x192/0x3d0 [ 437.106617][T18584] do_sys_open+0x29f/0x560 [ 437.111012][T18584] __x64_sys_open+0x87/0x90 [ 437.115494][T18584] do_syscall_64+0xf7/0x1c0 [ 437.119975][T18584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.125846][T18584] RIP: 0033:0x413fb1 [ 437.129717][T18584] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 437.149296][T18584] RSP: 002b:00007fdb10196a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 437.157683][T18584] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413fb1 [ 437.165727][T18584] RDX: 00007fdb10196b0a RSI: 0000000000000002 RDI: 00007fdb10196b00 [ 437.173676][T18584] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 437.181625][T18584] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 437.189574][T18584] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:37:18 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x3000000, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:18 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) statx(0xffffffffffffffff, 0x0, 0x4000, 0x200, &(0x7f0000000180)) 03:37:18 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0xa, 0xffffffffffffffff, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) sendmsg$kcm(r1, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000000100)}, 0x8082) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0xa) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x3f, 0x9, 0x0, 0x0, 0x0, 0x6, 0x120400, 0xb, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000000c0), 0x16}, 0x4880, 0xffffffff, 0x416, 0x3, 0x4, 0x0, 0x2}, 0x0, 0xc, r2, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r5, 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r5, 0x0, &(0x7f0000000140)=""/1}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r5, &(0x7f0000000680)="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", &(0x7f00000002c0)=""/107}, 0x20) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) close(0xffffffffffffffff) 03:37:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:18 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x40000000, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:19 executing program 3: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1fff07a46dfd1f7c839add5b64f5e900004a6fae4b85da632fd297bf7290652b3b7fcae47f82c59d8ac75a68f8ecbdb3f6f6cf82d668fc4c99f9418e8ebc35b9dda9979612c8242d9092b7ed8237c804b32e3c7aa634dde9e869c73d0aad9299a4bd85cf445894d8c28c17ff2ec823776a617694710a0a1d35673693b507bb152fc59be59515d5d64bd2add762b44dde9232342ebea40d820bd73cf80e28203e82367e99528750bad27f7e59c16ea95e1fed92e4"], 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @empty}, 0x0, 0x800) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x1671, 0x8001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x2) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r4, 0x0, 0x480, &(0x7f0000000380), &(0x7f0000000340)=0xffa7) r5 = socket(0xa, 0x1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r6, &(0x7f0000000280)=""/135, 0x74f) fcntl$lock(r6, 0x7, &(0x7f0000000600)={0x0, 0x1, 0x7ff}) r7 = accept4$inet6(r6, &(0x7f0000000240), &(0x7f00000003c0)=0x1c, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000001880)={{{@in=@remote, @in=@empty}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, 0x0) [ 437.493680][T18584] ERROR: Out of memory at tomoyo_realpath_from_path. 03:37:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:37:21 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x8cffffff, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:21 executing program 4 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:21 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0xa, 0xffffffffffffffff, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) sendmsg$kcm(r1, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000000100)}, 0x8082) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0xa) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x3f, 0x9, 0x0, 0x0, 0x0, 0x6, 0x120400, 0xb, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000000c0), 0x16}, 0x4880, 0xffffffff, 0x416, 0x3, 0x4, 0x0, 0x2}, 0x0, 0xc, r2, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r5, 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r5, 0x0, &(0x7f0000000140)=""/1}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r5, &(0x7f0000000680)="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", &(0x7f00000002c0)=""/107}, 0x20) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) close(0xffffffffffffffff) 03:37:21 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0xa, 0xffffffffffffffff, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) sendmsg$kcm(r1, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000000100)}, 0x8082) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0xa) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x3f, 0x9, 0x0, 0x0, 0x0, 0x6, 0x120400, 0xb, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000000c0), 0x16}, 0x4880, 0xffffffff, 0x416, 0x3, 0x4, 0x0, 0x2}, 0x0, 0xc, r2, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r5, 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r5, 0x0, &(0x7f0000000140)=""/1}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r5, &(0x7f0000000680)="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", &(0x7f00000002c0)=""/107}, 0x20) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) close(0xffffffffffffffff) [ 440.038345][T18635] FAULT_INJECTION: forcing a failure. [ 440.038345][T18635] name failslab, interval 1, probability 0, space 0, times 0 [ 440.118495][T18635] CPU: 0 PID: 18635 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 440.126432][T18635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.136520][T18635] Call Trace: [ 440.139820][T18635] dump_stack+0x1fb/0x318 [ 440.144173][T18635] should_fail+0x555/0x770 [ 440.148602][T18635] __should_failslab+0x11a/0x160 [ 440.153547][T18635] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 440.159274][T18635] should_failslab+0x9/0x20 [ 440.163786][T18635] __kmalloc+0x7a/0x340 03:37:21 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, 0x0) [ 440.167953][T18635] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 440.173687][T18635] tomoyo_realpath_from_path+0xdc/0x7c0 [ 440.179251][T18635] tomoyo_check_open_permission+0x1ce/0x9d0 [ 440.185180][T18635] tomoyo_file_open+0x141/0x190 [ 440.190035][T18635] security_file_open+0x65/0x2f0 [ 440.194964][T18635] do_dentry_open+0x351/0x10c0 [ 440.194995][T18635] vfs_open+0x73/0x80 [ 440.195006][T18635] path_openat+0x1397/0x4420 [ 440.195048][T18635] do_filp_open+0x192/0x3d0 [ 440.212931][T18635] do_sys_open+0x29f/0x560 [ 440.217362][T18635] __x64_sys_open+0x87/0x90 [ 440.221875][T18635] do_syscall_64+0xf7/0x1c0 [ 440.226471][T18635] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.232365][T18635] RIP: 0033:0x413fb1 [ 440.236263][T18635] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 440.256316][T18635] RSP: 002b:00007fdb10196a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 03:37:21 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0xf6ffffff, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 440.264722][T18635] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413fb1 [ 440.272678][T18635] RDX: 00007fdb10196b0a RSI: 0000000000000002 RDI: 00007fdb10196b00 [ 440.280628][T18635] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 440.288579][T18635] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 440.296533][T18635] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:37:21 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0xffffff8c, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:22 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0xfffffff6, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 440.523043][T18635] ERROR: Out of memory at tomoyo_realpath_from_path. 03:37:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(r0, 0x527486) 03:37:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:37:24 executing program 4 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:24 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x100000000000000, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000180)=ANY=[], 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000640)=ANY=[@ANYBLOB="1fff07a46dfd1f7c839add5b64f5e900004a6fae4b85da632fd297bf7290652b3b7fcae47f82c59d8ac75a68f8ecbdb3f6f6cf82d668fc4c99f9418e8ebc35b9dda9979612c8242d9092b7ed8237c804b32e3c7aa634dde9e869c73d0aad9299a4bd85cf445894d8c28c17ff2ec823776a617694710a0a1d35673693b507bb152fc59be59515d5d64bd2add762b44dde9232342ebea40d820bd73cf80e28203e82367e99528750bad27f7e59c16ea95e1fed92e4"], 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast2, 0x8}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) accept4$inet6(r1, 0x0, 0x0, 0x800) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x0, 0x2) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') sched_setattr(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x1671, 0x8001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0x2) r7 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r7, 0x0, 0x480, &(0x7f0000000380), &(0x7f0000000340)=0xffa7) r8 = socket(0xa, 0x1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r9, &(0x7f0000000280)=""/135, 0x74f) accept4$inet6(r9, &(0x7f0000000240), &(0x7f00000003c0)=0x1c, 0x800) ioctl$sock_inet6_SIOCADDRT(r8, 0x890b, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000480)='reno\x00', 0x5) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000500)) 03:37:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$KDGKBENT(r0, 0x4b46, 0x0) [ 443.138456][T18688] FAULT_INJECTION: forcing a failure. [ 443.138456][T18688] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 443.151702][T18688] CPU: 1 PID: 18688 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 443.151709][T18688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.151713][T18688] Call Trace: [ 443.151732][T18688] dump_stack+0x1fb/0x318 [ 443.151748][T18688] should_fail+0x555/0x770 [ 443.151763][T18688] should_fail_alloc_page+0x55/0x60 [ 443.177485][T18688] prepare_alloc_pages+0x283/0x460 [ 443.177500][T18688] __alloc_pages_nodemask+0xb2/0x5d0 [ 443.177520][T18688] kmem_getpages+0x4d/0xa00 [ 443.177534][T18688] cache_grow_begin+0x7e/0x2c0 [ 443.206715][T18688] cache_alloc_refill+0x311/0x3f0 [ 443.211725][T18688] ? check_preemption_disabled+0xb7/0x2a0 [ 443.217425][T18688] __kmalloc+0x318/0x340 [ 443.221643][T18688] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 443.227343][T18688] tomoyo_realpath_from_path+0xdc/0x7c0 [ 443.232871][T18688] tomoyo_check_open_permission+0x1ce/0x9d0 [ 443.238759][T18688] tomoyo_file_open+0x141/0x190 [ 443.243587][T18688] security_file_open+0x65/0x2f0 [ 443.248512][T18688] do_dentry_open+0x351/0x10c0 [ 443.253275][T18688] vfs_open+0x73/0x80 [ 443.257239][T18688] path_openat+0x1397/0x4420 [ 443.261832][T18688] do_filp_open+0x192/0x3d0 [ 443.266329][T18688] do_sys_open+0x29f/0x560 [ 443.270728][T18688] __x64_sys_open+0x87/0x90 [ 443.275215][T18688] do_syscall_64+0xf7/0x1c0 [ 443.282143][T18688] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.288015][T18688] RIP: 0033:0x413fb1 [ 443.291890][T18688] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 443.311477][T18688] RSP: 002b:00007fdb10196a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 443.319863][T18688] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413fb1 [ 443.327815][T18688] RDX: 00007fdb10196b0a RSI: 0000000000000002 RDI: 00007fdb10196b00 [ 443.335763][T18688] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 443.343711][T18688] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 443.351662][T18688] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:37:24 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x200000000000000, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40600) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readahead(r2, 0x0, 0x0) 03:37:25 executing program 4 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:25 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x300000000000000, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:25 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1a000900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:37:25 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 443.703005][T18723] FAULT_INJECTION: forcing a failure. [ 443.703005][T18723] name failslab, interval 1, probability 0, space 0, times 0 [ 443.723353][T18723] CPU: 0 PID: 18723 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 443.731375][T18723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.741436][T18723] Call Trace: [ 443.744733][T18723] dump_stack+0x1fb/0x318 [ 443.749072][T18723] should_fail+0x555/0x770 [ 443.753500][T18723] __should_failslab+0x11a/0x160 [ 443.758447][T18723] ? tomoyo_encode2+0x273/0x5a0 [ 443.763305][T18723] should_failslab+0x9/0x20 [ 443.767815][T18723] __kmalloc+0x7a/0x340 [ 443.771969][T18723] tomoyo_encode2+0x273/0x5a0 [ 443.776639][T18723] tomoyo_realpath_from_path+0x769/0x7c0 [ 443.782269][T18723] tomoyo_path_number_perm+0x166/0x640 [ 443.787725][T18723] ? smack_file_ioctl+0x226/0x2e0 [ 443.792728][T18723] ? __fget+0x411/0x510 [ 443.796864][T18723] tomoyo_file_ioctl+0x23/0x30 [ 443.801604][T18723] security_file_ioctl+0x6d/0xd0 [ 443.806520][T18723] __x64_sys_ioctl+0xa3/0x120 [ 443.811177][T18723] do_syscall_64+0xf7/0x1c0 [ 443.815659][T18723] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.821527][T18723] RIP: 0033:0x45a087 [ 443.825400][T18723] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 443.845761][T18723] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 443.854147][T18723] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 443.862095][T18723] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 443.870045][T18723] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 443.878016][T18723] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 443.885965][T18723] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 443.931199][T18723] ERROR: Out of memory at tomoyo_realpath_from_path. 03:37:27 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:37:27 executing program 1: 03:37:27 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x4000000000000000, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:27 executing program 3: 03:37:27 executing program 4 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 446.161749][T18740] FAULT_INJECTION: forcing a failure. [ 446.161749][T18740] name failslab, interval 1, probability 0, space 0, times 0 [ 446.226532][T18740] CPU: 1 PID: 18740 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 446.234469][T18740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.244703][T18740] Call Trace: [ 446.248002][T18740] dump_stack+0x1fb/0x318 [ 446.252352][T18740] should_fail+0x555/0x770 [ 446.256783][T18740] __should_failslab+0x11a/0x160 [ 446.261733][T18740] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 446.267462][T18740] should_failslab+0x9/0x20 [ 446.271975][T18740] __kmalloc+0x7a/0x340 03:37:27 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x8cffffff00000000, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:27 executing program 3: 03:37:27 executing program 1: [ 446.276143][T18740] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 446.281883][T18740] tomoyo_realpath_from_path+0xdc/0x7c0 [ 446.287448][T18740] tomoyo_path_number_perm+0x166/0x640 [ 446.292938][T18740] ? smack_file_ioctl+0x226/0x2e0 [ 446.297972][T18740] ? __fget+0x411/0x510 [ 446.302141][T18740] tomoyo_file_ioctl+0x23/0x30 [ 446.306905][T18740] security_file_ioctl+0x6d/0xd0 [ 446.306922][T18740] __x64_sys_ioctl+0xa3/0x120 [ 446.306937][T18740] do_syscall_64+0xf7/0x1c0 [ 446.306952][T18740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.306960][T18740] RIP: 0033:0x45a087 [ 446.306969][T18740] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 446.306974][T18740] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 446.306983][T18740] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 446.306988][T18740] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 03:37:27 executing program 3: 03:37:27 executing program 1: 03:37:27 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0xf6ffffff00000000, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 446.306993][T18740] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 446.306999][T18740] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 446.307004][T18740] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 446.315372][T18740] ERROR: Out of memory at tomoyo_realpath_from_path. 03:37:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:37:30 executing program 3: 03:37:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:30 executing program 1: 03:37:30 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0xffffffff00000000, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:30 executing program 4 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 449.220363][T18777] FAULT_INJECTION: forcing a failure. [ 449.220363][T18777] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 449.233615][T18777] CPU: 1 PID: 18777 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 449.233623][T18777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.233627][T18777] Call Trace: [ 449.233647][T18777] dump_stack+0x1fb/0x318 [ 449.233664][T18777] should_fail+0x555/0x770 [ 449.233680][T18777] should_fail_alloc_page+0x55/0x60 03:37:30 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x2) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:30 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fchownat(r0, 0x0, 0x0, 0x0, 0x0) 03:37:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000140), 0x4) [ 449.233689][T18777] prepare_alloc_pages+0x283/0x460 [ 449.233702][T18777] __alloc_pages_nodemask+0xb2/0x5d0 [ 449.233713][T18777] ? stack_trace_save+0x150/0x150 [ 449.233729][T18777] kmem_getpages+0x4d/0xa00 [ 449.233742][T18777] cache_grow_begin+0x7e/0x2c0 [ 449.233756][T18777] cache_alloc_refill+0x311/0x3f0 [ 449.233767][T18777] ? check_preemption_disabled+0xb7/0x2a0 [ 449.233781][T18777] __kmalloc+0x318/0x340 [ 449.233789][T18777] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 449.233801][T18777] tomoyo_realpath_from_path+0xdc/0x7c0 [ 449.233817][T18777] tomoyo_path_number_perm+0x166/0x640 [ 449.233852][T18777] ? smack_file_ioctl+0x226/0x2e0 [ 449.263806][T18777] ? __fget+0x411/0x510 [ 449.263825][T18777] tomoyo_file_ioctl+0x23/0x30 [ 449.263837][T18777] security_file_ioctl+0x6d/0xd0 [ 449.263849][T18777] __x64_sys_ioctl+0xa3/0x120 [ 449.263862][T18777] do_syscall_64+0xf7/0x1c0 [ 449.263876][T18777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.263886][T18777] RIP: 0033:0x45a087 [ 449.263898][T18777] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 449.263902][T18777] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 449.263911][T18777] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 449.263916][T18777] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 449.263922][T18777] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 449.263927][T18777] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 449.263932][T18777] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:37:31 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x3) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:31 executing program 1: setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) 03:37:31 executing program 4 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 449.713121][T18808] FAULT_INJECTION: forcing a failure. [ 449.713121][T18808] name failslab, interval 1, probability 0, space 0, times 0 [ 449.726096][T18808] CPU: 1 PID: 18808 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 449.733990][T18808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.744138][T18808] Call Trace: [ 449.747433][T18808] dump_stack+0x1fb/0x318 [ 449.752294][T18808] should_fail+0x555/0x770 [ 449.756716][T18808] __should_failslab+0x11a/0x160 [ 449.761692][T18808] ? tomoyo_encode2+0x273/0x5a0 [ 449.766537][T18808] should_failslab+0x9/0x20 [ 449.771048][T18808] __kmalloc+0x7a/0x340 [ 449.775295][T18808] tomoyo_encode2+0x273/0x5a0 [ 449.779964][T18808] tomoyo_realpath_from_path+0x769/0x7c0 [ 449.785593][T18808] tomoyo_path_number_perm+0x166/0x640 [ 449.791056][T18808] ? smack_file_ioctl+0x226/0x2e0 [ 449.796068][T18808] ? __fget+0x411/0x510 [ 449.800214][T18808] tomoyo_file_ioctl+0x23/0x30 [ 449.805084][T18808] security_file_ioctl+0x6d/0xd0 [ 449.810034][T18808] __x64_sys_ioctl+0xa3/0x120 [ 449.814724][T18808] do_syscall_64+0xf7/0x1c0 [ 449.819226][T18808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.825108][T18808] RIP: 0033:0x45a087 [ 449.828993][T18808] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 449.848592][T18808] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 449.856997][T18808] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 449.864964][T18808] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 449.872921][T18808] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 449.880880][T18808] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 449.888839][T18808] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 449.899250][T18808] ERROR: Out of memory at tomoyo_realpath_from_path. 03:37:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:37:33 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x10004000000002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt(r0, 0x114, 0x1000000002711, 0x0, &(0x7f00000000c0)) 03:37:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:33 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x300) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:33 executing program 4 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x200, 0x0) [ 452.225912][T18826] FAULT_INJECTION: forcing a failure. [ 452.225912][T18826] name failslab, interval 1, probability 0, space 0, times 0 03:37:33 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x4000) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 452.318217][T18826] CPU: 1 PID: 18826 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 452.326163][T18826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.336237][T18826] Call Trace: [ 452.339557][T18826] dump_stack+0x1fb/0x318 [ 452.343919][T18826] should_fail+0x555/0x770 [ 452.348362][T18826] __should_failslab+0x11a/0x160 [ 452.353313][T18826] ? tomoyo_encode2+0x273/0x5a0 [ 452.358192][T18826] should_failslab+0x9/0x20 [ 452.362715][T18826] __kmalloc+0x7a/0x340 03:37:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 452.366883][T18826] tomoyo_encode2+0x273/0x5a0 [ 452.371573][T18826] tomoyo_realpath_from_path+0x769/0x7c0 [ 452.377241][T18826] tomoyo_path_number_perm+0x166/0x640 [ 452.382744][T18826] ? smack_file_ioctl+0x226/0x2e0 [ 452.387891][T18826] ? __fget+0x411/0x510 [ 452.392084][T18826] tomoyo_file_ioctl+0x23/0x30 [ 452.396861][T18826] security_file_ioctl+0x6d/0xd0 [ 452.401811][T18826] __x64_sys_ioctl+0xa3/0x120 [ 452.406496][T18826] do_syscall_64+0xf7/0x1c0 [ 452.412140][T18826] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 452.418039][T18826] RIP: 0033:0x45a087 [ 452.421938][T18826] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 452.441542][T18826] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 452.441552][T18826] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 452.441557][T18826] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 03:37:33 executing program 3: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x3, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:34 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x1000000) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 452.441562][T18826] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 452.441566][T18826] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 452.441571][T18826] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:37:34 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:37:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 452.543695][T18826] ERROR: Out of memory at tomoyo_realpath_from_path. 03:37:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:37:36 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x2000000) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:36 executing program 4 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:36 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x103001) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x242a0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/16, 0xfffffffffffffe35) add_key(&(0x7f0000000280)='id_resolver\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="26a693e9378a0019343d964405e4f6e28c44c68ca945f73c7915eb78ba5934da71a67d07b88e7758f3d1bebc24793726f6a25e518c71a205733604b3103e0a566d619561ed949571465facd2a4eba46cd84c9125ede834546048b4a7eee1592bab9c0e865f4b0a87211dac57c37779c41881848714de9ff644d287198ef0f89d375f23d8969fbc208e0ed07be3a301519d5f7855354c0349440c0c8a30c5880be2bce925b1bcc8b68ce255efbecbad5cbe8d0d6e9251208a105ca2d65cc6ed95", 0xc0, 0x0) getuid() r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195", 0x5) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) keyctl$revoke(0x3, 0x0) lstat(&(0x7f0000000080)='./control\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(0x0, 0x0, r3) r4 = getegid() setregid(r3, r4) 03:37:36 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 455.323110][T18878] FAULT_INJECTION: forcing a failure. [ 455.323110][T18878] name failslab, interval 1, probability 0, space 0, times 0 [ 455.342978][T18878] CPU: 0 PID: 18878 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 455.350904][T18878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.360967][T18878] Call Trace: [ 455.364270][T18878] dump_stack+0x1fb/0x318 [ 455.368621][T18878] should_fail+0x555/0x770 [ 455.373048][T18878] __should_failslab+0x11a/0x160 [ 455.377976][T18878] ? __kernfs_new_node+0x97/0x6b0 [ 455.383074][T18878] should_failslab+0x9/0x20 [ 455.387583][T18878] kmem_cache_alloc+0x56/0x2e0 [ 455.392366][T18878] __kernfs_new_node+0x97/0x6b0 [ 455.397234][T18878] ? bd_set_size+0x97/0xb0 [ 455.401666][T18878] kernfs_create_dir_ns+0x9b/0x230 [ 455.406789][T18878] internal_create_group+0x207/0xd80 [ 455.412089][T18878] sysfs_create_group+0x1f/0x30 [ 455.412431][T18889] ptrace attach of "/root/syz-executor.2"[18888] was attempted by "/root/syz-executor.2"[18889] [ 455.416930][T18878] loop_set_fd+0xf54/0x1470 [ 455.416951][T18878] lo_ioctl+0xd5/0x2200 [ 455.416961][T18878] ? __kasan_slab_free+0x12a/0x1e0 [ 455.416973][T18878] ? kasan_slab_free+0xe/0x10 [ 455.445755][T18878] ? kfree+0x115/0x200 [ 455.449826][T18878] ? tomoyo_path_number_perm+0x4e1/0x640 [ 455.455458][T18878] ? tomoyo_file_ioctl+0x23/0x30 [ 455.460403][T18878] ? security_file_ioctl+0x6d/0xd0 [ 455.465521][T18878] ? __x64_sys_ioctl+0xa3/0x120 [ 455.465531][T18878] ? do_syscall_64+0xf7/0x1c0 [ 455.465541][T18878] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 455.465556][T18878] ? debug_check_no_obj_freed+0x505/0x5b0 [ 455.465579][T18878] ? rcu_lock_release+0x9/0x30 [ 455.475076][T18878] ? rcu_lock_release+0x9/0x30 [ 455.475089][T18878] ? lo_release+0x1f0/0x1f0 [ 455.475098][T18878] blkdev_ioctl+0x807/0x2980 [ 455.475110][T18878] ? tomoyo_path_number_perm+0x53e/0x640 [ 455.475138][T18878] block_ioctl+0xbd/0x100 [ 455.515450][T18878] ? blkdev_iopoll+0x100/0x100 [ 455.520193][T18878] do_vfs_ioctl+0x744/0x1730 [ 455.524769][T18878] ? __fget+0x411/0x510 [ 455.528907][T18878] ? tomoyo_file_ioctl+0x23/0x30 [ 455.533819][T18878] ? security_file_ioctl+0xa1/0xd0 [ 455.538908][T18878] __x64_sys_ioctl+0xe3/0x120 [ 455.543568][T18878] do_syscall_64+0xf7/0x1c0 [ 455.548064][T18878] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 455.553943][T18878] RIP: 0033:0x45a087 [ 455.557823][T18878] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 455.577412][T18878] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 455.585813][T18878] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 455.593765][T18878] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 455.601891][T18878] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 455.609844][T18878] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 03:37:37 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x3000000) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:37 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000000c0)="1e6847fb3311f617a62943b6132f0bb7891adb0e032e31d58e3abb938a71fab09e27def63a0168d1cc193e455f75be88ae6a6ba13a9cf58471437dd6fffdcd8b44a750733052ac037c9cbeb6c3136cb5a8de3bebbbfb2d036df1ce0e90ee25b709a8b1c21e2921f4a783d99da8df05a8211964b98f", 0x3ff, 0x9}, {&(0x7f00000001c0)="2aff31bb54d909a170953fb84b5c1a4e95cd5d", 0x13, 0x3}]) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffe000/0x2000)=nil) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x111000, 0x0) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000040)) 03:37:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 455.617796][T18878] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:37:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:37 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x40000000) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:37 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 455.820886][T18898] Dev loop1: unable to read RDB block 2 [ 455.832767][T18898] loop1: unable to read partition table [ 455.841093][T18898] loop1: partition table beyond EOD, truncated 03:37:37 executing program 4 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 455.869660][T18898] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 03:37:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:37 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x8cffffff) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 455.987303][T18898] Dev loop1: unable to read RDB block 2 [ 455.999882][T18898] loop1: unable to read partition table [ 456.012736][T18923] FAULT_INJECTION: forcing a failure. [ 456.012736][T18923] name failslab, interval 1, probability 0, space 0, times 0 [ 456.017323][T18898] loop1: partition table beyond EOD, truncated [ 456.035759][T18898] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 456.040433][T18923] CPU: 1 PID: 18923 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 456.051649][T18923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.061699][T18923] Call Trace: [ 456.064988][T18923] dump_stack+0x1fb/0x318 [ 456.069312][T18923] should_fail+0x555/0x770 [ 456.073715][T18923] __should_failslab+0x11a/0x160 [ 456.078719][T18923] ? __kernfs_new_node+0x97/0x6b0 [ 456.083724][T18923] should_failslab+0x9/0x20 [ 456.088203][T18923] kmem_cache_alloc+0x56/0x2e0 [ 456.092947][T18923] __kernfs_new_node+0x97/0x6b0 [ 456.097780][T18923] ? mutex_unlock+0xd/0x10 [ 456.102184][T18923] ? kernfs_activate+0x4c7/0x4e0 [ 456.107105][T18923] kernfs_new_node+0x97/0x170 [ 456.111763][T18923] __kernfs_create_file+0x4a/0x2f0 [ 456.116854][T18923] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 456.122207][T18923] internal_create_group+0x4be/0xd80 [ 456.127477][T18923] sysfs_create_group+0x1f/0x30 [ 456.132305][T18923] loop_set_fd+0xf54/0x1470 [ 456.136790][T18923] lo_ioctl+0xd5/0x2200 [ 456.140920][T18923] ? __kasan_slab_free+0x12a/0x1e0 [ 456.146006][T18923] ? kasan_slab_free+0xe/0x10 [ 456.150662][T18923] ? kfree+0x115/0x200 [ 456.154708][T18923] ? tomoyo_path_number_perm+0x4e1/0x640 [ 456.160315][T18923] ? tomoyo_file_ioctl+0x23/0x30 [ 456.165229][T18923] ? security_file_ioctl+0x6d/0xd0 [ 456.170318][T18923] ? __x64_sys_ioctl+0xa3/0x120 [ 456.175159][T18923] ? do_syscall_64+0xf7/0x1c0 [ 456.179819][T18923] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.185867][T18923] ? debug_check_no_obj_freed+0x505/0x5b0 [ 456.191575][T18923] ? rcu_lock_release+0x9/0x30 [ 456.196333][T18923] ? rcu_lock_release+0x9/0x30 [ 456.201508][T18923] ? lo_release+0x1f0/0x1f0 [ 456.206006][T18923] blkdev_ioctl+0x807/0x2980 [ 456.210576][T18923] ? tomoyo_path_number_perm+0x53e/0x640 [ 456.216201][T18923] block_ioctl+0xbd/0x100 [ 456.220504][T18923] ? blkdev_iopoll+0x100/0x100 [ 456.225265][T18923] do_vfs_ioctl+0x744/0x1730 [ 456.229831][T18923] ? __fget+0x411/0x510 [ 456.233969][T18923] ? tomoyo_file_ioctl+0x23/0x30 [ 456.238883][T18923] ? security_file_ioctl+0xa1/0xd0 [ 456.243972][T18923] __x64_sys_ioctl+0xe3/0x120 [ 456.248632][T18923] do_syscall_64+0xf7/0x1c0 [ 456.253117][T18923] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.258983][T18923] RIP: 0033:0x45a087 [ 456.262854][T18923] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 456.282453][T18923] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 456.290841][T18923] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 456.298789][T18923] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 456.306998][T18923] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 456.314950][T18923] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 456.322897][T18923] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 456.403642][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 456.409534][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:37:37 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="0300000000000800000000000000e9ca"], 0x1}}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xffffffffffffff7f) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r5 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r4, r5, 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x80000000) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r7 = semget$private(0x0, 0x7, 0x0) semtimedop(r7, &(0x7f0000000100)=[{0x0, 0xfff9}], 0x1, 0x0) socket$isdn_base(0x22, 0x3, 0x0) semctl$IPC_RMID(r7, 0x0, 0x0) semctl$SEM_STAT(r7, 0x2, 0x12, &(0x7f0000000080)=""/220) semctl$GETVAL(r7, 0x3, 0xc, &(0x7f0000000380)=""/4096) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r6, 0xae80, 0x0) clone3(&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000001380)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r8, &(0x7f0000001440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x43400aa0}, 0xc, &(0x7f0000001400)={&(0x7f00000013c0)={0x1c, r9, 0x10, 0x70bd2a, 0x702, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4008000) 03:37:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:38 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0xf6ffffff) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:38 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:37:38 executing program 4 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 456.765882][T18954] FAULT_INJECTION: forcing a failure. [ 456.765882][T18954] name failslab, interval 1, probability 0, space 0, times 0 [ 456.783022][T18954] CPU: 1 PID: 18954 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 456.790957][T18954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.801975][T18954] Call Trace: [ 456.805347][T18954] dump_stack+0x1fb/0x318 [ 456.809688][T18954] should_fail+0x555/0x770 [ 456.814108][T18954] __should_failslab+0x11a/0x160 [ 456.819088][T18954] ? __kernfs_new_node+0x97/0x6b0 [ 456.824099][T18954] should_failslab+0x9/0x20 [ 456.828631][T18954] kmem_cache_alloc+0x56/0x2e0 [ 456.833382][T18954] __kernfs_new_node+0x97/0x6b0 [ 456.838227][T18954] ? mutex_unlock+0xd/0x10 [ 456.842669][T18954] ? kernfs_activate+0x4c7/0x4e0 [ 456.847590][T18954] kernfs_new_node+0x97/0x170 [ 456.852247][T18954] __kernfs_create_file+0x4a/0x2f0 [ 456.857353][T18954] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 456.862720][T18954] internal_create_group+0x4be/0xd80 [ 456.867992][T18954] sysfs_create_group+0x1f/0x30 [ 456.872822][T18954] loop_set_fd+0xf54/0x1470 [ 456.877329][T18954] lo_ioctl+0xd5/0x2200 [ 456.881482][T18954] ? __kasan_slab_free+0x12a/0x1e0 [ 456.886578][T18954] ? kasan_slab_free+0xe/0x10 [ 456.891233][T18954] ? kfree+0x115/0x200 [ 456.895288][T18954] ? tomoyo_path_number_perm+0x4e1/0x640 [ 456.900917][T18954] ? tomoyo_file_ioctl+0x23/0x30 [ 456.905837][T18954] ? security_file_ioctl+0x6d/0xd0 [ 456.910928][T18954] ? __x64_sys_ioctl+0xa3/0x120 [ 456.915776][T18954] ? do_syscall_64+0xf7/0x1c0 [ 456.920447][T18954] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.926538][T18954] ? debug_check_no_obj_freed+0x505/0x5b0 [ 456.932260][T18954] ? rcu_lock_release+0x9/0x30 [ 456.937021][T18954] ? rcu_lock_release+0x9/0x30 [ 456.941773][T18954] ? lo_release+0x1f0/0x1f0 [ 456.946270][T18954] blkdev_ioctl+0x807/0x2980 [ 456.950840][T18954] ? tomoyo_path_number_perm+0x53e/0x640 [ 456.956489][T18954] block_ioctl+0xbd/0x100 [ 456.960809][T18954] ? blkdev_iopoll+0x100/0x100 [ 456.965563][T18954] do_vfs_ioctl+0x744/0x1730 [ 456.970154][T18954] ? __fget+0x411/0x510 [ 456.974303][T18954] ? tomoyo_file_ioctl+0x23/0x30 [ 456.979237][T18954] ? security_file_ioctl+0xa1/0xd0 [ 456.984347][T18954] __x64_sys_ioctl+0xe3/0x120 [ 456.989007][T18954] do_syscall_64+0xf7/0x1c0 [ 456.993488][T18954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.999359][T18954] RIP: 0033:0x45a087 [ 457.003234][T18954] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 457.022820][T18954] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 457.031213][T18954] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 457.039167][T18954] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 457.047142][T18954] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 457.055124][T18954] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 457.063100][T18954] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:37:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:37:40 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0xffffff8c) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:40 executing program 4 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:40 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00'}) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:37:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_extract_tcp_res(0x0, 0x0, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x60, 0x0, 0x0, &(0x7f0000000040), 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0}, 0x40) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000080)='/\xb2\x0f\x88\xeb\ta\xd1\x17er#\x00', 0x0, 0x4) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = mmap$binder(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000015c0)={0x70, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="076304400000000003630840", @ANYRES64=r1, @ANYBLOB="076304400300000001634040000000000000000000000000000000000000000011000000000000000000000000000000000000001800"/68, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/24], @ANYBLOB="0f630c40010000000074c718c5562661"], 0xf7d, 0x0, &(0x7f00000005c0)="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"}) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x40}, {}, 0x7, 0x0, 0x80000000000001, 0x0, 0x56e0fbe6d7a35d63}, {{@in6=@empty}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x1}}, 0xffffffffffffff38) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) r5 = accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14, 0x100000) fadvise64(r5, 0x100000000, 0x9, 0x5) write$binfmt_misc(r4, 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0xffff) dup3(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.swap.current\x00', 0x0, 0x0) pipe(&(0x7f0000000100)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbcq\x9a\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98q\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f0000000080), 0xfffffe38) open(&(0x7f0000001540)='./bus\x00', 0x800, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x20040004) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 03:37:40 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0xfffffff6) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 458.730219][T18972] FAULT_INJECTION: forcing a failure. [ 458.730219][T18972] name failslab, interval 1, probability 0, space 0, times 0 [ 458.752333][T18972] CPU: 0 PID: 18972 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 458.760276][T18972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.770337][T18972] Call Trace: [ 458.773728][T18972] dump_stack+0x1fb/0x318 [ 458.778066][T18972] should_fail+0x555/0x770 [ 458.782493][T18972] __should_failslab+0x11a/0x160 [ 458.787430][T18972] ? __kernfs_new_node+0x97/0x6b0 [ 458.792460][T18972] should_failslab+0x9/0x20 [ 458.796971][T18972] kmem_cache_alloc+0x56/0x2e0 [ 458.801745][T18972] __kernfs_new_node+0x97/0x6b0 [ 458.806605][T18972] ? mutex_unlock+0xd/0x10 [ 458.811027][T18972] ? kernfs_activate+0x4c7/0x4e0 [ 458.815983][T18972] kernfs_new_node+0x97/0x170 [ 458.820683][T18972] __kernfs_create_file+0x4a/0x2f0 [ 458.825807][T18972] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 458.831197][T18972] internal_create_group+0x4be/0xd80 [ 458.836498][T18972] sysfs_create_group+0x1f/0x30 [ 458.836510][T18972] loop_set_fd+0xf54/0x1470 [ 458.836531][T18972] lo_ioctl+0xd5/0x2200 [ 458.850192][T18972] ? __kasan_slab_free+0x12a/0x1e0 [ 458.850202][T18972] ? kasan_slab_free+0xe/0x10 [ 458.850211][T18972] ? kfree+0x115/0x200 [ 458.850223][T18972] ? tomoyo_path_number_perm+0x4e1/0x640 [ 458.869666][T18972] ? tomoyo_file_ioctl+0x23/0x30 [ 458.874615][T18972] ? security_file_ioctl+0x6d/0xd0 [ 458.879732][T18972] ? __x64_sys_ioctl+0xa3/0x120 [ 458.884584][T18972] ? do_syscall_64+0xf7/0x1c0 [ 458.889289][T18972] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 458.895369][T18972] ? debug_check_no_obj_freed+0x505/0x5b0 [ 458.901112][T18972] ? rcu_lock_release+0x9/0x30 [ 458.905885][T18972] ? rcu_lock_release+0x9/0x30 [ 458.910656][T18972] ? lo_release+0x1f0/0x1f0 [ 458.915179][T18972] blkdev_ioctl+0x807/0x2980 [ 458.919781][T18972] ? tomoyo_path_number_perm+0x53e/0x640 [ 458.925433][T18972] block_ioctl+0xbd/0x100 [ 458.929798][T18972] ? blkdev_iopoll+0x100/0x100 [ 458.934569][T18972] do_vfs_ioctl+0x744/0x1730 [ 458.939161][T18972] ? __fget+0x411/0x510 [ 458.943319][T18972] ? tomoyo_file_ioctl+0x23/0x30 [ 458.948261][T18972] ? security_file_ioctl+0xa1/0xd0 [ 458.953389][T18972] __x64_sys_ioctl+0xe3/0x120 [ 458.958076][T18972] do_syscall_64+0xf7/0x1c0 [ 458.962590][T18972] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 458.968483][T18972] RIP: 0033:0x45a087 [ 458.972387][T18972] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 458.993123][T18972] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 459.001544][T18972] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 459.009520][T18972] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 459.017499][T18972] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 03:37:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 459.025470][T18972] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 459.033442][T18972] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:37:40 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x100000000000000) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:40 executing program 4 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:40 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00'}) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:37:40 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x200000000000000) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 459.373470][T19011] FAULT_INJECTION: forcing a failure. [ 459.373470][T19011] name failslab, interval 1, probability 0, space 0, times 0 [ 459.403990][T19011] CPU: 1 PID: 19011 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 459.411926][T19011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.421987][T19011] Call Trace: [ 459.425286][T19011] dump_stack+0x1fb/0x318 [ 459.429629][T19011] should_fail+0x555/0x770 [ 459.434078][T19011] __should_failslab+0x11a/0x160 [ 459.439025][T19011] ? __kernfs_new_node+0x97/0x6b0 [ 459.444055][T19011] should_failslab+0x9/0x20 [ 459.448560][T19011] kmem_cache_alloc+0x56/0x2e0 [ 459.453329][T19011] __kernfs_new_node+0x97/0x6b0 [ 459.458186][T19011] ? mutex_unlock+0xd/0x10 [ 459.462600][T19011] ? kernfs_activate+0x4c7/0x4e0 [ 459.467548][T19011] kernfs_new_node+0x97/0x170 [ 459.472238][T19011] __kernfs_create_file+0x4a/0x2f0 [ 459.477361][T19011] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 459.482742][T19011] internal_create_group+0x4be/0xd80 [ 459.488039][T19011] sysfs_create_group+0x1f/0x30 [ 459.492891][T19011] loop_set_fd+0xf54/0x1470 [ 459.497405][T19011] lo_ioctl+0xd5/0x2200 [ 459.501557][T19011] ? __kasan_slab_free+0x12a/0x1e0 [ 459.506664][T19011] ? kasan_slab_free+0xe/0x10 [ 459.511339][T19011] ? kfree+0x115/0x200 [ 459.515418][T19011] ? tomoyo_path_number_perm+0x4e1/0x640 [ 459.521061][T19011] ? tomoyo_file_ioctl+0x23/0x30 [ 459.526089][T19011] ? security_file_ioctl+0x6d/0xd0 [ 459.531200][T19011] ? __x64_sys_ioctl+0xa3/0x120 [ 459.536154][T19011] ? do_syscall_64+0xf7/0x1c0 [ 459.540830][T19011] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 459.546900][T19011] ? debug_check_no_obj_freed+0x505/0x5b0 [ 459.552635][T19011] ? rcu_lock_release+0x9/0x30 [ 459.557409][T19011] ? rcu_lock_release+0x9/0x30 [ 459.562176][T19011] ? lo_release+0x1f0/0x1f0 [ 459.566678][T19011] blkdev_ioctl+0x807/0x2980 [ 459.571271][T19011] ? tomoyo_path_number_perm+0x53e/0x640 [ 459.576947][T19011] block_ioctl+0xbd/0x100 [ 459.581279][T19011] ? blkdev_iopoll+0x100/0x100 [ 459.586081][T19011] do_vfs_ioctl+0x744/0x1730 [ 459.590694][T19011] ? __fget+0x411/0x510 [ 459.594858][T19011] ? tomoyo_file_ioctl+0x23/0x30 [ 459.599798][T19011] ? security_file_ioctl+0xa1/0xd0 [ 459.604913][T19011] __x64_sys_ioctl+0xe3/0x120 [ 459.609594][T19011] do_syscall_64+0xf7/0x1c0 [ 459.614099][T19011] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 459.619987][T19011] RIP: 0033:0x45a087 [ 459.623880][T19011] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 459.643510][T19011] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 459.651923][T19011] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 459.659897][T19011] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 459.667872][T19011] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 459.675853][T19011] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 459.683826][T19011] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 459.773704][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 459.779691][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:37:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef0", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:37:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:43 executing program 1: io_setup(0x8, &(0x7f0000000280)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) io_setup(0x3, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat\x00') ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000080)={0x1, 0x1}) io_submit(r1, 0x2000000000000042, &(0x7f0000000600)) 03:37:43 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x300000000000000) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:43 executing program 4 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:43 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00'}) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:37:43 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x4000000000000000) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 462.135138][T19034] FAULT_INJECTION: forcing a failure. [ 462.135138][T19034] name failslab, interval 1, probability 0, space 0, times 0 03:37:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef0", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 462.195342][T19034] CPU: 1 PID: 19034 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 462.203288][T19034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.213346][T19034] Call Trace: [ 462.216643][T19034] dump_stack+0x1fb/0x318 [ 462.220984][T19034] should_fail+0x555/0x770 [ 462.225401][T19034] __should_failslab+0x11a/0x160 [ 462.230325][T19034] ? __kernfs_new_node+0x97/0x6b0 [ 462.235352][T19034] should_failslab+0x9/0x20 [ 462.239848][T19034] kmem_cache_alloc+0x56/0x2e0 [ 462.244592][T19034] __kernfs_new_node+0x97/0x6b0 [ 462.249436][T19034] ? mutex_unlock+0xd/0x10 [ 462.253960][T19034] ? kernfs_activate+0x4c7/0x4e0 [ 462.258898][T19034] kernfs_new_node+0x97/0x170 [ 462.263571][T19034] __kernfs_create_file+0x4a/0x2f0 [ 462.268795][T19034] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 462.274174][T19034] internal_create_group+0x4be/0xd80 [ 462.279463][T19034] sysfs_create_group+0x1f/0x30 [ 462.284306][T19034] loop_set_fd+0xf54/0x1470 [ 462.288802][T19034] lo_ioctl+0xd5/0x2200 [ 462.292939][T19034] ? __kasan_slab_free+0x12a/0x1e0 [ 462.298041][T19034] ? kasan_slab_free+0xe/0x10 [ 462.302711][T19034] ? kfree+0x115/0x200 [ 462.306788][T19034] ? tomoyo_path_number_perm+0x4e1/0x640 [ 462.312425][T19034] ? tomoyo_file_ioctl+0x23/0x30 [ 462.317364][T19034] ? security_file_ioctl+0x6d/0xd0 [ 462.322488][T19034] ? __x64_sys_ioctl+0xa3/0x120 [ 462.327335][T19034] ? do_syscall_64+0xf7/0x1c0 [ 462.332007][T19034] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.338070][T19034] ? debug_check_no_obj_freed+0x505/0x5b0 [ 462.343996][T19034] ? rcu_lock_release+0x9/0x30 [ 462.348778][T19034] ? rcu_lock_release+0x9/0x30 [ 462.353527][T19034] ? lo_release+0x1f0/0x1f0 [ 462.358025][T19034] blkdev_ioctl+0x807/0x2980 [ 462.362608][T19034] ? tomoyo_path_number_perm+0x53e/0x640 [ 462.368273][T19034] block_ioctl+0xbd/0x100 [ 462.372607][T19034] ? blkdev_iopoll+0x100/0x100 [ 462.377384][T19034] do_vfs_ioctl+0x744/0x1730 [ 462.381981][T19034] ? __fget+0x411/0x510 [ 462.386128][T19034] ? tomoyo_file_ioctl+0x23/0x30 [ 462.391047][T19034] ? security_file_ioctl+0xa1/0xd0 [ 462.396156][T19034] __x64_sys_ioctl+0xe3/0x120 [ 462.400855][T19034] do_syscall_64+0xf7/0x1c0 [ 462.405368][T19034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.411247][T19034] RIP: 0033:0x45a087 [ 462.415134][T19034] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 462.434739][T19034] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 462.443168][T19034] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 462.451138][T19034] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 462.459102][T19034] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 462.467105][T19034] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 462.475090][T19034] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:37:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) dup2(0xffffffffffffffff, r0) 03:37:44 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x8cffffff00000000) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:44 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:37:44 executing program 4 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:44 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0xf6ffffff00000000) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 462.789762][T19070] FAULT_INJECTION: forcing a failure. [ 462.789762][T19070] name failslab, interval 1, probability 0, space 0, times 0 [ 462.810361][T19070] CPU: 1 PID: 19070 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 462.818287][T19070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.818292][T19070] Call Trace: [ 462.818312][T19070] dump_stack+0x1fb/0x318 [ 462.818328][T19070] should_fail+0x555/0x770 [ 462.818346][T19070] __should_failslab+0x11a/0x160 [ 462.818357][T19070] ? __kernfs_new_node+0x97/0x6b0 [ 462.818369][T19070] should_failslab+0x9/0x20 [ 462.818381][T19070] kmem_cache_alloc+0x56/0x2e0 [ 462.818394][T19070] __kernfs_new_node+0x97/0x6b0 [ 462.818407][T19070] ? mutex_unlock+0xd/0x10 [ 462.818417][T19070] ? kernfs_activate+0x4c7/0x4e0 [ 462.818433][T19070] kernfs_new_node+0x97/0x170 [ 462.818447][T19070] __kernfs_create_file+0x4a/0x2f0 [ 462.818460][T19070] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 462.818481][T19070] internal_create_group+0x4be/0xd80 [ 462.831837][T19070] sysfs_create_group+0x1f/0x30 [ 462.831849][T19070] loop_set_fd+0xf54/0x1470 [ 462.831872][T19070] lo_ioctl+0xd5/0x2200 [ 462.831882][T19070] ? __kasan_slab_free+0x12a/0x1e0 [ 462.831891][T19070] ? kasan_slab_free+0xe/0x10 [ 462.831901][T19070] ? kfree+0x115/0x200 [ 462.831909][T19070] ? tomoyo_path_number_perm+0x4e1/0x640 [ 462.831926][T19070] ? tomoyo_file_ioctl+0x23/0x30 [ 462.831933][T19070] ? security_file_ioctl+0x6d/0xd0 03:37:44 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0xffffffff00000000) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 462.831942][T19070] ? __x64_sys_ioctl+0xa3/0x120 [ 462.845768][T19070] ? do_syscall_64+0xf7/0x1c0 [ 462.845781][T19070] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.845802][T19070] ? debug_check_no_obj_freed+0x505/0x5b0 [ 462.845830][T19070] ? rcu_lock_release+0x9/0x30 [ 462.845847][T19070] ? rcu_lock_release+0x9/0x30 [ 462.845859][T19070] ? lo_release+0x1f0/0x1f0 [ 462.845868][T19070] blkdev_ioctl+0x807/0x2980 [ 462.845882][T19070] ? tomoyo_path_number_perm+0x53e/0x640 [ 462.869427][T19070] block_ioctl+0xbd/0x100 [ 462.884095][T19070] ? blkdev_iopoll+0x100/0x100 [ 462.884111][T19070] do_vfs_ioctl+0x744/0x1730 [ 462.884120][T19070] ? __fget+0x411/0x510 [ 462.884137][T19070] ? tomoyo_file_ioctl+0x23/0x30 [ 462.884149][T19070] ? security_file_ioctl+0xa1/0xd0 [ 462.884160][T19070] __x64_sys_ioctl+0xe3/0x120 [ 462.884172][T19070] do_syscall_64+0xf7/0x1c0 [ 462.884186][T19070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.884196][T19070] RIP: 0033:0x45a087 [ 462.884205][T19070] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 462.884210][T19070] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 462.884219][T19070] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 462.884225][T19070] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 462.884230][T19070] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 03:37:44 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x16100, 0x40000000}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r2, 0x0, 0x0) [ 462.884236][T19070] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 462.884242][T19070] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:37:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) dup2(0xffffffffffffffff, r0) 03:37:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:44 executing program 4 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 463.277130][T19095] FAULT_INJECTION: forcing a failure. [ 463.277130][T19095] name failslab, interval 1, probability 0, space 0, times 0 [ 463.313147][T19095] CPU: 1 PID: 19095 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 463.321097][T19095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.321103][T19095] Call Trace: [ 463.321122][T19095] dump_stack+0x1fb/0x318 [ 463.321140][T19095] should_fail+0x555/0x770 [ 463.321158][T19095] __should_failslab+0x11a/0x160 [ 463.321170][T19095] ? __kernfs_new_node+0x97/0x6b0 [ 463.321183][T19095] should_failslab+0x9/0x20 [ 463.321195][T19095] kmem_cache_alloc+0x56/0x2e0 [ 463.321210][T19095] __kernfs_new_node+0x97/0x6b0 [ 463.338869][T19095] ? mutex_unlock+0xd/0x10 [ 463.338882][T19095] ? kernfs_activate+0x4c7/0x4e0 [ 463.338898][T19095] kernfs_new_node+0x97/0x170 [ 463.338915][T19095] __kernfs_create_file+0x4a/0x2f0 [ 463.338929][T19095] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 463.338947][T19095] internal_create_group+0x4be/0xd80 [ 463.338978][T19095] sysfs_create_group+0x1f/0x30 [ 463.348313][T19095] loop_set_fd+0xf54/0x1470 [ 463.348337][T19095] lo_ioctl+0xd5/0x2200 [ 463.348347][T19095] ? __kasan_slab_free+0x12a/0x1e0 [ 463.348355][T19095] ? kasan_slab_free+0xe/0x10 [ 463.348365][T19095] ? kfree+0x115/0x200 [ 463.348376][T19095] ? tomoyo_path_number_perm+0x4e1/0x640 [ 463.348390][T19095] ? tomoyo_file_ioctl+0x23/0x30 [ 463.376817][T19095] ? security_file_ioctl+0x6d/0xd0 [ 463.376830][T19095] ? __x64_sys_ioctl+0xa3/0x120 [ 463.376840][T19095] ? do_syscall_64+0xf7/0x1c0 [ 463.376851][T19095] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.376865][T19095] ? debug_check_no_obj_freed+0x505/0x5b0 [ 463.386639][T19095] ? rcu_lock_release+0x9/0x30 [ 463.386657][T19095] ? rcu_lock_release+0x9/0x30 [ 463.386668][T19095] ? lo_release+0x1f0/0x1f0 [ 463.386676][T19095] blkdev_ioctl+0x807/0x2980 [ 463.386688][T19095] ? tomoyo_path_number_perm+0x53e/0x640 [ 463.386714][T19095] block_ioctl+0xbd/0x100 [ 463.386725][T19095] ? blkdev_iopoll+0x100/0x100 [ 463.397350][T19095] do_vfs_ioctl+0x744/0x1730 [ 463.397360][T19095] ? __fget+0x411/0x510 [ 463.397377][T19095] ? tomoyo_file_ioctl+0x23/0x30 [ 463.397389][T19095] ? security_file_ioctl+0xa1/0xd0 [ 463.397401][T19095] __x64_sys_ioctl+0xe3/0x120 [ 463.397416][T19095] do_syscall_64+0xf7/0x1c0 [ 463.406859][T19095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.406869][T19095] RIP: 0033:0x45a087 [ 463.406880][T19095] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 463.406885][T19095] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 463.406894][T19095] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 463.406899][T19095] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 463.406904][T19095] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 463.406909][T19095] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 463.406914][T19095] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:37:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef0", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:37:47 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:37:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:47 executing program 1: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x8cffffff00000000) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:47 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000340)={'veth0_to_hsr\x00', 0x3}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x1, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x0, 0x2) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={r3, 0x0, 0x1, 0x20, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) timer_create(0x3, &(0x7f0000000140)={0x0, 0x2e, 0x4, @thr={&(0x7f0000000080)="16032709e2726d95c0a445c9d43f22253b4f43d5", &(0x7f00000000c0)="168e6af03aee9cec4c766882e67b3e72929d452890abf47d2c23b966e91ff5ca721be2cb7da5a45e3dc7171d621dc8abe203610b0aeae94ee3a5bdbab5301faee8b2561b512569a55648113bb0b7031d8a25f9f6ae7da4c322c315cb3abb73a9ffa08cf422402e2eb36b12e31edadc3fd2814891f4f8"}}, &(0x7f0000000180)=0x0) timer_getoverrun(r4) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r5, r6, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r6, 0x40405514, &(0x7f0000000300)={0x7, 0x1, 0x5, 0x8, 'syz0\x00', 0x1}) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r2, 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000040)={0x100, 0x100000, 0x0, 0x1, 0x1, 0x1, 0x1}, 0x10) 03:37:47 executing program 4 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 465.566375][T19116] FAULT_INJECTION: forcing a failure. [ 465.566375][T19116] name failslab, interval 1, probability 0, space 0, times 0 [ 465.588698][T19116] CPU: 0 PID: 19116 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 465.596638][T19116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.606702][T19116] Call Trace: [ 465.610001][T19116] dump_stack+0x1fb/0x318 [ 465.614343][T19116] should_fail+0x555/0x770 [ 465.618773][T19116] __should_failslab+0x11a/0x160 [ 465.618790][T19116] should_failslab+0x9/0x20 [ 465.618805][T19116] kmem_cache_alloc_trace+0x5d/0x2f0 [ 465.628224][T19116] ? kobject_uevent_env+0x2cd/0x1260 [ 465.628235][T19116] ? dev_uevent_filter+0xb0/0xb0 [ 465.628248][T19116] kobject_uevent_env+0x2cd/0x1260 [ 465.628273][T19116] kobject_uevent+0x1f/0x30 [ 465.653334][T19116] loop_set_fd+0xfc3/0x1470 [ 465.657871][T19116] lo_ioctl+0xd5/0x2200 03:37:47 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2, 0x12, r0, 0x800000000) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x30280, 0x0) bind$isdn_base(r1, &(0x7f00000000c0)={0x22, 0x5, 0x5, 0xfa, 0xcf}, 0x6) 03:37:47 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r0, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 465.662054][T19116] ? __kasan_slab_free+0x12a/0x1e0 [ 465.667256][T19116] ? kasan_slab_free+0xe/0x10 [ 465.671939][T19116] ? kfree+0x115/0x200 [ 465.676012][T19116] ? tomoyo_path_number_perm+0x4e1/0x640 [ 465.681714][T19116] ? tomoyo_file_ioctl+0x23/0x30 [ 465.686650][T19116] ? security_file_ioctl+0x6d/0xd0 [ 465.691770][T19116] ? __x64_sys_ioctl+0xa3/0x120 [ 465.696629][T19116] ? do_syscall_64+0xf7/0x1c0 [ 465.701342][T19116] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.707491][T19116] ? debug_check_no_obj_freed+0x505/0x5b0 [ 465.713218][T19116] ? rcu_lock_release+0x9/0x30 [ 465.717970][T19116] ? rcu_lock_release+0x9/0x30 [ 465.722740][T19116] ? lo_release+0x1f0/0x1f0 [ 465.727271][T19116] blkdev_ioctl+0x807/0x2980 [ 465.731893][T19116] ? tomoyo_path_number_perm+0x53e/0x640 [ 465.737530][T19116] block_ioctl+0xbd/0x100 [ 465.741849][T19116] ? blkdev_iopoll+0x100/0x100 [ 465.746601][T19116] do_vfs_ioctl+0x744/0x1730 [ 465.751181][T19116] ? __fget+0x411/0x510 [ 465.755340][T19116] ? tomoyo_file_ioctl+0x23/0x30 [ 465.760275][T19116] ? security_file_ioctl+0xa1/0xd0 [ 465.765394][T19116] __x64_sys_ioctl+0xe3/0x120 [ 465.770053][T19116] do_syscall_64+0xf7/0x1c0 [ 465.774591][T19116] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.780481][T19116] RIP: 0033:0x45a087 [ 465.784400][T19116] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 465.804173][T19116] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 465.812564][T19116] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 465.820607][T19116] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 465.828566][T19116] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 465.836516][T19116] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 465.844466][T19116] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:37:47 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r0, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:47 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000280)={0x0, 0x0}) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = dup2(0xffffffffffffffff, r0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000080), 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x80000, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000340)=0x4, 0x4) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0xc98) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000380)={0x9, 0x0, 0x4, 0x2000000, {0x0, 0x7530}, {0x5, 0xd, 0x1, 0x1aa, 0x4, 0x7, "d2dd5420"}, 0x4, 0x2, @offset=0x3, 0x4}) r3 = socket$inet6(0xa, 0x2, 0x0) close(r3) socket$inet6_sctp(0xa, 0x5, 0x84) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r5 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r4, r5, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r7 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r6, r7, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000240), &(0x7f0000000200)=0x4) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000000c0), 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x3, @dev={0xfe, 0x80, [], 0x10}, 0x14000}}, 0xffff, 0x9, 0x1777, 0x6, 0xee}, &(0x7f00000000c0)=0x98) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000000)={@mcast2}, 0x14) r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000002300010000000000000009000400000014000c0000000000000000000000ffff00000000"], 0x28}}, 0x0) 03:37:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x86}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:37:47 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:37:47 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r0, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:47 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={r5, @in={{0x2, 0x0, @loopback}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000280)={r5, 0x7, 0x0, 0x0, 0xca66}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={r5, 0x8, 0x2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000000c0)={r6, 0xa, "13e7af81c525498441ca"}, &(0x7f0000000100)=0x12) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:47 executing program 4 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 466.190683][T19156] FAULT_INJECTION: forcing a failure. [ 466.190683][T19156] name failslab, interval 1, probability 0, space 0, times 0 [ 466.209572][T19156] CPU: 0 PID: 19156 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 466.217490][T19156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.227533][T19156] Call Trace: [ 466.230813][T19156] dump_stack+0x1fb/0x318 [ 466.235141][T19156] should_fail+0x555/0x770 [ 466.239556][T19156] __should_failslab+0x11a/0x160 [ 466.244491][T19156] should_failslab+0x9/0x20 [ 466.249012][T19156] kmem_cache_alloc_trace+0x5d/0x2f0 [ 466.254300][T19156] ? kobject_uevent_env+0x2cd/0x1260 [ 466.254964][T19158] netlink: 'syz-executor.1': attribute type 12 has an invalid length. [ 466.259583][T19156] ? dev_uevent_filter+0xb0/0xb0 [ 466.259598][T19156] kobject_uevent_env+0x2cd/0x1260 [ 466.259620][T19156] kobject_uevent+0x1f/0x30 [ 466.277796][T19156] loop_set_fd+0xfc3/0x1470 [ 466.277816][T19156] lo_ioctl+0xd5/0x2200 [ 466.277826][T19156] ? __kasan_slab_free+0x12a/0x1e0 [ 466.277833][T19156] ? kasan_slab_free+0xe/0x10 [ 466.277842][T19156] ? kfree+0x115/0x200 [ 466.277852][T19156] ? tomoyo_path_number_perm+0x4e1/0x640 [ 466.277861][T19156] ? tomoyo_file_ioctl+0x23/0x30 [ 466.277870][T19156] ? security_file_ioctl+0x6d/0xd0 [ 466.277879][T19156] ? __x64_sys_ioctl+0xa3/0x120 [ 466.277889][T19156] ? do_syscall_64+0xf7/0x1c0 [ 466.277900][T19156] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 03:37:47 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r1, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:47 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 466.277913][T19156] ? debug_check_no_obj_freed+0x505/0x5b0 [ 466.277941][T19156] ? rcu_lock_release+0x9/0x30 [ 466.296197][T19156] ? rcu_lock_release+0x9/0x30 [ 466.296211][T19156] ? lo_release+0x1f0/0x1f0 [ 466.296220][T19156] blkdev_ioctl+0x807/0x2980 [ 466.296231][T19156] ? tomoyo_path_number_perm+0x53e/0x640 [ 466.296261][T19156] block_ioctl+0xbd/0x100 [ 466.296270][T19156] ? blkdev_iopoll+0x100/0x100 [ 466.296283][T19156] do_vfs_ioctl+0x744/0x1730 [ 466.296292][T19156] ? __fget+0x411/0x510 [ 466.296306][T19156] ? tomoyo_file_ioctl+0x23/0x30 [ 466.296316][T19156] ? security_file_ioctl+0xa1/0xd0 [ 466.296329][T19156] __x64_sys_ioctl+0xe3/0x120 [ 466.296343][T19156] do_syscall_64+0xf7/0x1c0 [ 466.296360][T19156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 466.305073][T19156] RIP: 0033:0x45a087 [ 466.305084][T19156] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:37:48 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r1, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:48 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='security.SMACK64MMA\xd0\x00', 0x0, 0x0, 0x3) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000040)={0x6, {0x2, 0x28, 0x8001, 0x9}}) open(0x0, 0x4000, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 466.305089][T19156] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 466.305099][T19156] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 466.305105][T19156] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 466.305111][T19156] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 466.305116][T19156] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 466.305122][T19156] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 466.332253][ C1] protocol 88fb is buggy, dev hsr_slave_0 03:37:48 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 466.336839][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 466.342514][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 466.347278][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:37:48 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x2c, 0x1, 0x81, 0x0, 0x0, 0x61c, 0x320c2, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x401, 0x6, @perf_config_ext={0x3}, 0xe000, 0x400, 0xfffffff7, 0x8, 0x6, 0x7, 0x7}, r3, 0x3, 0xffffffffffffffff, 0x1) dup3(r1, r2, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r5, r6, 0x0) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) fcntl$setown(r2, 0x8, r4) [ 466.708289][T19142] netlink: 'syz-executor.1': attribute type 12 has an invalid length. 03:37:48 executing program 1: r0 = memfd_create(&(0x7f0000000040)='\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRES64], 0x8) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001640)='/dev/vga_arbiter\x00', 0x108000, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000001680)=0x100, 0x4) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000080), 0xa) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 466.801616][T19187] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.1 proc:/self/fd/3' not defined. 03:37:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x86}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:37:50 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r1, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:50 executing program 4 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:50 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000ff", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x389) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xb03d, 0x80) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x80, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x502}, "f35b0e8599899fd7", "ee930e360b8e2d46f91827a5e56613b5", "c18f1118", "2607b60c12918bd9"}, 0x28) r3 = accept$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) read(r3, &(0x7f0000000140)=""/247, 0xf7) 03:37:50 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='\a\x00\x00\x00/uLnp\xc0V\x00', 0x5462754dd6501ccf, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r3, r4, 0x0) read$usbmon(r4, &(0x7f0000000240)=""/236, 0xec) pipe(&(0x7f0000000040)) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r2, 0x0, 0x0) 03:37:50 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:37:50 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmsg$unix(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYRES64=r1], 0x1c}, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r3, 0x0) 03:37:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 469.105668][T19205] FAULT_INJECTION: forcing a failure. [ 469.105668][T19205] name failslab, interval 1, probability 0, space 0, times 0 [ 469.145341][T19205] CPU: 0 PID: 19205 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 469.153377][T19205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.163426][T19205] Call Trace: [ 469.166705][T19205] dump_stack+0x1fb/0x318 [ 469.171023][T19205] should_fail+0x555/0x770 [ 469.175428][T19205] __should_failslab+0x11a/0x160 [ 469.180369][T19205] should_failslab+0x9/0x20 [ 469.184940][T19205] kmem_cache_alloc_node+0x65/0x280 [ 469.190119][T19205] ? __alloc_skb+0x9f/0x500 [ 469.194614][T19205] __alloc_skb+0x9f/0x500 [ 469.198923][T19205] alloc_uevent_skb+0x7f/0x230 [ 469.203666][T19205] kobject_uevent_env+0xcbc/0x1260 [ 469.208759][T19205] kobject_uevent+0x1f/0x30 [ 469.213248][T19205] loop_set_fd+0xfc3/0x1470 [ 469.217732][T19205] lo_ioctl+0xd5/0x2200 [ 469.221869][T19205] ? __kasan_slab_free+0x12a/0x1e0 [ 469.226973][T19205] ? kasan_slab_free+0xe/0x10 [ 469.231630][T19205] ? kfree+0x115/0x200 [ 469.235675][T19205] ? tomoyo_path_number_perm+0x4e1/0x640 [ 469.241281][T19205] ? tomoyo_file_ioctl+0x23/0x30 [ 469.246202][T19205] ? security_file_ioctl+0x6d/0xd0 [ 469.251299][T19205] ? __x64_sys_ioctl+0xa3/0x120 [ 469.256145][T19205] ? do_syscall_64+0xf7/0x1c0 [ 469.260802][T19205] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 469.266867][T19205] ? debug_check_no_obj_freed+0x505/0x5b0 [ 469.272584][T19205] ? rcu_lock_release+0x9/0x30 [ 469.277342][T19205] ? rcu_lock_release+0x9/0x30 [ 469.282089][T19205] ? lo_release+0x1f0/0x1f0 [ 469.286568][T19205] blkdev_ioctl+0x807/0x2980 [ 469.291137][T19205] ? tomoyo_path_number_perm+0x53e/0x640 [ 469.296794][T19205] block_ioctl+0xbd/0x100 [ 469.301099][T19205] ? blkdev_iopoll+0x100/0x100 [ 469.305838][T19205] do_vfs_ioctl+0x744/0x1730 [ 469.310401][T19205] ? __fget+0x411/0x510 [ 469.314537][T19205] ? tomoyo_file_ioctl+0x23/0x30 [ 469.319450][T19205] ? security_file_ioctl+0xa1/0xd0 [ 469.324539][T19205] __x64_sys_ioctl+0xe3/0x120 [ 469.329203][T19205] do_syscall_64+0xf7/0x1c0 [ 469.333775][T19205] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 469.339643][T19205] RIP: 0033:0x45a087 [ 469.343512][T19205] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 469.363094][T19205] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 469.371493][T19205] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 469.379441][T19205] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 469.387475][T19205] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 469.395427][T19205] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 469.403385][T19205] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:37:50 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) 03:37:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='\a\x00\x00\x00/uLnp\xc0V\x00', 0x5462754dd6501ccf, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r3, r4, 0x0) read$usbmon(r4, &(0x7f0000000240)=""/236, 0xec) pipe(&(0x7f0000000040)) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r2, 0x0, 0x0) 03:37:51 executing program 4 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 469.651796][T19234] FAULT_INJECTION: forcing a failure. [ 469.651796][T19234] name failslab, interval 1, probability 0, space 0, times 0 [ 469.700020][T19234] CPU: 0 PID: 19234 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 469.708103][T19234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.718205][T19234] Call Trace: [ 469.721495][T19234] dump_stack+0x1fb/0x318 [ 469.725844][T19234] should_fail+0x555/0x770 [ 469.730273][T19234] __should_failslab+0x11a/0x160 [ 469.735214][T19234] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 469.740920][T19234] should_failslab+0x9/0x20 [ 469.745403][T19234] __kmalloc+0x7a/0x340 [ 469.749538][T19234] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 469.755251][T19234] tomoyo_realpath_from_path+0xdc/0x7c0 [ 469.760797][T19234] tomoyo_path_number_perm+0x166/0x640 [ 469.766256][T19234] ? rcu_read_lock_sched_held+0x10b/0x170 [ 469.772138][T19234] ? trace_kmem_cache_free+0xb2/0x110 [ 469.777512][T19234] tomoyo_path_mkdir+0x9c/0xc0 [ 469.782285][T19234] security_path_mkdir+0xed/0x170 [ 469.787377][T19234] do_mkdirat+0x15c/0x320 [ 469.791687][T19234] __x64_sys_mkdir+0x60/0x70 [ 469.796255][T19234] do_syscall_64+0xf7/0x1c0 [ 469.800739][T19234] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 469.806610][T19234] RIP: 0033:0x459637 [ 469.810495][T19234] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 469.830091][T19234] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 469.838493][T19234] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 469.846540][T19234] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 469.854596][T19234] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 469.862694][T19234] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 469.870652][T19234] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 469.880860][T19234] ERROR: Out of memory at tomoyo_realpath_from_path. 03:37:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x86}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:37:53 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:37:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:53 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x4, 0x100) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000080)={'ah\x00'}, &(0x7f00000000c0)=0x1e) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:53 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x0, 0x0) dup(0xffffffffffffffff) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000003c0)={0x5, 0x0, [{0x129, 0x0, 0x6}, {}, {}, {0x0, 0x0, 0x9}, {}]}) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x440}, 0xc, &(0x7f0000000440)={&(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="db8f88a8ce914e0c0002000200faffdc34050008004b000000000008000b00d76511049fd23f65ac669a0600000008000b0007000000"], 0x2}, 0x1, 0x0, 0x0, 0x2400d080}, 0x802) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000780)=""/141) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0xc7}) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) socket(0x9, 0x3, 0x4) socket$inet(0x2, 0x3, 0xd) utimensat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000640)={{0x0, 0x2710}}, 0x0) 03:37:53 executing program 4 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:53 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r1, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 472.144759][T19254] FAULT_INJECTION: forcing a failure. [ 472.144759][T19254] name failslab, interval 1, probability 0, space 0, times 0 03:37:53 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x109002, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)={0x3, [0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x10) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 472.191489][T19254] CPU: 1 PID: 19254 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 472.199440][T19254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.209498][T19254] Call Trace: [ 472.212796][T19254] dump_stack+0x1fb/0x318 [ 472.217130][T19254] should_fail+0x555/0x770 [ 472.221623][T19254] __should_failslab+0x11a/0x160 [ 472.226566][T19254] ? skb_clone+0x1cc/0x380 [ 472.230991][T19254] should_failslab+0x9/0x20 [ 472.235493][T19254] kmem_cache_alloc+0x56/0x2e0 [ 472.240257][T19254] skb_clone+0x1cc/0x380 [ 472.244490][T19254] netlink_broadcast_filtered+0x619/0x1080 [ 472.251701][T19254] netlink_broadcast+0x3a/0x50 [ 472.256489][T19254] kobject_uevent_env+0xcf1/0x1260 [ 472.261606][T19254] kobject_uevent+0x1f/0x30 [ 472.266093][T19254] loop_set_fd+0xfc3/0x1470 [ 472.270590][T19254] lo_ioctl+0xd5/0x2200 [ 472.274733][T19254] ? __kasan_slab_free+0x12a/0x1e0 [ 472.279829][T19254] ? kasan_slab_free+0xe/0x10 [ 472.284496][T19254] ? kfree+0x115/0x200 [ 472.288568][T19254] ? tomoyo_path_number_perm+0x4e1/0x640 [ 472.294183][T19254] ? tomoyo_file_ioctl+0x23/0x30 [ 472.299120][T19254] ? security_file_ioctl+0x6d/0xd0 [ 472.304244][T19254] ? __x64_sys_ioctl+0xa3/0x120 [ 472.309091][T19254] ? do_syscall_64+0xf7/0x1c0 [ 472.313758][T19254] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.319881][T19254] ? debug_check_no_obj_freed+0x505/0x5b0 [ 472.325592][T19254] ? rcu_lock_release+0x9/0x30 [ 472.330336][T19254] ? rcu_lock_release+0x9/0x30 [ 472.335093][T19254] ? lo_release+0x1f0/0x1f0 [ 472.339584][T19254] blkdev_ioctl+0x807/0x2980 [ 472.344174][T19254] ? tomoyo_path_number_perm+0x53e/0x640 [ 472.349860][T19254] block_ioctl+0xbd/0x100 [ 472.354185][T19254] ? blkdev_iopoll+0x100/0x100 [ 472.358947][T19254] do_vfs_ioctl+0x744/0x1730 [ 472.363514][T19254] ? __fget+0x411/0x510 [ 472.367655][T19254] ? tomoyo_file_ioctl+0x23/0x30 [ 472.372590][T19254] ? security_file_ioctl+0xa1/0xd0 [ 472.377834][T19254] __x64_sys_ioctl+0xe3/0x120 [ 472.382505][T19254] do_syscall_64+0xf7/0x1c0 [ 472.387002][T19254] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.392882][T19254] RIP: 0033:0x45a087 [ 472.396765][T19254] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.416388][T19254] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 472.424795][T19254] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 472.432764][T19254] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 472.440721][T19254] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 472.448676][T19254] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 472.456642][T19254] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:37:54 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r1, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:54 executing program 0: r0 = accept(0xffffffffffffffff, &(0x7f0000000040)=@caif=@util, &(0x7f00000000c0)=0x80) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x166, 0x7, 0x1, 0x7, 0x800, 0x80000000, 0xa09}, 0x1c) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12908, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r1, 0x0, 0x0) [ 472.519501][T19249] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 03:37:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f", 0x90}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:37:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev\x15i\x06\x00ut/mice\x00', 0x0, 0x109902) dup3(r0, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000080)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0x2f}, [@map_val={0x18, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f0000003ff6)='OPL\x00', 0x2, 0xcc, &(0x7f00000000c0)=""/204, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4}, 0x10}, 0x70) ftruncate(0xffffffffffffffff, 0x0) 03:37:54 executing program 4 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 472.712389][T19282] FAULT_INJECTION: forcing a failure. [ 472.712389][T19282] name failslab, interval 1, probability 0, space 0, times 0 [ 472.743054][T19282] CPU: 0 PID: 19282 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 472.750997][T19282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.761053][T19282] Call Trace: [ 472.764342][T19282] dump_stack+0x1fb/0x318 [ 472.768677][T19282] should_fail+0x555/0x770 [ 472.773102][T19282] __should_failslab+0x11a/0x160 [ 472.778034][T19282] ? skb_clone+0x1cc/0x380 [ 472.782458][T19282] should_failslab+0x9/0x20 [ 472.786964][T19282] kmem_cache_alloc+0x56/0x2e0 [ 472.791727][T19282] skb_clone+0x1cc/0x380 [ 472.795969][T19282] netlink_broadcast_filtered+0x619/0x1080 [ 472.801785][T19282] netlink_broadcast+0x3a/0x50 [ 472.806545][T19282] kobject_uevent_env+0xcf1/0x1260 [ 472.811664][T19282] kobject_uevent+0x1f/0x30 [ 472.816159][T19282] loop_set_fd+0xfc3/0x1470 [ 472.820669][T19282] lo_ioctl+0xd5/0x2200 [ 472.824823][T19282] ? __kasan_slab_free+0x12a/0x1e0 [ 472.829937][T19282] ? kasan_slab_free+0xe/0x10 [ 472.834606][T19282] ? kfree+0x115/0x200 [ 472.838664][T19282] ? tomoyo_path_number_perm+0x4e1/0x640 [ 472.844296][T19282] ? tomoyo_file_ioctl+0x23/0x30 [ 472.849395][T19282] ? security_file_ioctl+0x6d/0xd0 [ 472.854501][T19282] ? __x64_sys_ioctl+0xa3/0x120 [ 472.859340][T19282] ? do_syscall_64+0xf7/0x1c0 [ 472.864441][T19282] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.870506][T19282] ? debug_check_no_obj_freed+0x505/0x5b0 [ 472.876238][T19282] ? rcu_lock_release+0x9/0x30 [ 472.881005][T19282] ? rcu_lock_release+0x9/0x30 [ 472.885765][T19282] ? lo_release+0x1f0/0x1f0 [ 472.890261][T19282] blkdev_ioctl+0x807/0x2980 [ 472.894851][T19282] ? tomoyo_path_number_perm+0x53e/0x640 [ 472.900499][T19282] block_ioctl+0xbd/0x100 [ 472.904822][T19282] ? blkdev_iopoll+0x100/0x100 [ 472.909581][T19282] do_vfs_ioctl+0x744/0x1730 [ 472.914166][T19282] ? __fget+0x411/0x510 [ 472.918325][T19282] ? tomoyo_file_ioctl+0x23/0x30 [ 472.923257][T19282] ? security_file_ioctl+0xa1/0xd0 [ 472.928370][T19282] __x64_sys_ioctl+0xe3/0x120 [ 472.933044][T19282] do_syscall_64+0xf7/0x1c0 [ 472.937545][T19282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.943428][T19282] RIP: 0033:0x45a087 [ 472.947323][T19282] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.967789][T19282] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 472.976191][T19282] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 472.984154][T19282] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 472.992153][T19282] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 473.000119][T19282] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 03:37:54 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:37:54 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x100008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:37:54 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r1, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x9, &(0x7f0000002680)=[{&(0x7f00000001c0)="d99e64b68bee4f54c472f824440509af78341265c88845c535a7da9d4e553921fdd8fc99cf0974455c35be145eefd0e77c0da411aaa4c8741597d3db315d7fd4094ceb61dda14848035d60f6d8ac1434c14c79ea7b50e2c55685d11ec4bbabd04a8303e66c5f4baea94b44ad2f6739527ffa6e862b0a805d1077d8b8a50aedcf57bde19f876e42baff8bde89ca744732699dbc305239dbfb080ac95df0bc3aea49cfc7726138882181d3808681165f91b994c2c13adcc6aebbc83bf838aab696c0525eaaaffa92ad3165051f86ea2781", 0xd0, 0x80000000}, {&(0x7f00000002c0)="e4378db45f3422369ad3ff217687c97f2121f29717a5cd498bbd92f3c382b52c8d8f68b34641e8fa0ad5c0b05864c1b210d1daddbb9cd1981e3267a01168ad05abd6329b664741c3ca6e277b25a364954ecfdffcc848b2a2e6634c476afa556fe4fc6ceaf71a46ec7ea7542486a7488b7c0df5ec479087ab430f516e61762b6c2c475f", 0x83, 0x7e}, {&(0x7f0000000380)="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", 0x1000, 0x3}, {&(0x7f0000001380)="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", 0x1000, 0x8000}, {&(0x7f0000002380)="42f4a7cc4042d783b871e44bc25f2686a1e0dd65f4b58fa08e879eb72564c67c5774334a8334c58fe784f7a14e4e2b8bb3bf7cec23884a493554d6e7a7913fd301d8c771dcff0f3c1cc1c7a421d3ed", 0x4f, 0x4}, {&(0x7f0000002400)="ab99d295298f34fcef17e48cd591d2199f0339060fbebb972654c9140f15c54b8a48eb5f4f06ad5b19575b61c95dd43cc374b0d35e9d115deae2d945e8ecd217b84c5346015a1f1095b4536ddfacc98160b26df44c", 0x55, 0x1}, {&(0x7f0000002480)="39904ae204b62a7da96415fca9ba2feca070d9be7f2556046c7f56328dd052d3534615a22b8524720a509624ece5b4008c7ddddc9b638c66a4e95012d6dee38498712aaea6b78fe336d89508e602183b7b5c74331d7b1d7371e441492802a1d9934d4daacdf93a845e97e174ba0d1eebb7b6a6831eae14c596304140fd1d1257f7359846b4c7a9b2d39db5faeb31c5e498d4d228488bee861f52f417d486feb5fc51f44c52a07c6c4f93b0dbd976ce510523beaa552a2542420e2465ffc1492cefc62ab31ef4cb5c0b0cc1fd4e2b", 0xce, 0xff}, {&(0x7f0000002580)="74d9f9743f18bab4573f0e7336b7de63f2139957743e5a63aba9b3bb27ea0fb5", 0x20, 0x800}, {&(0x7f00000025c0)="b6d29fcadcf9374d75b4ab038fb7eb1ebf2fcf2571e1f1ffef2d30c640570baf1be2202b97f7e73d4957f3040f8bedbc723b8ef50df5cb4a809191e1cedf2d8a0a28a6bd7234ed3efb51f77c4b9be68074446f8848a396ab15680af87284900c15b0d010271fd8f62d71e0bf762c4b91c9aee13886d84bf3ceebc368248c5ae0fbf63bdd5aa5fc0e3550f9629205", 0x8e, 0x7}], 0x0, &(0x7f0000002940)=ANY=[@ANYBLOB="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"]) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xffffffffffffff18, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc0000001c00071bab0925000900070007ab08000c000000f0007e93210001c000000000000000000000000000039915fa2c1ec28670e9889bb94b46fe0000000a0002", 0x43) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 473.008087][T19282] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:37:54 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0xfffffffffffffffc}, 0x28, 0x2) 03:37:54 executing program 4 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 473.137846][T19295] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.1'. 03:37:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 473.185293][T19295] device ip6gretap0 entered promiscuous mode [ 473.228966][T19295] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.1'. [ 473.241570][T19299] FAULT_INJECTION: forcing a failure. [ 473.241570][T19299] name failslab, interval 1, probability 0, space 0, times 0 [ 473.323354][T19299] CPU: 0 PID: 19299 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 473.331306][T19299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.341360][T19299] Call Trace: [ 473.344741][T19299] dump_stack+0x1fb/0x318 [ 473.349083][T19299] should_fail+0x555/0x770 [ 473.353519][T19299] __should_failslab+0x11a/0x160 [ 473.358446][T19299] ? ext4_alloc_inode+0x1f/0x560 [ 473.363377][T19299] should_failslab+0x9/0x20 [ 473.367870][T19299] kmem_cache_alloc+0x56/0x2e0 [ 473.372635][T19299] ? set_qf_name+0x3c0/0x3c0 [ 473.377218][T19299] ext4_alloc_inode+0x1f/0x560 [ 473.381996][T19299] ? set_qf_name+0x3c0/0x3c0 [ 473.386583][T19299] new_inode_pseudo+0x68/0x240 [ 473.391347][T19299] new_inode+0x28/0x1c0 [ 473.395527][T19299] ? trace_ext4_request_inode+0x28b/0x2d0 [ 473.401245][T19299] __ext4_new_inode+0x43d/0x5650 [ 473.406182][T19299] ? memset+0x31/0x40 [ 473.410189][T19299] ? smk_curacc+0xa3/0xe0 [ 473.414523][T19299] ext4_mkdir+0x3f5/0x1450 [ 473.419034][T19299] ? security_inode_permission+0xdd/0x120 [ 473.424758][T19299] vfs_mkdir+0x43f/0x610 [ 473.429003][T19299] do_mkdirat+0x1d7/0x320 [ 473.433336][T19299] __x64_sys_mkdir+0x60/0x70 [ 473.437922][T19299] do_syscall_64+0xf7/0x1c0 [ 473.442431][T19299] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.448313][T19299] RIP: 0033:0x459637 [ 473.452203][T19299] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:37:55 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x9, &(0x7f0000002680)=[{&(0x7f00000001c0)="d99e64b68bee4f54c472f824440509af78341265c88845c535a7da9d4e553921fdd8fc99cf0974455c35be145eefd0e77c0da411aaa4c8741597d3db315d7fd4094ceb61dda14848035d60f6d8ac1434c14c79ea7b50e2c55685d11ec4bbabd04a8303e66c5f4baea94b44ad2f6739527ffa6e862b0a805d1077d8b8a50aedcf57bde19f876e42baff8bde89ca744732699dbc305239dbfb080ac95df0bc3aea49cfc7726138882181d3808681165f91b994c2c13adcc6aebbc83bf838aab696c0525eaaaffa92ad3165051f86ea2781", 0xd0, 0x80000000}, {&(0x7f00000002c0)="e4378db45f3422369ad3ff217687c97f2121f29717a5cd498bbd92f3c382b52c8d8f68b34641e8fa0ad5c0b05864c1b210d1daddbb9cd1981e3267a01168ad05abd6329b664741c3ca6e277b25a364954ecfdffcc848b2a2e6634c476afa556fe4fc6ceaf71a46ec7ea7542486a7488b7c0df5ec479087ab430f516e61762b6c2c475f", 0x83, 0x7e}, {&(0x7f0000000380)="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", 0x1000, 0x3}, {&(0x7f0000001380)="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", 0x1000, 0x8000}, {&(0x7f0000002380)="42f4a7cc4042d783b871e44bc25f2686a1e0dd65f4b58fa08e879eb72564c67c5774334a8334c58fe784f7a14e4e2b8bb3bf7cec23884a493554d6e7a7913fd301d8c771dcff0f3c1cc1c7a421d3ed", 0x4f, 0x4}, {&(0x7f0000002400)="ab99d295298f34fcef17e48cd591d2199f0339060fbebb972654c9140f15c54b8a48eb5f4f06ad5b19575b61c95dd43cc374b0d35e9d115deae2d945e8ecd217b84c5346015a1f1095b4536ddfacc98160b26df44c", 0x55, 0x1}, {&(0x7f0000002480)="39904ae204b62a7da96415fca9ba2feca070d9be7f2556046c7f56328dd052d3534615a22b8524720a509624ece5b4008c7ddddc9b638c66a4e95012d6dee38498712aaea6b78fe336d89508e602183b7b5c74331d7b1d7371e441492802a1d9934d4daacdf93a845e97e174ba0d1eebb7b6a6831eae14c596304140fd1d1257f7359846b4c7a9b2d39db5faeb31c5e498d4d228488bee861f52f417d486feb5fc51f44c52a07c6c4f93b0dbd976ce510523beaa552a2542420e2465ffc1492cefc62ab31ef4cb5c0b0cc1fd4e2b", 0xce, 0xff}, {&(0x7f0000002580)="74d9f9743f18bab4573f0e7336b7de63f2139957743e5a63aba9b3bb27ea0fb5", 0x20, 0x800}, {&(0x7f00000025c0)="b6d29fcadcf9374d75b4ab038fb7eb1ebf2fcf2571e1f1ffef2d30c640570baf1be2202b97f7e73d4957f3040f8bedbc723b8ef50df5cb4a809191e1cedf2d8a0a28a6bd7234ed3efb51f77c4b9be68074446f8848a396ab15680af87284900c15b0d010271fd8f62d71e0bf762c4b91c9aee13886d84bf3ceebc368248c5ae0fbf63bdd5aa5fc0e3550f9629205", 0x8e, 0x7}], 0x0, &(0x7f0000002940)=ANY=[@ANYBLOB="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"]) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xffffffffffffff18, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc0000001c00071bab0925000900070007ab08000c000000f0007e93210001c000000000000000000000000000039915fa2c1ec28670e9889bb94b46fe0000000a0002", 0x43) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 473.471801][T19299] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 473.480206][T19299] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 473.489753][T19299] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 473.497739][T19299] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 473.505741][T19299] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 473.514880][T19299] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 473.688811][T19311] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.1'. [ 473.724770][T19311] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.1'. 03:37:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f", 0x90}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:37:57 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:37:57 executing program 4 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:37:57 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) 03:37:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:37:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x9, &(0x7f0000002680)=[{&(0x7f00000001c0)="d99e64b68bee4f54c472f824440509af78341265c88845c535a7da9d4e553921fdd8fc99cf0974455c35be145eefd0e77c0da411aaa4c8741597d3db315d7fd4094ceb61dda14848035d60f6d8ac1434c14c79ea7b50e2c55685d11ec4bbabd04a8303e66c5f4baea94b44ad2f6739527ffa6e862b0a805d1077d8b8a50aedcf57bde19f876e42baff8bde89ca744732699dbc305239dbfb080ac95df0bc3aea49cfc7726138882181d3808681165f91b994c2c13adcc6aebbc83bf838aab696c0525eaaaffa92ad3165051f86ea2781", 0xd0, 0x80000000}, {&(0x7f00000002c0)="e4378db45f3422369ad3ff217687c97f2121f29717a5cd498bbd92f3c382b52c8d8f68b34641e8fa0ad5c0b05864c1b210d1daddbb9cd1981e3267a01168ad05abd6329b664741c3ca6e277b25a364954ecfdffcc848b2a2e6634c476afa556fe4fc6ceaf71a46ec7ea7542486a7488b7c0df5ec479087ab430f516e61762b6c2c475f", 0x83, 0x7e}, {&(0x7f0000000380)="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", 0x1000, 0x3}, {&(0x7f0000001380)="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", 0x1000, 0x8000}, {&(0x7f0000002380)="42f4a7cc4042d783b871e44bc25f2686a1e0dd65f4b58fa08e879eb72564c67c5774334a8334c58fe784f7a14e4e2b8bb3bf7cec23884a493554d6e7a7913fd301d8c771dcff0f3c1cc1c7a421d3ed", 0x4f, 0x4}, {&(0x7f0000002400)="ab99d295298f34fcef17e48cd591d2199f0339060fbebb972654c9140f15c54b8a48eb5f4f06ad5b19575b61c95dd43cc374b0d35e9d115deae2d945e8ecd217b84c5346015a1f1095b4536ddfacc98160b26df44c", 0x55, 0x1}, {&(0x7f0000002480)="39904ae204b62a7da96415fca9ba2feca070d9be7f2556046c7f56328dd052d3534615a22b8524720a509624ece5b4008c7ddddc9b638c66a4e95012d6dee38498712aaea6b78fe336d89508e602183b7b5c74331d7b1d7371e441492802a1d9934d4daacdf93a845e97e174ba0d1eebb7b6a6831eae14c596304140fd1d1257f7359846b4c7a9b2d39db5faeb31c5e498d4d228488bee861f52f417d486feb5fc51f44c52a07c6c4f93b0dbd976ce510523beaa552a2542420e2465ffc1492cefc62ab31ef4cb5c0b0cc1fd4e2b", 0xce, 0xff}, {&(0x7f0000002580)="74d9f9743f18bab4573f0e7336b7de63f2139957743e5a63aba9b3bb27ea0fb5", 0x20, 0x800}, {&(0x7f00000025c0)="b6d29fcadcf9374d75b4ab038fb7eb1ebf2fcf2571e1f1ffef2d30c640570baf1be2202b97f7e73d4957f3040f8bedbc723b8ef50df5cb4a809191e1cedf2d8a0a28a6bd7234ed3efb51f77c4b9be68074446f8848a396ab15680af87284900c15b0d010271fd8f62d71e0bf762c4b91c9aee13886d84bf3ceebc368248c5ae0fbf63bdd5aa5fc0e3550f9629205", 0x8e, 0x7}], 0x0, &(0x7f0000002940)=ANY=[@ANYBLOB="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"]) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xffffffffffffff18, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc0000001c00071bab0925000900070007ab08000c000000f0007e93210001c000000000000000000000000000039915fa2c1ec28670e9889bb94b46fe0000000a0002", 0x43) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:37:57 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000040)=""/109, 0x7}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 475.761241][T19328] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.1'. [ 475.771584][T19328] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.1'. [ 475.793934][T19325] FAULT_INJECTION: forcing a failure. [ 475.793934][T19325] name failslab, interval 1, probability 0, space 0, times 0 [ 475.824696][T19325] CPU: 0 PID: 19325 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 475.832640][T19325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.832659][T19325] Call Trace: [ 475.832677][T19325] dump_stack+0x1fb/0x318 [ 475.832694][T19325] should_fail+0x555/0x770 [ 475.832711][T19325] __should_failslab+0x11a/0x160 [ 475.832725][T19325] ? tomoyo_encode2+0x273/0x5a0 [ 475.864578][T19325] should_failslab+0x9/0x20 [ 475.869085][T19325] __kmalloc+0x7a/0x340 [ 475.873251][T19325] tomoyo_encode2+0x273/0x5a0 [ 475.877928][T19325] tomoyo_realpath_from_path+0x769/0x7c0 [ 475.885703][T19325] tomoyo_path_number_perm+0x166/0x640 [ 475.891191][T19325] ? rcu_read_lock_sched_held+0x10b/0x170 [ 475.896916][T19325] ? trace_kmem_cache_free+0xb2/0x110 [ 475.902301][T19325] tomoyo_path_mkdir+0x9c/0xc0 [ 475.907077][T19325] security_path_mkdir+0xed/0x170 [ 475.912123][T19325] do_mkdirat+0x15c/0x320 [ 475.916468][T19325] __x64_sys_mkdir+0x60/0x70 [ 475.921065][T19325] do_syscall_64+0xf7/0x1c0 [ 475.925571][T19325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.931455][T19325] RIP: 0033:0x459637 [ 475.935365][T19325] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 475.954972][T19325] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 475.963379][T19325] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 03:37:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 475.971356][T19325] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 475.979324][T19325] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 475.987378][T19325] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 475.995343][T19325] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 476.012851][T19325] ERROR: Out of memory at tomoyo_realpath_from_path. 03:37:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x9, &(0x7f0000002680)=[{&(0x7f00000001c0)="d99e64b68bee4f54c472f824440509af78341265c88845c535a7da9d4e553921fdd8fc99cf0974455c35be145eefd0e77c0da411aaa4c8741597d3db315d7fd4094ceb61dda14848035d60f6d8ac1434c14c79ea7b50e2c55685d11ec4bbabd04a8303e66c5f4baea94b44ad2f6739527ffa6e862b0a805d1077d8b8a50aedcf57bde19f876e42baff8bde89ca744732699dbc305239dbfb080ac95df0bc3aea49cfc7726138882181d3808681165f91b994c2c13adcc6aebbc83bf838aab696c0525eaaaffa92ad3165051f86ea2781", 0xd0, 0x80000000}, {&(0x7f00000002c0)="e4378db45f3422369ad3ff217687c97f2121f29717a5cd498bbd92f3c382b52c8d8f68b34641e8fa0ad5c0b05864c1b210d1daddbb9cd1981e3267a01168ad05abd6329b664741c3ca6e277b25a364954ecfdffcc848b2a2e6634c476afa556fe4fc6ceaf71a46ec7ea7542486a7488b7c0df5ec479087ab430f516e61762b6c2c475f", 0x83, 0x7e}, {&(0x7f0000000380)="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", 0x1000, 0x3}, {&(0x7f0000001380)="0b3c21a4066c6dc862cd4c07aa3c0679e4c6c5a8f62827c3cbf9d9dd0eb7cdd1d016dcaceaed23bbec4583eead1447f335af8d4cf15d9279a8b642f406e3c7d90a63c70b8140887b5463031f12afd43104211ec1054c78ff4c60a02b7fc4c18bb278f2a3c33bcd582424819414b96f0231862542022a4987401b990ca1526ea05f0dd7b897c6957109900f3f0221b46a8a4cd0a262d6b0ceb0a2353526cdec5cb106243a2a8c4734610cfa0f26a799bc7e2fd66b3a80fd3dd82f2c0a78c4254cf71777a62eb12ef00fe66adc14146ed35e1ab8ead35825568668189879cf1768a5f34abab451b67803a136cf20bd3dacf24c0618d8e4bac806559dcf15dc45527bb21cc470505ed2e3131e10648e47c58fa22d9da3e3ad8ff3f64306adb4a51f64cf07a41bcce4803feea4347b80376b27431a5b51f1bd5e464fcfece4ea9f7f5a5789419399d821b18f673e064d274d3b1bbd7565a0a225fe393588803d8881d737138e46ceb325a578e01d6b88fc526ac61ecc44d247d4136db85b57e4e07d5de5fc6c699c8b2d9b0dad889fbe4149dcdfb661971e89df23b39be7eecacbde25ef6c863085d94c9796f8377ccc38a83f12af9cd2d7e119964522de8c361ad365245b6ffc5806484f6631521584fcce772f7862966e09677f93c04ee992ca5aeba461f0b2285464d32c5c8095426b5b765b7cc34351ba4093e8b6068036a8ea988960ebfe2ef59025f2cdb80fa18f5464fca1b8db0a8b87c52fd8484d0e084ab1dba271094c05a8e9fb1427f8c88c9ec7af40e1afc4ffcc8f34bcbc3a9bd2facc64592d4ab9f9462561aac041b24c3ccbf3573018f5cec95ad7f42bcdfd2e338a5dbfc3e2d26905f24b40dfc486b66c479cdf09b76d927e1f7f56eed4385acd69467309b9688d341a975c66709fd8162dea32edc9fc1634e3dd01b46c67984bada3ea37a21f9add4327d2ae97c2fbcfff44b071d2a98526ad38c178fb3e57eb2131b673d7a02f053d18d93697fb394c5a8b665e9946df4663e972d2a583245cdc4ee810292cdf13f88ed2c3709dfc54a7bb47c3c662f605070862834d819f1d629a95a64f8b851b4c8df8ddad19f326196ff59a6bfb6bcec052fc457c35ed876bdca2cf6a0afa9b6d2f0bec5cbbe2666569c576ca2fa38b1002948ef610303292126af432653d036ec603dc7a7847c446d37d31110582ff9cc231c09c8704c8efe8b8c78176c7b1dc79e859ba14c2bdd5b8fa62a68f625dfb3551ee9469a61b3c4e40fad69beed16cc4b3d16e0ca4811183a1c4fb77c6d383e9844050101e326db72cc587a21dc8c34b1c070294b5d3676a1950d84545991778af53eb1f43d20612d2f74086cf2a9e8e552c00f890c1b13ffdfa451f744373f674311a7879963256f7d0fb24747b5411721290e6cc013b92b07f2eb20b02c69476c08d3b7b224413417849a0af8d9b0040df4f862ade2f1136687e31a41c606f6b8414c8ed584a75def2f27243bb34f1a412ca790364b7e43f393d74727a2e2e7df47f2716cd0bc65a779e1e9476b86d8329d1626ba68d0ed5ad45eda6d0eb24cc84122262e04ea6be7b5f0796a7f2697a41612cdb69c490a093d10dfd8de0b4c13668c25f7498782a04afac384c59105c4ab620086dcb7c2ff0bfd5677d062980ed6c410671e66ab1ec7df4beeb352ea9c6f39d4dea26c4e845bb566b78a0b877e90530c74030272efb23414a37e4585874daa28c8a6fe61b8a65d205eea9f57c29645ac6fa072449b763d3538edbcf5ce5d0f38ea7816444c1cd1159575955c6df7a283279a525ca539fc8904f2a99420e83890a7b67f4851421cec65dc55c783c1da7714b10e5840e08ae36e2343aa503804d1547e3b1d47838d2b8a7a5a7c34a95eed5e0b39ff468651d876a0901f2ee927c7cbd89528a21d995239b7f1af1d1ab707fcd4123b52539cb09f35ee3027a9e05487c4f43412a77cbd556f9efaff6764fb3474667600b9dcca86bbceca11ef24a28c4de5eeef4335237484fed9f535ae7539b7f35706255fdd8d5440a05fa66b4064c44639cc3f200f45aae67ee464df7653cd3de8c69bb830748f1881131fdc8ed9df92b89d58b869e466c3546ecdd80bec8d8b0e1f22553a471b35dc6eb3609dcd77ea9e9442e2aa7d7785f10adf5ef25fc5eae2acc63ebd91ca2755dc87430fc9ae4be76a398e461a7c7d9ec2e2ec65c118d3aebc59af0f965eb1b897934ae69238b0ee0ca2d7cf1aad8a96bc07bf9e4479ddb82cf9cac4e0cb918ba543161f01073641e221a711f4eff80c17f290e9ec0d1cacbd3c18822be9cbffa4157d54fafdf778b3456dde86a62ca6816428b5e93f12e36349cba870a489e0179707ab46a2c85a09e7f1047d79a3ae120450817348b38d68d12c8c9efb6d21670b5c68ee0a955e3b54ffccec4fa108e181dc89554f303defcca88a8e6c328a84f72296129cd74725d77b910e8fcb3bf7af35d3c8615232f3981c3d2f757c97ffd0de6ed8a4408a0a1c78dd1aa9b334a332c3c7ac3412f966638ec16dc052225034a42d94bc146f3e622ce637ad5195e63f83c702dc112ba99e4e21b45ff1f4dc7d1bb51cbf7a9c451989fdfa35a6744eed4faa87148d4c5449d810bcc7a348e3bb40aa066ace29c4fe0f604a7627ff7347d64db95363db7beebaac04ae7418e4409338906b556dfeca288e6e81b15fc17e8c9215f95648693e28dbf1da408cde86357d34244c5a66f0655622db10ce99668455a680920ed06bb077a51d88c28749dc2c6a1861559b0223664480aa8a4c1e03594cf045f7a1c8158ef2ca8fc8b2c1e6544e598342e55c7a0dfa1d5731f1e9f2571a7902e7f102a2025ccd59ed1b1c41c211ae50417638cb90c22e4f61ddae560816dbfb56af69ea06315b4a02eb1e83388be26def388672d46c443f36872fbaf7fac2a4db0af6929165503e74b5c2be6d96a584be845208329887b460c2b4790832a7cd99ceaa43c11920021537bf7b0d2271b3118f36e4458842c8ae1832ad906fe14d7aeff3aba12a71dc0486c657affbf54ace150a24c528823d470bd0b66441740a11c79dc9beed103a58e30c651ecac6d762eb410d43797c60fc949e1489f701dc795431c55621c456b601bf85856cdcc28430877db557ad1990c51823b82976c52e81b3945f5000804e9fb9730e573468f93d0fa69c252f71013ceb87df93613ce68ca104faa2740d7ec8f9953909d2d30ccff2072f7bf07b6bf17b9dc50ad52bb912a2b55a8c3f4fb66d3a073412bc2a36bbaf26d655e2642b84b797d877cc205dabd100f140aedeb43da9c5cd94c219cab276979121309c2613fb9676cee8d88846908f27a8052fb441912351ac8321c7a637875e6acc54b5580b771741456b19851df84215da6518d2cc60425c84507bdd0cd9e35e7c17c2340a8d6a7c0d20e46c533be9251a8719b41785d323cc104f2b519bc3e49384894622b6ec3348132bacb351ca1b1cc544b7d5382ae4b53b916753920fcc59c3da0de7fd3ee8c0b84e62fb338253cbb60de15850b4237ee4b3e8ba31f2d1115041cd1c5b8907bd7cd23765db986675bc4f877258bbf3efcb93e6f20737c5b33296d55d5f3bc9abd1b3787069bc3cf4b2f2a5cd9807dd7c2ac6bb360909eb36b98bd47083542458b3dbfec13e29a0d5bb16fd6b1be6320b0f05ba25defb1ea7e0c0ae2000d04697aa0acd6478e46e7b1db73255bdb8151f2a5ec112214155f766fd5297994a2d97e9d121904dc8b9a4cf4fc3db340309bf24a3aff7f264964510fc488db45b15015f5b626fae4f438cf0cd84f268140000cba5366495c470d98b49ce3d1fb87ae155def96f12a4e3f6a8cc38b13fe95de669a2629108ea1cd3caed875575a81c22201b950304cc81a85e4aa05587e934239ecd4897b05c048102c1dea7bca2282d80bc41b2692f031b6a435e223b165fef10681344a95514c77240ddabfc5fcdd0591fd5ac48290c2c6944566ad2bc188c20123ae625b1595695781ac985c18e929abc7a4f85690a6b854945578eea989d51f0dba56d635911d6e7f2854aaf476ef19bb6cf10817f1c16b9ca33690aa329a469fcc483f4d4d9e70f22d01ac88d40c83cf1866cbd7095bdd42769dbabf657de9570586693ab1dd053f76bb3bbcf2a0cc074b0e9331365094ea61e5b492d2ecc11d1fa00cf7fdfa304b92b69370ce8990245b59c4dd9908dccdae18ebc4baca8fc1670cd8d6148ac00c7bfd8712ec8ffeec05ad31eb471fc9da9e7a7d22c6cae0d186ef65348996a92452dbff3f66507fb207480e5768b9ac6d9547ad06e487cac0ddd765db297a4a076151e6e6e630acd1b751eb471ea1c2a2615d6d114f971b07367ac1472c006772c43a9bb8cd0da930d7e68797d0f5486d06b8da93073468366bc32667a6abd526590e08698157f9956b74dc3d905516e5a5b313e9f1302d88dbe06e634b1b2fc07297f22a684dd1cea5670c0e997dc9cdccae7f844a81783730a8057f42a219254babe0004ba23dd56ae8207695634cdcf1341e5c6de3fc6f653bbf7daf435b76ea6eea1e0d72989765aee6f4a9d86e55a76d38e4637375a246706e245408de054742bbc54257dda8c5439773230886febfbb2e220536cafd6b2cf6963c57e452b6e32bcd38bc8106cb6be39d03966ff84bd41b004b20a4e5fc648f1cef1d568f3f91cf5c1c417661b20825a546b53dd61a5fe7c54c8057d5e245f2b883cc7938fabbdf2f3351506c378242dbcd10aa6cca43cedef1b9e133acdda7cfa8fc1332e9d0db5c6c12f9835dfdb3571e4be1b84a0b73065a87d82edf00c529b4b563f1a46bb0f1ee822d874d5e70312adf60956e9e587bed69718030007ca178f1fe766528c668adf6481c2f8739ac3797376e9d395469d56ab0f72c401db19404e375309c29954c869e69606e52b13e1adfffac7b181db9541265e0a4fc34921acb9b5754f60df1e7438e091247787f314a54a3010220432cafe32f2f7e48502948fcbafb7821c3d23e150bfe5d2de7d14145386a75febaf9daa1a7d862e19833e201afde44e98adc44ff3ec0412825cbea05a72b568926ac02de6d8ade3a2f06c1b9d4a272d4554a6c5c8313313ad84da617b277dda5fa1322d75c9db6cc727635fd47ca83342e706ce97bba341089556aa97a97d6bfe437d2d75bc3d9ddd16952420931f25a3707598f7fca48e4ca7657c44f127c00880a8963020fa69c31915225d00a562588979a4867b7984d96c05e042e3fbccd9c152cb4e055eee0570cbd917ca5a2d5c1ceff1b6b087ead07abe9892844851ac5790f7a49cfd19dcc6eda51969fa6816a8a22b7ccecb395b15be79849d6d8408e691e73360e918a1a9956950083024dc3800219cb4fa614ac9d053a31d857e504c041a450cb7b0c7043472bb32389837052913f4f8ecc0cba0689896fe7c3a85dff7e8b6fade4953103d1314763f199e00455c82205fd0242b605817402c4770b1f48d88979aa6e91bca05cfbde4515627b1aee423f3aba62e16f81d163cbce54d356684d0bd7242ddfe4a93b49f3f3015b9884df81681f920f406da2f1f63fdb8edc3bd57283cbb044ae517f2e41af51d877c1e645eb73addcfe1d699ee847df6aca46250e87404aaaf348d50a9c28df969989b294ad0d2b39c4079df0abfd5d9afdde1c313232626a9d8ef4d935749cf3015cd8ba00fc7d2d0348f0ef1a93eadb0b52b8498d2b86b0d14cc1103f8536d7864efa70bac9215207f3cf54edd7b873772e5ae8003b188f1236d65a6ea36c", 0x1000, 0x8000}, {&(0x7f0000002380)="42f4a7cc4042d783b871e44bc25f2686a1e0dd65f4b58fa08e879eb72564c67c5774334a8334c58fe784f7a14e4e2b8bb3bf7cec23884a493554d6e7a7913fd301d8c771dcff0f3c1cc1c7a421d3ed", 0x4f, 0x4}, {&(0x7f0000002400)="ab99d295298f34fcef17e48cd591d2199f0339060fbebb972654c9140f15c54b8a48eb5f4f06ad5b19575b61c95dd43cc374b0d35e9d115deae2d945e8ecd217b84c5346015a1f1095b4536ddfacc98160b26df44c", 0x55, 0x1}, {&(0x7f0000002480)="39904ae204b62a7da96415fca9ba2feca070d9be7f2556046c7f56328dd052d3534615a22b8524720a509624ece5b4008c7ddddc9b638c66a4e95012d6dee38498712aaea6b78fe336d89508e602183b7b5c74331d7b1d7371e441492802a1d9934d4daacdf93a845e97e174ba0d1eebb7b6a6831eae14c596304140fd1d1257f7359846b4c7a9b2d39db5faeb31c5e498d4d228488bee861f52f417d486feb5fc51f44c52a07c6c4f93b0dbd976ce510523beaa552a2542420e2465ffc1492cefc62ab31ef4cb5c0b0cc1fd4e2b", 0xce, 0xff}, {&(0x7f0000002580)="74d9f9743f18bab4573f0e7336b7de63f2139957743e5a63aba9b3bb27ea0fb5", 0x20, 0x800}, {&(0x7f00000025c0)="b6d29fcadcf9374d75b4ab038fb7eb1ebf2fcf2571e1f1ffef2d30c640570baf1be2202b97f7e73d4957f3040f8bedbc723b8ef50df5cb4a809191e1cedf2d8a0a28a6bd7234ed3efb51f77c4b9be68074446f8848a396ab15680af87284900c15b0d010271fd8f62d71e0bf762c4b91c9aee13886d84bf3ceebc368248c5ae0fbf63bdd5aa5fc0e3550f9629205", 0x8e, 0x7}], 0x0, &(0x7f0000002940)=ANY=[@ANYBLOB="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"]) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xffffffffffffff18, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc0000001c00071bab0925000900070007ab08000c000000f0007e93210001c000000000000000000000000000039915fa2c1ec28670e9889bb94b46fe0000000a0002", 0x43) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:37:57 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:37:57 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) r2 = dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000ae19b82a8f4803501dd5dce6a28a8c6ca3e9c628791735", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={r5, @in={{0x2, 0x0, @loopback}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000280)={r5, 0x7, 0x0, 0x0, 0xca66}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000040)={r5, @in={{0x2, 0x4e22, @loopback}}}, &(0x7f0000000100)=0x84) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x8000, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r9 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r8, r9, 0x0) r10 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={r12, @in={{0x2, 0x0, @loopback}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r10, 0x84, 0x73, &(0x7f0000000280)={r12, 0x7, 0x0, 0x0, 0xca66}, &(0x7f00000002c0)=0x18) r14 = socket(0x2000000000000021, 0x0, 0x10000000000002) r15 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r15, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r14, 0x84, 0x1a, &(0x7f0000000180)={r16, @in={{0x2, 0x0, @loopback}}}, &(0x7f0000000240)=0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000000240)=[{&(0x7f00000006c0)="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", 0x800}, {0x0}], 0x2, &(0x7f0000000500)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2, 0x9, 0x80, r13}}, @dstaddrv6={0x20, 0x84, 0x8, @local}, @sndrcv={0x30, 0x84, 0x1, {0x7c5a, 0xfff, 0x200, 0x5, 0x1, 0x5, 0x0, 0x0, r16}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x7ff}}], 0xa8, 0x800}, 0x80) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000180)={r16, @in={{0x2, 0x4e20}}, 0xcf2c, 0xa4e, 0x4, 0x2, 0x4}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r9, 0x84, 0x9, &(0x7f0000000400)={r16, @in6={{0xa, 0x4e20, 0xb2, @remote, 0x3ff}}, 0x7f, 0xd79, 0x1, 0x7da9}, &(0x7f00000004c0)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f0000000500)={0x1, 0x6, 0x402, 0x3ff, 0x3f, 0x7fff, 0x5252, 0x8001, r17}, &(0x7f00000005c0)=0x20) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r6, 0x0, 0x0) 03:37:57 executing program 4 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 476.180004][T19348] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.1'. [ 476.209881][T19348] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.1'. [ 476.306928][T19352] FAULT_INJECTION: forcing a failure. [ 476.306928][T19352] name failslab, interval 1, probability 0, space 0, times 0 [ 476.329469][T19352] CPU: 1 PID: 19352 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 476.337384][T19352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.337389][T19352] Call Trace: [ 476.337406][T19352] dump_stack+0x1fb/0x318 [ 476.337423][T19352] should_fail+0x555/0x770 [ 476.337441][T19352] __should_failslab+0x11a/0x160 [ 476.337453][T19352] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 476.337464][T19352] should_failslab+0x9/0x20 [ 476.337474][T19352] __kmalloc+0x7a/0x340 [ 476.337482][T19352] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 476.337494][T19352] tomoyo_realpath_from_path+0xdc/0x7c0 [ 476.337512][T19352] tomoyo_path_number_perm+0x166/0x640 [ 476.337542][T19352] ? rcu_read_lock_sched_held+0x10b/0x170 [ 476.337553][T19352] ? trace_kmem_cache_free+0xb2/0x110 [ 476.337566][T19352] tomoyo_path_mkdir+0x9c/0xc0 [ 476.337578][T19352] security_path_mkdir+0xed/0x170 [ 476.337592][T19352] do_mkdirat+0x15c/0x320 [ 476.359641][T19352] __x64_sys_mkdir+0x60/0x70 [ 476.359656][T19352] do_syscall_64+0xf7/0x1c0 [ 476.359671][T19352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.359685][T19352] RIP: 0033:0x459637 [ 476.396687][T19352] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.396694][T19352] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 476.396704][T19352] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 476.396710][T19352] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 476.396720][T19352] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 476.417562][T19352] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 476.417569][T19352] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 476.419617][T19352] ERROR: Out of memory at tomoyo_realpath_from_path. 03:38:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f", 0x90}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:00 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:00 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) 03:38:00 executing program 4 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:00 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9) fchdir(r1) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r3, r4, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r7, 0xee00) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)=0x0) setreuid(r7, r8) r9 = getegid() r10 = getpid() sched_setscheduler(r10, 0x5, 0x0) r11 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r12 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r11, r12, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f0000000700)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) r14 = getegid() r15 = getpid() sched_setscheduler(r15, 0x5, 0x0) r16 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r17, 0xee00) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)=0x0) setreuid(r17, r18) lstat(&(0x7f0000000080)='./control\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(0x0, 0x0, r19) r20 = getpid() sched_setscheduler(r20, 0x5, 0x0) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r23 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r24 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r23, r24, 0x0) ioctl$TIOCGPGRP(r24, 0x540f, &(0x7f00000009c0)=0x0) r26 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r27, 0xee00) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)=0x0) setreuid(r27, r28) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000ac0)=0x0) r31 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r31, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r32, 0xee00) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)=0x0) setreuid(r32, r33) lstat(&(0x7f0000000080)='./control\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(0x0, 0x0, r34) lstat(&(0x7f0000000080)='./control\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(0x0, 0x0, r35) lstat(&(0x7f0000000080)='./control\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(0x0, 0x0, r36) lstat(&(0x7f0000000080)='./control\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(0x0, 0x0, r37) getgroups(0x9, &(0x7f0000000b00)=[r34, 0x0, r35, 0x0, 0x0, 0xee01, r36, r37, 0xee01]) r39 = syz_open_dev$usbmon(&(0x7f0000000b40)='/dev/usbmon#\x00', 0x4, 0x1000) r40 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r41 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r40, r41, 0x0) r42 = getpid() sched_setscheduler(r42, 0x5, 0x0) getgroups(0x1, &(0x7f0000000b80)=[0x0]) r44 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r45 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r44, r45, 0x0) r46 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r47 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r46, r47, 0x0) r48 = accept4$unix(0xffffffffffffffff, &(0x7f0000000bc0)=@abs, &(0x7f0000000c40)=0x6e, 0xc0000) r49 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r50 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r49, r50, 0x0) r51 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r52 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r51, r52, 0x0) r53 = syz_open_dev$swradio(&(0x7f0000001380)='/dev/swradio#\x00', 0x1, 0x2) r54 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r55 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r54, r55, 0x0) r56 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r57 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r56, r57, 0x0) r58 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r59 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r58, r59, 0x0) r60 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r61 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r60, r61, 0x0) r62 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r63 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r62, r63, 0x0) r64 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r65 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r64, r65, 0x0) r66 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r67 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r66, r67, 0x0) r68 = openat$rtc(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/rtc0\x00', 0x10000, 0x0) r69 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r70 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r69, r70, 0x0) r71 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r72 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r71, r72, 0x0) r73 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r74 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r73, r74, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000001400)=0x0) r76 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r76, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r77, 0xee00) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)=0x0) setreuid(r77, r78) lstat(&(0x7f0000000080)='./control\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(0x0, 0x0, r79) lstat(&(0x7f0000000080)='./control\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(0x0, 0x0, r80) lstat(&(0x7f0000000080)='./control\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(0x0, 0x0, r81) getgroups(0x3, &(0x7f0000001440)=[r79, r80, r81]) r83 = bpf$PROG_LOAD(0x5, &(0x7f0000001a80)={0x17, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7fffffff}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8a3, 0x0, 0x0, 0x0, 0x20}, @alu={0x4, 0x1, 0x6, 0xa, 0x2, 0x0, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x36}]}, &(0x7f0000001980)='GPL\x00', 0xffff, 0x1c, &(0x7f00000019c0)=""/28, 0x41000, 0x2, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000001a40)={0x1, 0x9, 0x6, 0x6000000}, 0x10}, 0x70) r84 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000001b00)='/proc/self/attr/current\x00', 0x2, 0x0) r85 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r86 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r85, r86, 0x0) r87 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r88 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r87, r88, 0x0) r89 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r90 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r89, r90, 0x0) r91 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r92 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r91, r92, 0x0) r93 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r94 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r93, r94, 0x0) r95 = getpid() sched_setscheduler(r95, 0x5, 0x0) r96 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r96, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r97, 0xee00) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)=0x0) setreuid(r97, r98) lstat(&(0x7f0000000080)='./control\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(0x0, 0x0, r99) r100 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r101 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r100, r101, 0x0) r102 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r103 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r102, r103, 0x0) r104 = getpid() sched_setscheduler(r104, 0x5, 0x0) r105 = syz_open_dev$sndpcmc(&(0x7f0000001b40)='/dev/snd/pcmC#D#c\x00', 0x100000001, 0x480840) r106 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r107 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r106, r107, 0x0) r108 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r109 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r108, r109, 0x0) r110 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r111 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r110, r111, 0x0) r112 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000001b80)='/proc/self/attr/current\x00', 0x2, 0x0) r113 = openat$audio(0xffffffffffffff9c, &(0x7f0000001bc0)='/dev/audio\x00', 0x8001, 0x0) r114 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r115 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r114, r115, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003200)={0x0, r115, 0x0, 0x1, &(0x7f00000031c0)='\x00', 0xffffffffffffffff}, 0x30) fstat(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000032c0)=[0xee00]) r119 = getpid() sched_setscheduler(r119, 0x5, 0x0) r120 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r120, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r121, 0xee00) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)=0x0) setreuid(r121, r122) fstat(0xffffffffffffffff, &(0x7f0000003300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r124 = getpgid(0x0) getresuid(&(0x7f0000003380), &(0x7f00000033c0)=0x0, &(0x7f0000003400)) lstat(&(0x7f0000000080)='./control\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(0x0, 0x0, r126) r127 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r128 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r127, r128, 0x0) r129 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r130 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r129, r130, 0x0) r131 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r132 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r131, r132, 0x0) r133 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r134 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r133, r134, 0x0) r135 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r136 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r135, r136, 0x0) r137 = fcntl$getown(r135, 0x9) lstat(&(0x7f0000003c40)='./file0\x00', &(0x7f0000003c80)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000003d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r140 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r141 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r140, r141, 0x0) r142 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r143 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r142, r143, 0x0) r144 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r145 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r144, r145, 0x0) r146 = openat$vnet(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/vhost-net\x00', 0x2, 0x0) r147 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000003dc0)='/dev/mISDNtimer\x00', 0x8000, 0x0) sendmmsg$unix(r4, &(0x7f0000003f40)=[{&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000080)="62a395e78bdd4213379f67c25a4d040013ef", 0x12}, {&(0x7f0000000240)}, {&(0x7f0000000280)="298cb425d1f5d3667ee6", 0xa}, {&(0x7f00000002c0)="d5334408d6029f908f0aa21de2a306088d115631019ecb72d614d8e082c9029cc3ed602698295cff7121c46adb821aba487599c56d47fa08be7e83bbc36b8a7457467e0439a60566e50eb17eb8567c3495024ccbbb8fc8a569d17b8e9cd9ac70795e80d04607cf151b542ac27d5ef243c4feefaf61f0144200b96fb3d66f80527e814b76e232025e44e9f65237", 0x8d}], 0x4, &(0x7f0000000400)=[@cred={{0x1c, 0x1, 0x2, {r5, r7, r9}}}], 0x20, 0x800}, {&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000580)="a6208a95112412ab5e32623f486ffb4912aa2b9c059bbe23e358a892f23655522bc041b9417fc9bcdf527c12a121e9eece2d4e3f634a5691f21fce73b706ba80a5111160d8c4fc4fd1a5eeb101522156511644c171913c7f575cfc9b6290cb759fab4d7fe3", 0x65}, {&(0x7f0000000600)="466e8912777363eaccfccd7d657916b3007df6d9dfb9bd6d0ff02ec27efaf2772e9870fbcb88d04c6a6e72b92e780a923f3d5b1a706028b19930d49b5777b8777e1a4d3b8203901b558edab5b0f275f3472dd89e999756991dfc4a65566a1ce23a4ae30b4ac882c6d4699f3bbc5d1d063becdabe072757cbd2b1bfc3f943e3defd356f03af2c71d1c1d1c87757b96372a9d43345065dda0d042c33da8e3d45b67a1faeb94d8f2d5ca4ec6993b480494aa508be43d58d00293ce05a689fbfcb75fec5293b0ffb2cf24ff1bc5681a19df5c252f82e646c13e7f8f73b90f6eddb8950cb", 0xe2}], 0x2, &(0x7f0000000c80)=[@cred={{0x1c, 0x1, 0x2, {r10, r13, r14}}}, @cred={{0x1c, 0x1, 0x2, {r15, r18, r19}}}, @cred={{0x1c, 0x1, 0x2, {r20, r21, r22}}}, @cred={{0x1c, 0x1, 0x2, {r25, r27, r29}}}, @cred={{0x1c, 0x1, 0x2, {r30, r33, r38}}}, @rights={{0x20, 0x1, 0x1, [r0, r39, r40, r2]}}, @cred={{0x1c, 0x1, 0x2, {r42, 0xee00, r43}}}, @rights={{0x38, 0x1, 0x1, [r44, r46, r0, r1, r1, 0xffffffffffffffff, r48, r50, r52, 0xffffffffffffffff]}}], 0x118, 0x80}, {&(0x7f0000000dc0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f0000000e40)="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", 0xfb}, {&(0x7f0000000f40)="2fa9bf2d505f3e592aa90aff90e1760534a6202e6399a84b196308bb0aefaa5db6e1efe10af3fe5c8e689688c4857cea31668c7d0c4095ba48dec3496c47e364a706ddf514eccce28ba048ccf59133a473720149b615dc000e07bb705649a643918ec363e9722e1b61b6ba231c38a78665ef5b657a7f946f7951df1c57383b833d09ccfdc5cc8c696227e45aee31c75585448d3d8c292eb569af1a9bfe0928b38e95c166e82a6cf13076a8973e4de2983d415935d2a88941d35fb6123dae30d806e102c1b793d1fcb64b4e6b220a5c6ca97ded3578eeaa991b88b532", 0xdc}, {&(0x7f0000001040)="49cea099ac86a6603da7770cc93d8cd243dc70b65f0244fcd8adbf0537c6f5323b485ca81ab09a6cd19fec47f5e75d", 0x2f}, {&(0x7f0000001080)="2bb86313707130b4651fafaea073ee1db63e1fbba64e56bcf730d425acce9ca177bf6a31dab2236d71d3d6d5173e289c74c0bfca5b307e38964dd43e775bcc8418c58cb933e774707629dc9805b5cd9f1c6e9ee28f78ae76b2755509bb6d7fb522612efe3adea628464cabb04d41aeae202589b21fe3a89a2fe3ce0f76490f91a743a530431a2a99c5ee95210f923c9350dc0ce1a76afbaa5830a8211081510d3e04c9dc70aeea899b40805144b9a711c33a89", 0xb3}, {&(0x7f0000001140)="43037513bf7dfabb6e2ca1da3f598c9fa34cb60a57f050a6d94e24a89564b6cc102fd7d2f83e98d57ee379023abcacb1614b6128a1a469aae5edc0d48c54a14f28019222086c2b73b3fba6788e064bd88823a1e96484a78f9aa393b2d9568133d209c9050aa3e73f3da0a2d0430f74e3fb2e3137d7cef49fde0461faac637a99bb5d82c577e27156f768510fd4872476bf91ff5d4271fe538a76434516ecf78d121e7b75babe0e0bea73bf4bd2378adb91127f6e7f44b3192460a5036b22fc976d0fbecf11302d3872143a9e32ca47d92c875d784f16f3daf0156f9d5792fd25a6cbe192e4", 0xe5}, {&(0x7f0000001240)="05af94999321bea8780366c986f1c85312e0d1a1ee3b0a8c10a144be5cb8f8ca1f966c28b4095f895f94e2916af7b87df877f99e9f0ce6f602cb3110f888b7a52c1ddc6235bf936c35c04972d101674b6414a5e0ea64299de1d7f3f967ef8601e82746f6a734dee22388b8a55fb69c047a95fd672f22d8478fd3720c0b6fe013391791c92ac7001a4f5abefbb6dad3300dde3a4f56ea70b28a733afa7564a1377b4ebbc1fcf06052467a62ba8b6c15ad9f5310", 0xb3}], 0x6, &(0x7f0000001480)=[@rights={{0x28, 0x1, 0x1, [r53, r54, r1, r56, r59, r60]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x2c, 0x1, 0x1, [r2, r0, r63, r1, r2, r64, r67]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r68, r69, r72, r0, r74]}}, @cred={{0x1c, 0x1, 0x2, {r75, r78, r82}}}, @rights={{0x10}}], 0xc8, 0x10}, {&(0x7f0000001580)=@abs={0x3, 0x0, 0x4e20}, 0x6e, &(0x7f0000001900)=[{&(0x7f0000001600)="f0135eb2f2641682429ae658167cb740e2ffec3a14258d1f914eeb281e73904c2a71b55720013b9ef42bedb6cddb89568a8c0fc3499190904fb54e2f3325febe042ee9a1eb54373773e1e1d251723d91ebf4d6434d76e14e7adbb1c7ffd9759685e2e3933f71c57554452129f209f3f5d788fe676abbc0683c9016090199886e2901032c70c41b34570f0f19774c4ac99792d483336b7add3e96495d9fe456d10580e2a3e6ab6951e239763440ec5b9c76ca0ed19bd02c91324f562c332bf6b99e75772cfc79", 0xc6}, {&(0x7f0000001700)="dc0378caad7e972f480ec08a6ab5399140b3da3a76e7ddfd65cc3c88db9b31ae7dbc1faacaaf84dc64cac79851d6c83279a678267f91d1112a6b5e514a60f9838ebd2ef547e756ef268963d041e37b51247a8666c41f3c937e6be536a45e04f46c1681884afe1ee2d7b7a60f7148846086433d9431f4f726de62112e825feccc7de34963c7a85e7f0e45de722f3c678c6a4336a6b23cdd5e7652c42988f24083b701f65835dcd9f6972198e04883a544570ec753f73f3744daee8b91181999c45f32bbeba4bf310a8efc9180cacaf0caba82369c6b948143315766082788444ce823ce8a3e52", 0xe6}, {&(0x7f0000001800)="8fc5cf9d07cfac90e43a75950f921b73c0f89b4eedc31ecb9f888ea96a21c589949e363c0b4597edaa1a980804d919c96ea03d898b092632029313af655b49799962f989cb8702851378d13f0971689b65d4243cec6f8425c73505d3d32e2fef76b15eadabef47dbdf3cfbc268233ae0455a9b25004bf31431d357d1164f0d8f90eae085a9a567b497c52cf41b5d716a601e8c60f8d69c1f284d68398a5d2d5b478468d1a2d18bd0be4c86be8e9972dec1374388b17f0172c35ab35df31fdd4bb166eab6a8848e6edf1f6ae882074bacef419a1be678d0310edba2dc4dcac3539d37", 0xe2}], 0x3, &(0x7f0000001c00)=[@rights={{0x2c, 0x1, 0x1, [r83, r1, r1, r0, r84, r85, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, r87]}}, @rights={{0x1c, 0x1, 0x1, [r90, r92, r93]}}, @cred={{0x1c, 0x1, 0x2, {r95, r97, r99}}}, @rights={{0x1c, 0x1, 0x1, [r100, r102, r0]}}, @cred={{0x1c, 0x1, 0x2, {r104, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x10}}, @rights={{0x38, 0x1, 0x1, [r2, r105, r106, r108, r0, r110, r112, r2, r113, r1]}}], 0x110, 0x400c04c}, {&(0x7f0000001d40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003140)=[{&(0x7f0000001dc0)="6ba2fe3ee4ef5fae5017fe630439d3e93215d44fb4d8ea1718577809fb8e039ca81e3c0ff71437d5f9871005a4bc46cf6d9085def2d5fbc839ee8b888ab08f3bac27bc4797a5ab7e85b191f105b775c74cb60afd88ab9c33e9ff0f96f769c3d7d960303ba7016870bf4aa5395c812ee578be13400a607139ff16e5de24931a0e732105a937925bb7135d4116311b36623f93c27eff69130e57855fe61f44bb46a2621351182977e95464f1b60af8ddf72764968e2f34937584d9ced0", 0xbc}, {&(0x7f0000001e80)="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", 0x1000}, {&(0x7f0000002e80)="9eb06bd7e7a3d37e0c9cec4cb62c004aa3fc0ffdfa64bb4f4d740f59ab3275b9b8cd134663026fefd6b57613e5426d0a40acb253277d90b76912840d7ba3938f47dc320ba8b063dad80cb085cc0cfe0feb03ce55e2fd78df569c89bfae5f98c377d27e15a3ff076693b7258bbfa869edb3ff24d054e5a9510d4d6a6f7a7b16215a0876fa073079b3af2d24b71f19fe76c6f010652a3be5098a7ee9c93cbe92", 0x9f}, {&(0x7f0000002f40)="be1a9c8b29c6dc6121f46fc368a95da597aa8fc7e25ca1691f50cd95bf29c5930a482642c93abfb7f3c85885f46254d7912f3f1a239d61233453ceb8949ab23405783198a825034ba03739eeae95851e1c56b154ccbb6184e53b8dcaa6fac17fcb808532347aebe30ee3fbf5459f66e72670ce6d9cdd3b41a51d2d8d7aa25a119c591f64429f287f2e89931309e10928caf0db9d6ec07280139cf949998b1ce2cb63bdb96d89393c3a7fe0448e4803705f47a6195f2fb5e666cfa2172c9494531acfc6c2293a099d547dfbde467ffb45b97922522c", 0xd5}, {&(0x7f0000003040)="8440046444359ebed99926030d1e81dc3b2a45f979ba7369e1e00fa9d24eddcec9a722c533c3938b88a9a1cc165b949eca9aabace465584548c14865c09ee6dd91", 0x41}, {&(0x7f00000030c0)="33ff9b3af85ad2417ee6fd2340466759d7bdaaf1a7b021473da646a50f60f86ab32e20b3163854c2881cee31ab5a4fb29cd1948fcf9279695ac8d5476209170a618dcdab7328d739bdc4c136a6914eff39e12baad989", 0x56}], 0x6, &(0x7f0000003440)=[@cred={{0x1c, 0x1, 0x2, {r116, r117, r118}}}, @cred={{0x1c, 0x1, 0x2, {r119, r122, r123}}}, @cred={{0x1c, 0x1, 0x2, {r124, r125, r126}}}, @rights={{0x1c, 0x1, 0x1, [r127, r1, r130]}}, @rights={{0x1c, 0x1, 0x1, [r131, r133, r0]}}], 0xa0, 0x8040}, {&(0x7f0000003500)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000003b80)=[{&(0x7f0000003580)="f28bb539cef3c66b8f43cae9c2de2efdb5a5d3445746d154f67098bf5234cbaa87cda9e3203506dcece813ae256bc8a6edd20585c31fc0c916b3d91c48bf", 0x3e}, {&(0x7f00000035c0)="6a0603e7f515aea9937e77c1044d8ded015e85d167b74c13363b5ffa45cc15e7d1e05cba8b932a47e238b88e257d12d0fa9ee3b219585dea275a4c65c06c506a72a6218ee5a7afa9a57f8042ba824d354d96e3e1a4537a8f58cd58edf8da957b8e77eccf1359a870aafeb252dd7a2d9fb36395988a7b5d1affe71512", 0x7c}, {&(0x7f0000003640)="44564e8abfff54a4734e9236d6f68d5969b771d289ff95e9980e39ebe78e6a408ca7a400b43e9178665ff5569576614eaeb5b5c5291c5bc43c7a085ace632f1a13829c312831afb32d9b7e0f40bf9b8aa89ea9389fa633d00657f68eb171a275e03176aa61a702ed9ebb492b525e3eded4ca9aaa9b9de6e7b8b2452f7d7550c351e8bfa32993eaa0514fbabd81fc4b3092f4f5ca13a455ca02036170bde53df84fc7aa64ac593feaf10962fcf52af957b079914fc12e3152ad95117c3d2245dc59a7c65eb33d24bf9e3dc0b3594de7b4d2", 0xd1}, {&(0x7f0000003740)="98c6a9865ca8b6d26f1927ba23cf47c2d95d571f1b5133f0fc7209964a19927b812aaf8e1c40b97aa52d8eea23c38ec301f59f90ba8be1d30a2b1c574133e9740d9ab738caa08f89c7016327452f847451fd91bbb8a22d2be376ac56b12725fd8b84fff8cc6190abbfa9d78161537f77f642397d96786c771aeffce04b827ffa0e5c4fdc74d1c1ca50cfef788f", 0x8d}, {&(0x7f0000003800)="98297b88260643461ba1f617766864ff5f0144a2f18710d1cf34a5ac662d3ae50866907bc71dcc01c8305c73b7eacee72bdf675a44fb8777910d3b3ebc482dc4bdd90fe40ecced234febe2f29e220b02ab7dae355a8ac8b530c1d58124595db284c70b1e3ac14437e806c832ae5f2c897d73073a73775a08724806641fd89d6782ae745319db1f77d6bca614bb8154182990a96b5557b02e36c887f1682b764c061555f77155f8489f223f5fe4c2a741dd5a5289b814d84793767c87cae8557859b449", 0xc3}, {&(0x7f0000003900)="21d1444a4f9874db136518a477201485fa1b24bd0b28e42813f510e52c6fa3cb13e3883ad77735c5e91802729f547c7d8e7e4ad6c14136990c3ef96201c32a070798c0de28592f01bfb7", 0x4a}, {&(0x7f0000003980)="139760f22ad485e183be1b68193ef179aa02", 0x12}, {&(0x7f00000039c0)="47318253621cf36402632acdf6cf779a64f74a6ff6541cf619db9395f6c20ac8372c98e3dc6581cd6bf1aa163c045a9e95f160c32314cc6caaad6b4cf1a4b61b136fa0a94cbf04f94f6bafc3d080f1c1ad39c91a1b6d02561c6814588a2e35db04be79995814a2b10bd77976567b4bdd5d14b4f6db66e60071697a9b74b853a6582f1f386bf97a377a3867038c82d2366ae4fe9906ab205a7e0119f1c778c831947b2b4e20", 0xa5}, {&(0x7f0000003a80)="3e033ba609941d90ea6b047267bb9decc270c492724876f68d2e54554177a3951fc07349b05d46b8101725fa3ac488ea0ea10259e05e5098aa672d02741f0e1ad8b19bcc64ba90cf9923066e88b37510b454e9cab6c58cd5a181db93aae418f39d3ee9460c93929e4f1fb2e3a7e193eaa63ce0c0466246928a60d796f2754e2b5368b70766b78c5b9727a427d00a291af7e67ad11c7f4b75408b08d72b88132c6dee505cd401758550b91c07d787a50c5fe0e776e09d81b9f209ad8105e9552e3584c2585312a6c6e940fc35e286d8608b1bbc8842439e9bc840065219e769917e209ed5253d6d84682eb14491c9", 0xee}], 0x9, &(0x7f0000003e00)=[@cred={{0x1c, 0x1, 0x2, {r137, r138, r139}}}, @rights={{0x1c, 0x1, 0x1, [r0, r141, r143]}}, @rights={{0x18, 0x1, 0x1, [r144, r146]}}, @rights={{0x14, 0x1, 0x1, [r147]}}], 0x70, 0x1}, {&(0x7f0000003e80)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000003f00), 0x0, 0x0, 0x0, 0x4008000}], 0x7, 0x7000) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000001980)=ANY=[@ANYBLOB]) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="00000000000100000000060000004a140050000000001f009078ffffffffac1414aa071300ac141400e0000001ac141400ffffffff0000000000ecb84c60b254461f4ee68226fd62a462082646494f98603a10ce8fcdbd685f23", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="a010ffde90780000030303080a0000000000000000fe04f989000000"], 0x5e) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$bfs(0x0, &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x2044000, 0x0) [ 478.769096][T19365] FAULT_INJECTION: forcing a failure. [ 478.769096][T19365] name failslab, interval 1, probability 0, space 0, times 0 [ 478.853842][T19365] CPU: 0 PID: 19365 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 478.861793][T19365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.871855][T19365] Call Trace: [ 478.875190][T19365] dump_stack+0x1fb/0x318 [ 478.879539][T19365] should_fail+0x555/0x770 [ 478.883974][T19365] __should_failslab+0x11a/0x160 [ 478.888941][T19365] ? tomoyo_encode2+0x273/0x5a0 [ 478.894164][T19365] should_failslab+0x9/0x20 [ 478.898681][T19365] __kmalloc+0x7a/0x340 [ 478.902860][T19365] tomoyo_encode2+0x273/0x5a0 [ 478.907553][T19365] tomoyo_realpath_from_path+0x769/0x7c0 [ 478.913195][T19365] tomoyo_path_number_perm+0x166/0x640 [ 478.918865][T19365] ? rcu_read_lock_sched_held+0x10b/0x170 [ 478.924689][T19365] ? trace_kmem_cache_free+0xb2/0x110 [ 478.930074][T19365] tomoyo_path_mkdir+0x9c/0xc0 [ 478.934857][T19365] security_path_mkdir+0xed/0x170 [ 478.939924][T19365] do_mkdirat+0x15c/0x320 [ 478.944284][T19365] __x64_sys_mkdir+0x60/0x70 [ 478.948891][T19365] do_syscall_64+0xf7/0x1c0 [ 478.953413][T19365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.959311][T19365] RIP: 0033:0x459637 [ 478.963217][T19365] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 478.982918][T19365] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 478.991335][T19365] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 478.999404][T19365] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 479.007386][T19365] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 479.015365][T19365] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 479.023344][T19365] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 479.103691][T19365] ERROR: Out of memory at tomoyo_realpath_from_path. 03:38:00 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:01 executing program 4 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:01 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) getpgrp(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="15000015ebd7000600000000160000003957323030302e4c95baddceea4a5ad4c44b38cd0f5524f4c7a5125a380acf262261d13d5a346e0840c3c5ee520964f82ee6251afb42bce0dbfa4d728d7e42f91b2e20fe797b65c43a6c08d5a750aeda0f8e2837b6f73a36b81ba54596ac572fec54dfa483fc1151c0f9c9e4ca1f"], 0x7e) r2 = dup(0xffffffffffffffff) write$FUSE_BMAP(r2, 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="f5ec3cff7891a294c63ce974478a1fccf4117e7675701ec19f4505ab17c721c5e8a88ca42bfd5e3311b4b277c1c9afa6beb8796fdca5c02b9edb90079bfe79d3145950fb0fb1c2aaa02714d552e1e5a227163163c83f194c76ea"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x38f4168b7592eaea, 0xed13f8ac3df0acdb, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x5d8, 0x0, 0x150) 03:38:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 479.624862][T19385] FAULT_INJECTION: forcing a failure. [ 479.624862][T19385] name failslab, interval 1, probability 0, space 0, times 0 [ 479.684403][T19385] CPU: 1 PID: 19385 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 479.692339][T19385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.702516][T19385] Call Trace: [ 479.705824][T19385] dump_stack+0x1fb/0x318 [ 479.710171][T19385] should_fail+0x555/0x770 [ 479.714607][T19385] __should_failslab+0x11a/0x160 [ 479.719545][T19385] ? smack_inode_init_security+0x3cf/0x490 [ 479.725357][T19385] should_failslab+0x9/0x20 [ 479.729871][T19385] __kmalloc_track_caller+0x79/0x340 [ 479.735170][T19385] kstrdup+0x34/0x70 [ 479.739067][T19385] smack_inode_init_security+0x3cf/0x490 [ 479.745319][T19385] security_inode_init_security+0xfe/0x310 [ 479.751127][T19385] ? ext4_init_security+0x40/0x40 [ 479.756173][T19385] ext4_init_security+0x34/0x40 [ 479.761026][T19385] __ext4_new_inode+0x446c/0x5650 [ 479.766075][T19385] ? smk_curacc+0xa3/0xe0 [ 479.770418][T19385] ext4_mkdir+0x3f5/0x1450 [ 479.774843][T19385] ? security_inode_permission+0xdd/0x120 [ 479.780573][T19385] vfs_mkdir+0x43f/0x610 [ 479.784826][T19385] do_mkdirat+0x1d7/0x320 [ 479.789171][T19385] __x64_sys_mkdir+0x60/0x70 [ 479.793771][T19385] do_syscall_64+0xf7/0x1c0 [ 479.798307][T19385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.804209][T19385] RIP: 0033:0x459637 [ 479.808109][T19385] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:38:01 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 479.827719][T19385] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 479.836142][T19385] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 479.844123][T19385] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 479.852102][T19385] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 479.860113][T19385] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 479.868090][T19385] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c", 0x95}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) getpgrp(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="15000015ebd7000600000000160000003957323030302e4c95baddceea4a5ad4c44b38cd0f5524f4c7a5125a380acf262261d13d5a346e0840c3c5ee520964f82ee6251afb42bce0dbfa4d728d7e42f91b2e20fe797b65c43a6c08d5a750aeda0f8e2837b6f73a36b81ba54596ac572fec54dfa483fc1151c0f9c9e4ca1f"], 0x7e) r2 = dup(0xffffffffffffffff) write$FUSE_BMAP(r2, 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="f5ec3cff7891a294c63ce974478a1fccf4117e7675701ec19f4505ab17c721c5e8a88ca42bfd5e3311b4b277c1c9afa6beb8796fdca5c02b9edb90079bfe79d3145950fb0fb1c2aaa02714d552e1e5a227163163c83f194c76ea"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x38f4168b7592eaea, 0xed13f8ac3df0acdb, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x5d8, 0x0, 0x150) 03:38:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:03 executing program 4 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:03 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 482.008916][T19406] FAULT_INJECTION: forcing a failure. [ 482.008916][T19406] name failslab, interval 1, probability 0, space 0, times 0 [ 482.022089][T19406] CPU: 0 PID: 19406 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 482.029994][T19406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.040062][T19406] Call Trace: [ 482.043370][T19406] dump_stack+0x1fb/0x318 [ 482.047726][T19406] should_fail+0x555/0x770 [ 482.052185][T19406] __should_failslab+0x11a/0x160 [ 482.057142][T19406] ? __es_insert_extent+0x7ba/0x17c0 [ 482.062443][T19406] should_failslab+0x9/0x20 [ 482.066964][T19406] kmem_cache_alloc+0x56/0x2e0 [ 482.071750][T19406] __es_insert_extent+0x7ba/0x17c0 [ 482.076882][T19406] ? __kasan_check_write+0x14/0x20 [ 482.082009][T19406] ? do_raw_write_lock+0xf3/0x460 [ 482.087071][T19406] ext4_es_insert_extent+0x250/0x2ea0 [ 482.092470][T19406] ext4_ext_map_blocks+0x1806/0x7170 [ 482.097789][T19406] ? __down_read+0x14b/0x360 [ 482.102397][T19406] ext4_map_blocks+0x424/0x1e30 [ 482.107289][T19406] ? __kasan_check_write+0x14/0x20 [ 482.112421][T19406] ext4_getblk+0xae/0x460 [ 482.116771][T19406] ext4_bread+0x4a/0x340 [ 482.121032][T19406] ext4_append+0x175/0x310 [ 482.125474][T19406] ext4_mkdir+0x7ad/0x1450 [ 482.129913][T19406] vfs_mkdir+0x43f/0x610 [ 482.134172][T19406] do_mkdirat+0x1d7/0x320 [ 482.138522][T19406] __x64_sys_mkdir+0x60/0x70 [ 482.143114][T19406] do_syscall_64+0xf7/0x1c0 [ 482.147645][T19406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.153570][T19406] RIP: 0033:0x459637 03:38:03 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @rand_addr="6bd7a65246739784e539fea0825cb48a", 0x80}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)="5dbf9fb44f", 0x5}, {&(0x7f0000000540)="a48e478ae895f3df7d4daa7f9e45ed395af126e6ea19f40baa0c289e65ba475c25318d2df5f59d3fd831f7795b69a2a13c50ddb771f0f67efda9cbfc33da925a58faa51ba197bab5a0e20bb9bd17cce0f42e927138baaa2cf2af7c57909e8a660d54b1d0daeae001c83319615c720ad9f16b2c9b22322e7b06a82352a8177049291fad98fc65537463f0cd33c2ceb53bcd4bcaf8c662df7b00e2ed1e713d9ac808cf0f5190170c1a4e1b49c520f1d8e3dbff779de39ac9d3a34b3828745d10f9e07df78e5249f7ccdea018586fb787e56dd5dcd413da227279b46b52dbcfa74a34794677eea0fffa928d8642a3", 0xed}, {&(0x7f0000000140)="ff5882d532a817b42c02d6a9ae9db3", 0xf}, {&(0x7f0000000440)="5c785da84714e3fd5a33e7e5fb2682d061498e5c34", 0x15}, {&(0x7f0000000640)="feb6ad3aa79fadcfece5b705be99afeb2ae0a77f6c6d09fa61cb12a6473904fd6425f799bd51edf7e70fab31d9e32e92ffa7f788adc77dc114f311c7c5c8c0be56c221e653f4f062877772380ab14d01a4d529fa5a3b405c7635c503e7e552690767c8ca29a602af21190498681d996b7949076bac06f0864a2e833584525f0ce991ccdb813c395937b6e85c6697b0e3fc2a47065d458e2954f6830585a5392e9343aaabb73bb95a52c9b7855fa77cc93cb3b06eb72699765c3c7c9459384a323ce0dde558758b6dd4fbe8f9c841a81d17de4a1cc9ece61acef1bff3e43f6c5d169a8474a05f", 0xe6}, {&(0x7f00000007c0)="3d8bc9e2f4eb1d55bfc0a241a5d1ec2bb50a1358780e28d718a1b55ea0bbdca1e885b9b8c54e09d69b7e34d698d6712b7716204914d66dab6e4b7f26beb47c92e6b04ca4e8bb61b2ee72bf0b6ce3a64a0781a33736a2ce474e70bf755156c44cfd8904a642166b3df4080e1fade5164972916644b4be759f098f7057806dcd896c2a6343bf164ae263d06a6c66f6df66", 0x90}], 0x6}, 0x40800) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 482.157470][T19406] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 482.177077][T19406] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 482.177087][T19406] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 482.177094][T19406] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 482.177099][T19406] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 482.177105][T19406] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 482.177111][T19406] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:03 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r3, r4, 0x0) ioctl$sock_TIOCINQ(r4, 0x541b, &(0x7f0000000080)) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x58, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x30, 0x16, [{0x2c, 0x1, [@IFLA_VF_MAC={0x28, 0xd, {0x0, @link_local}}]}]}, @IFLA_GROUP={0xff53}]}, 0x58}}, 0x0) 03:38:04 executing program 4 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x2f, 0x8800) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000240)=@ng={0x4, 0x1, "d7d6"}, 0x4, 0x2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000023c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000c76f4503775e3a23a7073a903fcb683e13e4cb99411d32a969f57fb87e54d66704d2654729"], 0x48}}, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r5, r6, 0x0) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0xfe4e, &(0x7f0000000100)={&(0x7f0000000380)=@ipv6_delrule={0x0, 0x21, 0x900, 0x70bd25, 0x25dfdbff, {0xa, 0x10, 0x14, 0x7, 0x5, 0x0, 0x0, 0x2}, [@FRA_DST={0x0, 0x1, @mcast1}]}, 0x98}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="f2ffffff10003b0e25bd5000ffdbdf2500000000508ee4d614b70e29ea32591c349d905072c863470ca19755f0ab5b93c40f00abcd5e2333c7c2183157b2ae0582ffea8372ac65c86f3b92a42012b1778cfb99977c679d0e3955e28ae9098b3efdd59729fb1b14441a6ecec4a1a14b1604bea750d70db944dd9d15b5399e4298d6692ade988c77248619a71e10208ab17006cf19ef5c382eb49a42f5cc5a26520101000000000000193553b56676568d3f2fd92764e7b0393bb0d8a2ecadd7da5544d17d96f0d44fdb2ff534fa644917c6bf", @ANYRES32=r4, @ANYBLOB="00000000000000001fff1c00", @ANYRES32=r1], 0x34}}, 0x40000) [ 482.894503][T19426] FAULT_INJECTION: forcing a failure. [ 482.894503][T19426] name failslab, interval 1, probability 0, space 0, times 0 [ 482.927752][T19426] CPU: 0 PID: 19426 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 482.935688][T19426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.945752][T19426] Call Trace: [ 482.949058][T19426] dump_stack+0x1fb/0x318 [ 482.953434][T19426] should_fail+0x555/0x770 [ 482.958264][T19426] __should_failslab+0x11a/0x160 [ 482.958294][T19426] ? smack_inode_init_security+0x3cf/0x490 [ 482.958307][T19426] should_failslab+0x9/0x20 [ 482.958317][T19426] __kmalloc_track_caller+0x79/0x340 [ 482.958333][T19426] kstrdup+0x34/0x70 [ 482.978858][T19426] smack_inode_init_security+0x3cf/0x490 [ 482.988461][T19426] security_inode_init_security+0xfe/0x310 [ 482.988474][T19426] ? ext4_init_security+0x40/0x40 [ 482.988497][T19426] ext4_init_security+0x34/0x40 [ 483.004144][T19426] __ext4_new_inode+0x446c/0x5650 [ 483.009176][T19426] ? smk_curacc+0xa3/0xe0 [ 483.009189][T19426] ext4_mkdir+0x3f5/0x1450 [ 483.009207][T19426] ? security_inode_permission+0xdd/0x120 [ 483.023667][T19426] vfs_mkdir+0x43f/0x610 [ 483.027940][T19426] do_mkdirat+0x1d7/0x320 [ 483.032286][T19426] __x64_sys_mkdir+0x60/0x70 [ 483.036890][T19426] do_syscall_64+0xf7/0x1c0 [ 483.041403][T19426] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.041413][T19426] RIP: 0033:0x459637 [ 483.041424][T19426] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 483.041429][T19426] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 483.079188][T19426] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 483.079195][T19426] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 483.079201][T19426] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 483.079207][T19426] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 483.079213][T19426] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c", 0x95}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:06 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:06 executing program 4 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:06 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 484.929307][T19439] FAULT_INJECTION: forcing a failure. [ 484.929307][T19439] name failslab, interval 1, probability 0, space 0, times 0 [ 485.028596][T19439] CPU: 1 PID: 19439 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 485.036531][T19439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.046582][T19439] Call Trace: [ 485.049882][T19439] dump_stack+0x1fb/0x318 [ 485.054223][T19439] should_fail+0x555/0x770 [ 485.058653][T19439] __should_failslab+0x11a/0x160 [ 485.063895][T19439] ? smack_inode_init_security+0x3cf/0x490 [ 485.069707][T19439] should_failslab+0x9/0x20 [ 485.074207][T19439] __kmalloc_track_caller+0x79/0x340 [ 485.079485][T19439] kstrdup+0x34/0x70 [ 485.083373][T19439] smack_inode_init_security+0x3cf/0x490 [ 485.088993][T19439] security_inode_init_security+0xfe/0x310 [ 485.094776][T19439] ? ext4_init_security+0x40/0x40 [ 485.099784][T19439] ext4_init_security+0x34/0x40 [ 485.104616][T19439] __ext4_new_inode+0x446c/0x5650 [ 485.109629][T19439] ? smk_curacc+0xa3/0xe0 [ 485.113938][T19439] ext4_mkdir+0x3f5/0x1450 [ 485.118339][T19439] ? security_inode_permission+0xdd/0x120 [ 485.124039][T19439] vfs_mkdir+0x43f/0x610 [ 485.128273][T19439] do_mkdirat+0x1d7/0x320 [ 485.132583][T19439] __x64_sys_mkdir+0x60/0x70 [ 485.137150][T19439] do_syscall_64+0xf7/0x1c0 [ 485.141630][T19439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.147500][T19439] RIP: 0033:0x459637 [ 485.151373][T19439] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 485.170955][T19439] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 03:38:06 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000002c0)={0x0, 0x80000}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000300)={0x0, 0x100000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000340)={r2, 0x0, r3}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1) write$P9_RMKDIR(r4, &(0x7f00000000c0)={0x14, 0x49, 0x2, {0x2, 0x3, 0x7}}, 0x14) getresuid(&(0x7f0000000000), 0x0, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) r7 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x9, 0x0) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r7, 0xc00c642d, &(0x7f0000000240)={0x0, 0x80000, r8}) dup3(r5, r6, 0x0) sendmsg(r6, 0x0, 0x0) r9 = add_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a2ff81d6bfa135aa61e8825b", 0xc, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r9) r10 = add_key(&(0x7f0000000380)='trusted\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000400)="9e7fbe8fd0e20f04ac6a125d3821edae87729390a4a1f2f13e59586c920467cdcdb38fac6039a329b9ec700e7a946414cfcf809f713a1d9cc7e0ecfb8bcbfd7ca5ff62c0c5ca26a6ee5bcc0c6235dceed79ee3b6065c30e5629876a7769e1c4fa7db2e389d507774a2a43407e71e0165d1387c6fe9fa4f263d368e7fb723f21cf55a0b9549ff63e4335a8d253685a573066006e539a914a56b28026d796c48e9a6e26419e54987e0596033e9f96b", 0xae, 0xfffffffffffffff9) r11 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r12 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r11) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r11, &(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)=@keyring={'key_or_keyring:', r12}) request_key(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r11) r13 = add_key(&(0x7f00000004c0)='cifs.idmap\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r11) keyctl$dh_compute(0x17, &(0x7f00000005c0)={r9, r10, r13}, &(0x7f0000000600)=""/211, 0xd3, &(0x7f0000000800)={&(0x7f0000000700)={'md5\x00'}, &(0x7f0000000740)="0518a82bc67d742df81436e6dded1f4152cbb82713ce6b4932dbda508bfa060220c4c3e5320946826ac86209ac52ff76e89c6390b8000a52b0e37b8bf9452ca657c6179545eb7e0135d227f763a88598f9587c1f9ddf3000fcdc26cfabca7d5abe0f4fe5d2e23136adac2f3c91b265cf53632d425440dd6d53f611c1bb137bf6c731", 0x82}) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 485.179391][T19439] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 485.187348][T19439] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 485.195313][T19439] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 485.203286][T19439] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 485.211265][T19439] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:06 executing program 4 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:06 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 485.466420][T19454] FAULT_INJECTION: forcing a failure. [ 485.466420][T19454] name failslab, interval 1, probability 0, space 0, times 0 [ 485.493843][T19454] CPU: 0 PID: 19454 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 485.501785][T19454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.511852][T19454] Call Trace: [ 485.515147][T19454] dump_stack+0x1fb/0x318 [ 485.519489][T19454] should_fail+0x555/0x770 [ 485.523917][T19454] __should_failslab+0x11a/0x160 [ 485.528863][T19454] ? kcalloc+0x2f/0x50 [ 485.532937][T19454] should_failslab+0x9/0x20 [ 485.537453][T19454] __kmalloc+0x7a/0x340 [ 485.541631][T19454] kcalloc+0x2f/0x50 [ 485.545530][T19454] ext4_find_extent+0x216/0xaa0 [ 485.550398][T19454] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 485.556737][T19454] ext4_ext_map_blocks+0x170/0x7170 [ 485.561972][T19454] ? __kasan_check_write+0x14/0x20 [ 485.567100][T19454] ? __down_read+0x14b/0x360 [ 485.571717][T19454] ext4_map_blocks+0x424/0x1e30 [ 485.577027][T19454] ? __kasan_check_write+0x14/0x20 [ 485.582257][T19454] ext4_getblk+0xae/0x460 [ 485.586604][T19454] ext4_bread+0x4a/0x340 [ 485.590839][T19454] ext4_append+0x175/0x310 [ 485.595251][T19454] ext4_mkdir+0x7ad/0x1450 [ 485.599693][T19454] vfs_mkdir+0x43f/0x610 [ 485.603946][T19454] do_mkdirat+0x1d7/0x320 [ 485.608280][T19454] __x64_sys_mkdir+0x60/0x70 [ 485.612868][T19454] do_syscall_64+0xf7/0x1c0 03:38:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:07 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 485.617404][T19454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.623290][T19454] RIP: 0033:0x459637 [ 485.627179][T19454] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 485.627186][T19454] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 485.627196][T19454] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 485.627203][T19454] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 485.627209][T19454] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 485.627215][T19454] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 485.627221][T19454] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:07 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r1 = open(0x0, 0x40800, 0x4) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000040)={0x1, 0x1, 0x80, 0x85}) write$binfmt_elf32(r0, 0x0, 0x0) 03:38:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c", 0x95}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:09 executing program 4 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:09 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:09 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x10000, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000080)={0x8001, 0x70}) r1 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.SMACK64EXEC\x00', 0x0, 0x13b, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r1, 0x0, 0x0) 03:38:09 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 488.032457][T19477] FAULT_INJECTION: forcing a failure. [ 488.032457][T19477] name failslab, interval 1, probability 0, space 0, times 0 [ 488.058441][T19477] CPU: 0 PID: 19477 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 488.066371][T19477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.076602][T19477] Call Trace: [ 488.079894][T19477] dump_stack+0x1fb/0x318 [ 488.084230][T19477] should_fail+0x555/0x770 [ 488.088680][T19477] __should_failslab+0x11a/0x160 [ 488.093627][T19477] ? ext4_mb_new_blocks+0x2ac/0x2cc0 [ 488.098919][T19477] should_failslab+0x9/0x20 [ 488.103416][T19477] kmem_cache_alloc+0x56/0x2e0 [ 488.108187][T19477] ext4_mb_new_blocks+0x2ac/0x2cc0 [ 488.113294][T19477] ? trace_kmalloc+0xcd/0x130 [ 488.117994][T19477] ? kcalloc+0x2f/0x50 [ 488.122055][T19477] ? __kmalloc+0x26c/0x340 [ 488.126469][T19477] ? kcalloc+0x2f/0x50 [ 488.130555][T19477] ? ext4_ext_search_right+0x4cb/0x940 [ 488.136056][T19477] ? ext4_find_extent+0x8e0/0xaa0 [ 488.141175][T19477] ? ext4_inode_to_goal_block+0x27b/0x3b0 [ 488.146902][T19477] ext4_ext_map_blocks+0x4b8c/0x7170 [ 488.152225][T19477] ext4_map_blocks+0x8f4/0x1e30 [ 488.157097][T19477] ? __kasan_check_write+0x14/0x20 [ 488.162226][T19477] ext4_getblk+0xae/0x460 [ 488.166568][T19477] ext4_bread+0x4a/0x340 [ 488.170817][T19477] ext4_append+0x175/0x310 [ 488.175246][T19477] ext4_mkdir+0x7ad/0x1450 [ 488.179694][T19477] vfs_mkdir+0x43f/0x610 [ 488.183940][T19477] do_mkdirat+0x1d7/0x320 [ 488.188274][T19477] __x64_sys_mkdir+0x60/0x70 [ 488.192860][T19477] do_syscall_64+0xf7/0x1c0 [ 488.197366][T19477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.203249][T19477] RIP: 0033:0x459637 [ 488.207145][T19477] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:38:09 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r1, 0x0, 0x0) socket$packet(0x11, 0x1, 0x300) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r2, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f00000000c0)={0x1, 0x9, 0x80}) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 488.226751][T19477] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 488.235158][T19477] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 488.243124][T19477] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 488.251090][T19477] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 488.259053][T19477] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 488.267021][T19477] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:09 executing program 4 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:09 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00'}) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:09 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 488.449054][T19495] FAULT_INJECTION: forcing a failure. [ 488.449054][T19495] name failslab, interval 1, probability 0, space 0, times 0 [ 488.461809][T19495] CPU: 1 PID: 19495 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 488.469705][T19495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.479773][T19495] Call Trace: [ 488.483063][T19495] dump_stack+0x1fb/0x318 [ 488.487422][T19495] should_fail+0x555/0x770 [ 488.491854][T19495] __should_failslab+0x11a/0x160 03:38:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 488.496808][T19495] ? __es_insert_extent+0x7ba/0x17c0 [ 488.502104][T19495] should_failslab+0x9/0x20 [ 488.506634][T19495] kmem_cache_alloc+0x56/0x2e0 [ 488.511409][T19495] __es_insert_extent+0x7ba/0x17c0 [ 488.516540][T19495] ext4_es_insert_extent+0x250/0x2ea0 [ 488.521937][T19495] ext4_map_blocks+0xe1c/0x1e30 [ 488.526804][T19495] ? __kasan_check_write+0x14/0x20 [ 488.531930][T19495] ext4_getblk+0xae/0x460 [ 488.536278][T19495] ext4_bread+0x4a/0x340 [ 488.540527][T19495] ext4_append+0x175/0x310 [ 488.544953][T19495] ext4_mkdir+0x7ad/0x1450 [ 488.549390][T19495] vfs_mkdir+0x43f/0x610 [ 488.553643][T19495] do_mkdirat+0x1d7/0x320 [ 488.557984][T19495] __x64_sys_mkdir+0x60/0x70 [ 488.562583][T19495] do_syscall_64+0xf7/0x1c0 [ 488.567091][T19495] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.572987][T19495] RIP: 0033:0x459637 [ 488.576887][T19495] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 488.596501][T19495] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 488.596512][T19495] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 488.596517][T19495] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 488.596522][T19495] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 488.596527][T19495] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 488.596533][T19495] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24", 0x97}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:12 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x0, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='\x00\x00\"\x00\x82@\xc5\xad\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='ij\xf2\xa4\xd7Vmice\x00\x00\x03\x00', 0x0, 0x0) dup3(r1, r2, 0x0) socket$caif_stream(0x25, 0x1, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:38:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:12 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:12 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00'}) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:12 executing program 4 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 491.077036][T19509] FAULT_INJECTION: forcing a failure. [ 491.077036][T19509] name failslab, interval 1, probability 0, space 0, times 0 [ 491.089812][T19509] CPU: 0 PID: 19509 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 491.098053][T19509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.108118][T19509] Call Trace: [ 491.111430][T19509] dump_stack+0x1fb/0x318 [ 491.115775][T19509] should_fail+0x555/0x770 [ 491.120234][T19509] __should_failslab+0x11a/0x160 [ 491.125179][T19509] ? __es_insert_extent+0x7ba/0x17c0 [ 491.130464][T19509] should_failslab+0x9/0x20 [ 491.134968][T19509] kmem_cache_alloc+0x56/0x2e0 [ 491.139733][T19509] __es_insert_extent+0x7ba/0x17c0 [ 491.144850][T19509] ? __kasan_check_write+0x14/0x20 [ 491.149961][T19509] ? do_raw_write_lock+0xf3/0x460 [ 491.154999][T19509] ext4_es_insert_extent+0x250/0x2ea0 [ 491.160407][T19509] ext4_ext_map_blocks+0x1806/0x7170 [ 491.165721][T19509] ? __down_read+0x14b/0x360 [ 491.170313][T19509] ext4_map_blocks+0x424/0x1e30 [ 491.175179][T19509] ? __kasan_check_write+0x14/0x20 [ 491.180287][T19509] ext4_getblk+0xae/0x460 [ 491.184623][T19509] ext4_bread+0x4a/0x340 [ 491.188862][T19509] ext4_append+0x175/0x310 [ 491.193281][T19509] ext4_mkdir+0x7ad/0x1450 [ 491.197724][T19509] vfs_mkdir+0x43f/0x610 [ 491.201971][T19509] do_mkdirat+0x1d7/0x320 [ 491.206304][T19509] __x64_sys_mkdir+0x60/0x70 [ 491.210892][T19509] do_syscall_64+0xf7/0x1c0 [ 491.215394][T19509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.221283][T19509] RIP: 0033:0x459637 [ 491.225172][T19509] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 491.244959][T19509] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 491.253366][T19509] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 491.261331][T19509] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 491.269298][T19509] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 491.277263][T19509] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 491.285229][T19509] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:12 executing program 4 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:13 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 491.481563][T19524] FAULT_INJECTION: forcing a failure. [ 491.481563][T19524] name failslab, interval 1, probability 0, space 0, times 0 [ 491.552909][T19524] CPU: 1 PID: 19524 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 491.560847][T19524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.570904][T19524] Call Trace: [ 491.574208][T19524] dump_stack+0x1fb/0x318 [ 491.578545][T19524] should_fail+0x555/0x770 [ 491.582967][T19524] __should_failslab+0x11a/0x160 [ 491.587920][T19524] ? kzalloc+0x1f/0x40 [ 491.591996][T19524] should_failslab+0x9/0x20 [ 491.596532][T19524] __kmalloc+0x7a/0x340 [ 491.600709][T19524] kzalloc+0x1f/0x40 [ 491.604610][T19524] smk_parse_smack+0x197/0x230 [ 491.609374][T19524] smk_import_entry+0x27/0x590 [ 491.614143][T19524] smack_d_instantiate+0x78f/0xd70 [ 491.619268][T19524] ? lockdep_init_map+0x2a/0x680 [ 491.624217][T19524] security_d_instantiate+0xa5/0x100 [ 491.629595][T19524] d_instantiate_new+0x65/0x120 [ 491.634446][T19524] ext4_mkdir+0xfa9/0x1450 [ 491.634560][T19524] vfs_mkdir+0x43f/0x610 [ 491.643281][T19524] do_mkdirat+0x1d7/0x320 [ 491.647618][T19524] __x64_sys_mkdir+0x60/0x70 [ 491.652199][T19524] do_syscall_64+0xf7/0x1c0 [ 491.652215][T19524] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.652227][T19524] RIP: 0033:0x459637 [ 491.666491][T19524] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 491.687136][T19524] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 491.695548][T19524] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 03:38:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 491.703525][T19524] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 491.711499][T19524] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 491.719477][T19524] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 491.727635][T19524] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:13 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00'}) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:13 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) r4 = dup3(r2, r3, 0x0) r5 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={r7, @in={{0x2, 0x0, @loopback}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x73, &(0x7f0000000280)={r7, 0x7, 0x0, 0x0, 0xca66}, &(0x7f00000002c0)=0x18) r8 = socket(0x2000000000000021, 0x0, 0x10000000000002) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x1a, &(0x7f0000000180)={r10, @in={{0x2, 0x0, @loopback}}}, &(0x7f0000000240)=0x84) r11 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r12 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r11, r12, 0x0) r13 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r14 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r13, r14, 0x0) r15 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r16 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r15, r16, 0x0) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000001080)={0x0}, &(0x7f00000010c0)=0xc) lstat(&(0x7f0000000080)='./control\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(0x0, 0x0, r18) r19 = getpid() sched_setscheduler(r19, 0x5, 0x0) r20 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r21, 0xee00) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)=0x0) setreuid(r21, r22) lstat(&(0x7f0000000080)='./control\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(0x0, 0x0, r23) r24 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r25 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r24, r25, 0x0) r26 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r27 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r26, r27, 0x0) r28 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r29 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r28, r29, 0x0) r30 = openat$capi20(0xffffffffffffff9c, &(0x7f0000001100)='/dev/capi20\x00', 0x51da00, 0x0) ioctl$sock_FIOGETOWN(r9, 0x8903, &(0x7f0000001140)=0x0) r32 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r32, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r33, 0xee00) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)=0x0) setreuid(r33, r34) getresgid(&(0x7f0000001180)=0x0, &(0x7f00000011c0), &(0x7f0000001200)) r36 = getpid() sched_setscheduler(r36, 0x5, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000001240)={0x0, 0x0}, &(0x7f0000001280)=0xc) lstat(&(0x7f0000000080)='./control\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(0x0, 0x0, r38) r39 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r40 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r39, r40, 0x0) r41 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r42 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r41, r42, 0x0) r43 = socket$can_raw(0x1d, 0x3, 0x1) r44 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/video37\x00', 0x2, 0x0) r45 = socket$rds(0x15, 0x5, 0x0) r46 = socket$bt_cmtp(0x1f, 0x3, 0x5) sendmsg$unix(r12, &(0x7f0000001440)={&(0x7f0000000300)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000380)="a2668e6a436094409c9724298de76ea3ec8bfcd1ea67e7ca48900c6aa193588eaf29dd59afef21209dc11ffc48c90db8369e2804b42a1a9106f0dc31cee38d9f31ff4bdfb8f0126a9f4c406951487f176828edb376fcf6d00bb98b985400b216c79485cdeb0ce1ef9d73ece41614ffb9f5a857d1b93ea1e33f5ca9abf9f2eb8f0c8b8e4993603424095ca50b", 0x8c}, {&(0x7f0000000440)="7433b404289faaf69362581be9dcae1b64906bc70e4b726428633fa8c8cf4aeefb4a01a0f75b2960c68fcac3ac822e5d90fea74fdf6c528e041a56396013e30ab484173cda9cca2d7500a5993d34fe1382ba02f57e5b2ef6cb2809c411321df5531810e14d82b19837e16d3ff596a75b6b93582d3655196593d96b9b7b42fe5a98a2167072185eb7649dc62d7830e9fffd204fb1c667cc9a3dd0f0dc4dd31841b4b95e606d3a74610f1750d324e6094fce0e3ccdf2f7147da3f31c47a8e0fd391286e54688d8f8f81572f35d52a5bab51477eec3d5b8f3a84f11e30b5201b58c", 0xe0}, {&(0x7f0000000ec0)="99c296f87432c1f5596e3ccc449e1a7e9843dab2cae9dc55ff77c1d5a2b4485400ddc5f15b9fdd8e42ed2755edbdbcb4362e742f9bfcc841be4095d75b985639dbb1f75120a6b283b233b745a954259980c21f099e052fc33bb931c066acc4517f1eae2251befd00e315beeba88b8345a75dcc447b8a6bb6236a3e82297f103abdcbbea352dcd74bbecce0377266a7b15e4566662b309a8915c930c95d8c078d11c5dcf77939dcd6c75bd79773fea2", 0xaf}, {&(0x7f00000005c0)="ad86a709091ee1866a5f06c73dfb3303383109f07d24a81a6732e141", 0x1c}, {&(0x7f0000000f80)="77b750ca3bca479c007450b41a5428a190f98a2315650591a19e298adb78144f8ae96d3994ad961cea39135da19f73c0ad3ca0bdf0e01e4dace65a433b396c0948b1b81911f4e1f2a1384a857b3d42824d6ef543d1dab887ce5a4e75d4b49333b8ced85cfaec1df79436a76c55e6a967ac2b6a00a6b553d9124148ee232ddb07c6bed840bd199e67c847b7fe9ffc7c6b3a01c1ecde61d96e35ab1c507238529b127fe3465b1ba30c05779f60dc3f886d4608c3d8dde2869f00185ae6b9ebd848083d23cb", 0xc4}], 0x5, &(0x7f0000001300)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r13]}}, @cred={{0x1c, 0x1, 0x2, {r17, 0xee00, r18}}}, @rights={{0x1c, 0x1, 0x1, [r9, 0xffffffffffffffff, r6]}}, @cred={{0x1c, 0x1, 0x2, {r19, r22, r23}}}, @rights={{0x24, 0x1, 0x1, [r0, r24, r26, r28, r30]}}, @cred={{0x1c, 0x1, 0x2, {r31, r34, r35}}}, @cred={{0x1c, 0x1, 0x2, {r36, r37, r38}}}, @rights={{0x34, 0x1, 0x1, [r39, r4, r42, r43, r4, r0, r44, r45, r46]}}], 0x118, 0x40c4}, 0x220080d9) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000000240)=[{&(0x7f00000006c0)="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", 0x800}, {0x0, 0x104}], 0x2, &(0x7f0000000500), 0xa8, 0x800}, 0x80) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000180)={r10, @in={{0x2, 0x4e20}}, 0xcf2c, 0xa4e, 0x4, 0x2, 0x4}, &(0x7f0000000240)=0x98) r47 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r48 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r47, r48, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r48, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x5, 0xfff7, 0x4, 0x6, 0x20}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000240)={r10, 0xfffff800, 0x9, 0x4, 0x200, 0x1, 0x5, 0x401, {r49, @in={{0x2, 0x4e24, @remote}}, 0x3, 0x100, 0x7, 0x7, 0x100}}, &(0x7f0000000140)=0xb0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r1, 0x0, 0x0) 03:38:15 executing program 4 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24", 0x97}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:15 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:15 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:15 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 494.427458][T19548] FAULT_INJECTION: forcing a failure. [ 494.427458][T19548] name failslab, interval 1, probability 0, space 0, times 0 [ 494.490973][T19548] CPU: 0 PID: 19548 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 494.499455][T19548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.509512][T19548] Call Trace: [ 494.512815][T19548] dump_stack+0x1fb/0x318 [ 494.517164][T19548] should_fail+0x555/0x770 [ 494.521918][T19548] __should_failslab+0x11a/0x160 [ 494.526876][T19548] should_failslab+0x9/0x20 [ 494.531407][T19548] kmem_cache_alloc_trace+0x5d/0x2f0 [ 494.536688][T19548] ? smack_d_instantiate+0x732/0xd70 [ 494.542148][T19548] smack_d_instantiate+0x732/0xd70 [ 494.547512][T19548] ? lockdep_init_map+0x2a/0x680 [ 494.552565][T19548] security_d_instantiate+0xa5/0x100 [ 494.558323][T19548] d_instantiate_new+0x65/0x120 [ 494.563355][T19548] ext4_mkdir+0xfa9/0x1450 [ 494.567832][T19548] vfs_mkdir+0x43f/0x610 [ 494.572097][T19548] do_mkdirat+0x1d7/0x320 [ 494.576708][T19548] __x64_sys_mkdir+0x60/0x70 [ 494.581740][T19548] do_syscall_64+0xf7/0x1c0 [ 494.586332][T19548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.592290][T19548] RIP: 0033:0x459637 [ 494.596334][T19548] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 494.616438][T19548] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 494.625217][T19548] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 03:38:16 executing program 0: perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xae, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1b) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x14000, 0x0) dup3(r2, r1, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000100)=0x0) quotactl(0x24000, &(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000240)="d4b49447a0a96e22b00a5089f2b6ec268bc7ab6fc4cc0e1e23653ceace2d9c7f6d7f06043ea6b515000c4f260b7af956dd38f0b498dc18aed05ae8d0e115c94d188ffa3715aa2a2752181b39312c342a11f8bd719f0d55cda85762155c23da6b71454dab0dc838a24b407120284ef78fa596317f183af597b6fd06880aaed78d0d86b16fb125fa486d7ee7931a2ac1f38dc9ecf6a8a24136515a77a77ca3e052c93f18d92a763710dcd41f6d09c85788d69e363a1fc64170f6d82c2edd788ab58b28b1") sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x1) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r5 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r4, r5, 0x0) ioctl$SG_GET_COMMAND_Q(r5, 0x2270, &(0x7f0000000180)) open(0x0, 0x40800, 0x4) truncate(&(0x7f0000000140)='./file0\x00', 0xd8) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0xfffffffffffffd62, 0xc0000) write$binfmt_elf32(r0, 0x0, 0x0) [ 494.635012][T19548] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 494.643411][T19548] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 494.651681][T19548] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 494.659755][T19548] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:16 executing program 4 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 494.819701][T19563] FAULT_INJECTION: forcing a failure. [ 494.819701][T19563] name failslab, interval 1, probability 0, space 0, times 0 [ 494.834887][T19563] CPU: 1 PID: 19563 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 494.843055][T19563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.853202][T19563] Call Trace: [ 494.856535][T19563] dump_stack+0x1fb/0x318 [ 494.860967][T19563] should_fail+0x555/0x770 03:38:16 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:16 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 494.865404][T19563] __should_failslab+0x11a/0x160 [ 494.870448][T19563] ? ksys_mount+0x38/0x100 [ 494.875058][T19563] should_failslab+0x9/0x20 [ 494.879661][T19563] __kmalloc_track_caller+0x79/0x340 [ 494.885149][T19563] strndup_user+0x76/0x130 [ 494.889566][T19563] ksys_mount+0x38/0x100 [ 494.893924][T19563] __x64_sys_mount+0xbf/0xd0 [ 494.898531][T19563] do_syscall_64+0xf7/0x1c0 [ 494.903142][T19563] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.909050][T19563] RIP: 0033:0x45cc6a [ 494.912947][T19563] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 494.933100][T19563] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 494.941875][T19563] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 494.941881][T19563] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 494.941886][T19563] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 494.941892][T19563] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 494.941897][T19563] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:16 executing program 4 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 495.115588][T19573] FAULT_INJECTION: forcing a failure. [ 495.115588][T19573] name failslab, interval 1, probability 0, space 0, times 0 [ 495.175751][T19573] CPU: 0 PID: 19573 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 495.183696][T19573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.193754][T19573] Call Trace: [ 495.197049][T19573] dump_stack+0x1fb/0x318 [ 495.201385][T19573] should_fail+0x555/0x770 [ 495.205807][T19573] __should_failslab+0x11a/0x160 [ 495.210751][T19573] should_failslab+0x9/0x20 [ 495.215256][T19573] kmem_cache_alloc_trace+0x5d/0x2f0 [ 495.220539][T19573] ? smack_d_instantiate+0x732/0xd70 [ 495.225822][T19573] smack_d_instantiate+0x732/0xd70 [ 495.230936][T19573] ? lockdep_init_map+0x2a/0x680 [ 495.235871][T19573] security_d_instantiate+0xa5/0x100 [ 495.241156][T19573] d_instantiate_new+0x65/0x120 [ 495.246006][T19573] ext4_mkdir+0xfa9/0x1450 [ 495.250494][T19573] vfs_mkdir+0x43f/0x610 [ 495.254746][T19573] do_mkdirat+0x1d7/0x320 [ 495.259078][T19573] __x64_sys_mkdir+0x60/0x70 [ 495.263664][T19573] do_syscall_64+0xf7/0x1c0 [ 495.268168][T19573] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.274064][T19573] RIP: 0033:0x459637 [ 495.277952][T19573] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 495.297553][T19573] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 495.305964][T19573] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 495.313932][T19573] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 495.321897][T19573] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 495.329864][T19573] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 495.337833][T19573] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:18 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24", 0x97}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:18 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='security.SMACK64IPOUT\x00', 0x0, 0x1b3, 0x3) r1 = open(0x0, 0x40800, 0x100) write$binfmt_elf32(r0, 0x0, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r2, r3, 0x0) ioctl$PPPIOCGDEBUG(r3, 0x80047441, &(0x7f0000000100)) ioctl$TIOCEXCL(r1, 0x540c) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U-', 0x7}, 0x28, 0x0) 03:38:18 executing program 4 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:18 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 497.506362][T19581] FAULT_INJECTION: forcing a failure. [ 497.506362][T19581] name failslab, interval 1, probability 0, space 0, times 0 [ 497.519239][T19581] CPU: 1 PID: 19581 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 497.527138][T19581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.537197][T19581] Call Trace: [ 497.540491][T19581] dump_stack+0x1fb/0x318 [ 497.544844][T19581] should_fail+0x555/0x770 [ 497.549280][T19581] __should_failslab+0x11a/0x160 [ 497.554227][T19581] should_failslab+0x9/0x20 [ 497.558741][T19581] kmem_cache_alloc_trace+0x5d/0x2f0 [ 497.564043][T19581] ? smack_d_instantiate+0x732/0xd70 [ 497.569342][T19581] smack_d_instantiate+0x732/0xd70 [ 497.574467][T19581] ? lockdep_init_map+0x2a/0x680 [ 497.579418][T19581] security_d_instantiate+0xa5/0x100 [ 497.584711][T19581] d_instantiate_new+0x65/0x120 [ 497.589567][T19581] ext4_mkdir+0xfa9/0x1450 [ 497.594006][T19581] vfs_mkdir+0x43f/0x610 [ 497.598260][T19581] do_mkdirat+0x1d7/0x320 [ 497.602590][T19581] __x64_sys_mkdir+0x60/0x70 [ 497.607184][T19581] do_syscall_64+0xf7/0x1c0 [ 497.611699][T19581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 497.618111][T19581] RIP: 0033:0x459637 [ 497.622008][T19581] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 497.641619][T19581] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 497.650191][T19581] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 497.658174][T19581] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 497.666249][T19581] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 497.674237][T19581] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 497.682213][T19581] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 497.690560][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 497.696388][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:38:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:19 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:19 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000)=0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r2, r3, 0x0) lstat(&(0x7f0000000080)='./control\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(0x0, 0x0, r4) write$FUSE_CREATE_OPEN(r3, &(0x7f0000000040)={0xa0, 0xfffffffffffffffe, 0x8, {{0x0, 0x2, 0x80000001, 0x9, 0x502, 0x3, {0x5, 0x68, 0x0, 0x7, 0x7f9, 0x9, 0x20, 0xf942, 0x7f, 0x8, 0x0, r1, r4, 0xffff, 0x80f}}, {0x0, 0x7cb67c6970973001}}}, 0xa0) write$binfmt_elf32(r0, 0x0, 0x0) 03:38:19 executing program 4 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:19 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 498.031227][T19609] FAULT_INJECTION: forcing a failure. [ 498.031227][T19609] name failslab, interval 1, probability 0, space 0, times 0 [ 498.057837][T19609] CPU: 1 PID: 19609 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 498.065762][T19609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.075824][T19609] Call Trace: [ 498.079126][T19609] dump_stack+0x1fb/0x318 [ 498.083469][T19609] should_fail+0x555/0x770 [ 498.083487][T19609] __should_failslab+0x11a/0x160 [ 498.083503][T19609] should_failslab+0x9/0x20 [ 498.097322][T19609] kmem_cache_alloc_trace+0x5d/0x2f0 [ 498.097333][T19609] ? smack_d_instantiate+0xabf/0xd70 [ 498.097345][T19609] smack_d_instantiate+0xabf/0xd70 [ 498.097362][T19609] ? lockdep_init_map+0x2a/0x680 [ 498.097377][T19609] security_d_instantiate+0xa5/0x100 [ 498.097389][T19609] d_instantiate_new+0x65/0x120 [ 498.097401][T19609] ext4_mkdir+0xfa9/0x1450 [ 498.097425][T19609] vfs_mkdir+0x43f/0x610 [ 498.097439][T19609] do_mkdirat+0x1d7/0x320 [ 498.097452][T19609] __x64_sys_mkdir+0x60/0x70 [ 498.097464][T19609] do_syscall_64+0xf7/0x1c0 [ 498.097479][T19609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 498.157846][T19609] RIP: 0033:0x459637 [ 498.161746][T19609] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 498.181350][T19609] RSP: 002b:00007fdb10196a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 498.189762][T19609] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 498.197744][T19609] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 498.205721][T19609] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 498.213703][T19609] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 498.221683][T19609] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab", 0x98}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:22 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:22 executing program 4 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:22 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:22 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x10000, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r2, r3, 0x0) ioctl$VIDIOC_G_PRIORITY(r3, 0x80045643, 0x3) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPOUT\x00', 0x0, 0x0, 0x0) r4 = pkey_alloc(0x0, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r5 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r7 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r6, r7, 0x0) dup3(0xffffffffffffffff, r6, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r9 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r8, r9, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r9) pkey_mprotect(&(0x7f00003e3000/0x2000)=nil, 0x2000, 0x8, r4) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, r4) r10 = open(0x0, 0x40800, 0x4) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) utimensat(r10, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {r11, r12/1000+10000}}, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) [ 500.660313][T19630] FAULT_INJECTION: forcing a failure. [ 500.660313][T19630] name failslab, interval 1, probability 0, space 0, times 0 [ 500.713678][T19630] CPU: 0 PID: 19630 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 500.721613][T19630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 500.731675][T19630] Call Trace: [ 500.734972][T19630] dump_stack+0x1fb/0x318 [ 500.739320][T19630] should_fail+0x555/0x770 [ 500.743752][T19630] __should_failslab+0x11a/0x160 [ 500.748700][T19630] ? getname_flags+0xba/0x640 [ 500.753389][T19630] should_failslab+0x9/0x20 [ 500.757910][T19630] kmem_cache_alloc+0x56/0x2e0 [ 500.762689][T19630] getname_flags+0xba/0x640 [ 500.767211][T19630] user_path_at_empty+0x2d/0x50 [ 500.772073][T19630] do_mount+0xd7/0x2510 [ 500.776250][T19630] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 500.781802][T19630] ? copy_mount_options+0x5f/0x3c0 [ 500.786922][T19630] ? __kasan_check_read+0x11/0x20 [ 500.791953][T19630] ? copy_mount_options+0x308/0x3c0 [ 500.797169][T19630] ksys_mount+0xcc/0x100 [ 500.801423][T19630] __x64_sys_mount+0xbf/0xd0 [ 500.806019][T19630] do_syscall_64+0xf7/0x1c0 [ 500.806034][T19630] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 500.806046][T19630] RIP: 0033:0x45cc6a [ 500.816405][T19630] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 500.816412][T19630] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 500.816424][T19630] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a 03:38:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 500.857461][T19630] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 500.865438][T19630] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 500.873429][T19630] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 500.881403][T19630] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:22 executing program 4 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:22 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:22 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 501.062834][T19646] FAULT_INJECTION: forcing a failure. [ 501.062834][T19646] name failslab, interval 1, probability 0, space 0, times 0 03:38:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 501.108804][T19646] CPU: 1 PID: 19646 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 501.116740][T19646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.126801][T19646] Call Trace: [ 501.130106][T19646] dump_stack+0x1fb/0x318 [ 501.134453][T19646] should_fail+0x555/0x770 [ 501.138890][T19646] __should_failslab+0x11a/0x160 [ 501.143835][T19646] ? ksys_mount+0x6a/0x100 [ 501.148265][T19646] should_failslab+0x9/0x20 [ 501.152783][T19646] __kmalloc_track_caller+0x79/0x340 [ 501.158075][T19646] strndup_user+0x76/0x130 [ 501.158088][T19646] ksys_mount+0x6a/0x100 [ 501.158101][T19646] __x64_sys_mount+0xbf/0xd0 [ 501.158118][T19646] do_syscall_64+0xf7/0x1c0 [ 501.175834][T19646] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 501.175845][T19646] RIP: 0033:0x45cc6a [ 501.175855][T19646] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 501.175860][T19646] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 501.175868][T19646] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 501.175873][T19646] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 501.175879][T19646] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 501.175884][T19646] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 501.175889][T19646] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:22 executing program 4 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 501.396876][T19659] FAULT_INJECTION: forcing a failure. [ 501.396876][T19659] name failslab, interval 1, probability 0, space 0, times 0 [ 501.409871][T19659] CPU: 1 PID: 19659 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 501.409896][T19659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.409904][T19659] Call Trace: [ 501.431136][T19659] dump_stack+0x1fb/0x318 [ 501.436246][T19659] should_fail+0x555/0x770 [ 501.440660][T19659] __should_failslab+0x11a/0x160 [ 501.445594][T19659] ? __sigqueue_alloc+0x2ce/0x440 [ 501.450612][T19659] should_failslab+0x9/0x20 [ 501.455105][T19659] kmem_cache_alloc+0x56/0x2e0 [ 501.455119][T19659] __sigqueue_alloc+0x2ce/0x440 [ 501.455131][T19659] __send_signal+0x508/0xcd0 [ 501.469288][T19659] send_signal+0x6e0/0x830 [ 501.473699][T19659] force_sig_info_to_task+0x247/0x2e0 [ 501.479082][T19659] force_sig_fault+0xbf/0x130 [ 501.483758][T19659] __bad_area_nosemaphore+0x307/0x470 [ 501.489120][T19659] bad_area+0x6b/0x80 [ 501.493090][T19659] do_user_addr_fault+0xacc/0xaf0 [ 501.498114][T19659] __do_page_fault+0xd3/0x1f0 [ 501.502815][T19659] do_page_fault+0x99/0xb0 [ 501.507242][T19659] page_fault+0x39/0x40 [ 501.511388][T19659] RIP: 0033:0x453e1f [ 501.515366][T19659] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 501.535079][T19659] RSP: 002b:00007fdb10196a88 EFLAGS: 00010283 [ 501.541144][T19659] RAX: 00007fdb10196b40 RBX: 0000000020000068 RCX: 0000000000000000 [ 501.549114][T19659] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007fdb10196b40 [ 501.557166][T19659] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 501.565130][T19659] R10: 0000000000000075 R11: 00000000004e7280 R12: 0000000000000004 [ 501.573101][T19659] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab", 0x98}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:25 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0xff, 0x200000) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x81, 0x4, 0xf9, 0x0, 0x0, 0x5, 0x40804, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040)}, 0x440, 0x1, 0x6c3e, 0x7, 0x200, 0xfc85, 0x2d}, r0, 0x8, 0xffffffffffffffff, 0x3) r1 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r1, 0x0, 0x0) 03:38:25 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:25 executing program 4 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:25 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:25 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:25 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r2, r3, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) getsockopt$IP_VS_SO_GET_DAEMON(r4, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x30) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='security.SMACK64IPOUT\x00', 0x0, 0x3bd, 0x1) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r5, 0x0, 0x0) [ 503.732886][T19669] FAULT_INJECTION: forcing a failure. [ 503.732886][T19669] name failslab, interval 1, probability 0, space 0, times 0 [ 503.822391][T19669] CPU: 0 PID: 19669 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 503.830330][T19669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.840394][T19669] Call Trace: [ 503.843701][T19669] dump_stack+0x1fb/0x318 [ 503.848038][T19669] should_fail+0x555/0x770 [ 503.852475][T19669] __should_failslab+0x11a/0x160 [ 503.857424][T19669] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 503.863157][T19669] should_failslab+0x9/0x20 [ 503.867678][T19669] __kmalloc+0x7a/0x340 [ 503.871843][T19669] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 503.877573][T19669] tomoyo_realpath_from_path+0xdc/0x7c0 [ 503.883120][T19669] tomoyo_mount_permission+0x923/0xa30 [ 503.888593][T19669] ? kmem_cache_free+0xd8/0xf0 [ 503.893389][T19669] tomoyo_sb_mount+0x35/0x40 [ 503.897996][T19669] security_sb_mount+0x84/0xe0 [ 503.902769][T19669] do_mount+0x10a/0x2510 [ 503.907015][T19669] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 503.912553][T19669] ? copy_mount_options+0x5f/0x3c0 [ 503.917662][T19669] ? copy_mount_options+0x308/0x3c0 [ 503.922946][T19669] ksys_mount+0xcc/0x100 [ 503.927191][T19669] __x64_sys_mount+0xbf/0xd0 [ 503.931783][T19669] do_syscall_64+0xf7/0x1c0 [ 503.936302][T19669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.942633][T19669] RIP: 0033:0x45cc6a [ 503.946552][T19669] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 503.966161][T19669] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 503.974571][T19669] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 503.982539][T19669] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 503.990505][T19669] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 503.998477][T19669] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 504.006449][T19669] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:25 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 504.023507][T19669] ERROR: Out of memory at tomoyo_realpath_from_path. 03:38:25 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:25 executing program 4 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:25 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 504.217713][T19691] FAULT_INJECTION: forcing a failure. [ 504.217713][T19691] name failslab, interval 1, probability 0, space 0, times 0 [ 504.238134][T19691] CPU: 0 PID: 19691 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 504.246065][T19691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.256122][T19691] Call Trace: [ 504.259431][T19691] dump_stack+0x1fb/0x318 [ 504.264029][T19691] should_fail+0x555/0x770 [ 504.268462][T19691] __should_failslab+0x11a/0x160 [ 504.273406][T19691] ? getname_flags+0xba/0x640 [ 504.278083][T19691] should_failslab+0x9/0x20 [ 504.282580][T19691] kmem_cache_alloc+0x56/0x2e0 [ 504.287355][T19691] getname_flags+0xba/0x640 [ 504.291867][T19691] user_path_at_empty+0x2d/0x50 [ 504.296713][T19691] do_mount+0xd7/0x2510 [ 504.296726][T19691] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 504.296733][T19691] ? copy_mount_options+0x5f/0x3c0 [ 504.296744][T19691] ? __kasan_check_read+0x11/0x20 [ 504.296751][T19691] ? copy_mount_options+0x308/0x3c0 [ 504.296763][T19691] ksys_mount+0xcc/0x100 [ 504.306481][T19691] __x64_sys_mount+0xbf/0xd0 [ 504.306494][T19691] do_syscall_64+0xf7/0x1c0 [ 504.306522][T19691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.306531][T19691] RIP: 0033:0x45cc6a [ 504.306541][T19691] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 03:38:25 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 504.306546][T19691] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 504.306555][T19691] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 504.306560][T19691] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 504.306570][T19691] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 504.396806][T19691] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 504.404772][T19691] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab", 0x98}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:28 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000450d, 0x80409, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @broadcast, @empty}, &(0x7f0000000080)=0xc) r3 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r3, 0x0, 0x0) 03:38:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:28 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:28 executing program 4 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:28 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 506.852178][T19708] FAULT_INJECTION: forcing a failure. [ 506.852178][T19708] name failslab, interval 1, probability 0, space 0, times 0 [ 506.873772][T19708] CPU: 1 PID: 19708 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 506.882056][T19708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.892115][T19708] Call Trace: [ 506.895413][T19708] dump_stack+0x1fb/0x318 [ 506.899747][T19708] should_fail+0x555/0x770 [ 506.904170][T19708] __should_failslab+0x11a/0x160 [ 506.909116][T19708] should_failslab+0x9/0x20 [ 506.913619][T19708] kmem_cache_alloc_trace+0x5d/0x2f0 [ 506.918903][T19708] ? legacy_init_fs_context+0x51/0xc0 [ 506.924277][T19708] legacy_init_fs_context+0x51/0xc0 [ 506.929481][T19708] alloc_fs_context+0x53a/0x640 [ 506.934334][T19708] fs_context_for_mount+0x24/0x30 [ 506.939352][T19708] do_mount+0x10a7/0x2510 [ 506.943681][T19708] ? copy_mount_options+0x308/0x3c0 [ 506.948872][T19708] ksys_mount+0xcc/0x100 [ 506.953113][T19708] __x64_sys_mount+0xbf/0xd0 [ 506.958220][T19708] do_syscall_64+0xf7/0x1c0 [ 506.962732][T19708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 506.968620][T19708] RIP: 0033:0x45cc6a [ 506.972511][T19708] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 506.992107][T19708] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 507.000517][T19708] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 507.008485][T19708] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 507.016452][T19708] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 507.024421][T19708] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 507.032388][T19708] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:28 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:28 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000240)={0x0, 0xcc, "1ae09321b7decec9e3576525eb3cd16063a9d0f66bcd5d32a5869f92005e109844246cf113b8385a3715f3066ff98471d7ef3c888b939f32bd877b48bdd32e3978f10b3644b91a9325d19cd47e5e8a0597d27e479ab687fe6c0f882f0fbe95487a438cb72e7b6cff13398172c62d081aa9ff6cd0bfa1ea2e5eebed45449b0dfaf9dea31cd9b679be90161b9993dc40c55322487233588dd090b989c6d95099d1e3e556b8363505d629e91ece3fef05dde4f21119c95d1cde50a215edd4bd4b50dcb9b8500aaf977d90beca9e"}, &(0x7f0000000180)=0xd4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="2f1f89e3", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={r5, @in={{0x2, 0x0, @loopback}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000280)={r5, 0x7, 0x0, 0x0, 0xca66}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000340)={r5, 0x1, 0x30, 0x1}, &(0x7f0000000380)=0x18) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000003c0)={0x0, 0x2}, &(0x7f0000000040)=0x8) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r7, r8, 0x0) r9 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r10 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r9, r10, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r10, 0x84, 0x75, &(0x7f0000000440)={r6, 0x5}, 0x111) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r11 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r12 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r11, r12, 0x0) ioctl$IOC_PR_RESERVE(r12, 0x401070c9, &(0x7f0000000080)={0x400, 0x3}) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) r13 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r14 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r13, r14, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r14, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:38:28 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:28 executing program 4 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 507.387069][T19727] FAULT_INJECTION: forcing a failure. [ 507.387069][T19727] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 507.400323][T19727] CPU: 0 PID: 19727 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 507.408224][T19727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 507.418285][T19727] Call Trace: [ 507.421605][T19727] dump_stack+0x1fb/0x318 [ 507.425935][T19727] should_fail+0x555/0x770 [ 507.430344][T19727] should_fail_alloc_page+0x55/0x60 [ 507.435526][T19727] prepare_alloc_pages+0x283/0x460 [ 507.440618][T19727] __alloc_pages_nodemask+0xb2/0x5d0 [ 507.445881][T19727] ? __kasan_kmalloc+0x178/0x1b0 [ 507.450804][T19727] kmem_getpages+0x4d/0xa00 [ 507.455286][T19727] cache_grow_begin+0x7e/0x2c0 [ 507.460031][T19727] cache_alloc_refill+0x311/0x3f0 [ 507.465035][T19727] ? check_preemption_disabled+0xb7/0x2a0 [ 507.470736][T19727] kmem_cache_alloc+0x2b9/0x2e0 [ 507.475563][T19727] ? getname_flags+0xba/0x640 [ 507.480237][T19727] getname_flags+0xba/0x640 [ 507.484746][T19727] user_path_at_empty+0x2d/0x50 [ 507.489585][T19727] do_mount+0xd7/0x2510 [ 507.493722][T19727] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 507.499256][T19727] ? copy_mount_options+0x5f/0x3c0 [ 507.504347][T19727] ? __kasan_check_read+0x11/0x20 [ 507.509348][T19727] ? copy_mount_options+0x308/0x3c0 [ 507.514523][T19727] ksys_mount+0xcc/0x100 [ 507.518748][T19727] __x64_sys_mount+0xbf/0xd0 [ 507.523319][T19727] do_syscall_64+0xf7/0x1c0 [ 507.527822][T19727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 507.533692][T19727] RIP: 0033:0x45cc6a [ 507.537566][T19727] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 507.557147][T19727] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 507.565533][T19727] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 507.573485][T19727] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 507.581525][T19727] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 507.589475][T19727] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 507.597428][T19727] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:31 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:31 executing program 4 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:31 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x64, 0x101000) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:38:31 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 509.923440][T19745] FAULT_INJECTION: forcing a failure. [ 509.923440][T19745] name failslab, interval 1, probability 0, space 0, times 0 [ 509.996885][T19745] CPU: 1 PID: 19745 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 510.004823][T19745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.014881][T19745] Call Trace: [ 510.014900][T19745] dump_stack+0x1fb/0x318 [ 510.014915][T19745] should_fail+0x555/0x770 [ 510.014933][T19745] __should_failslab+0x11a/0x160 [ 510.026939][T19745] ? tomoyo_encode2+0x273/0x5a0 [ 510.026950][T19745] should_failslab+0x9/0x20 [ 510.026966][T19745] __kmalloc+0x7a/0x340 [ 510.036722][T19745] tomoyo_encode2+0x273/0x5a0 [ 510.036735][T19745] tomoyo_realpath_from_path+0x769/0x7c0 [ 510.036750][T19745] tomoyo_mount_permission+0x294/0xa30 [ 510.036763][T19745] ? filename_lookup+0x4b0/0x690 [ 510.036779][T19745] ? kmem_cache_free+0xd8/0xf0 [ 510.036804][T19745] tomoyo_sb_mount+0x35/0x40 [ 510.055714][T19745] security_sb_mount+0x84/0xe0 [ 510.080151][T19745] do_mount+0x10a/0x2510 [ 510.084384][T19745] ? copy_mount_options+0x278/0x3c0 [ 510.089571][T19745] ? __sanitizer_cov_trace_const_cmp4+0x80/0x90 [ 510.095802][T19745] ? copy_mount_options+0x308/0x3c0 [ 510.100996][T19745] ksys_mount+0xcc/0x100 [ 510.105246][T19745] __x64_sys_mount+0xbf/0xd0 [ 510.109856][T19745] do_syscall_64+0xf7/0x1c0 [ 510.114371][T19745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 510.120262][T19745] RIP: 0033:0x45cc6a [ 510.124150][T19745] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 510.143756][T19745] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 510.152166][T19745] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 510.160130][T19745] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 510.168105][T19745] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 510.176078][T19745] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 510.184045][T19745] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:31 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x18) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:38:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 510.196303][T19745] ERROR: Out of memory at tomoyo_realpath_from_path. 03:38:31 executing program 4 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 510.388707][T19765] FAULT_INJECTION: forcing a failure. [ 510.388707][T19765] name failslab, interval 1, probability 0, space 0, times 0 [ 510.439935][T19765] CPU: 0 PID: 19765 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 510.447889][T19765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.457949][T19765] Call Trace: [ 510.461244][T19765] dump_stack+0x1fb/0x318 [ 510.465583][T19765] should_fail+0x555/0x770 [ 510.470165][T19765] __should_failslab+0x11a/0x160 [ 510.475242][T19765] should_failslab+0x9/0x20 [ 510.479766][T19765] kmem_cache_alloc_trace+0x5d/0x2f0 [ 510.485064][T19765] ? alloc_fs_context+0x65/0x640 [ 510.490009][T19765] alloc_fs_context+0x65/0x640 [ 510.494774][T19765] ? _raw_read_unlock+0x2c/0x50 [ 510.499626][T19765] ? get_fs_type+0x47f/0x500 [ 510.504220][T19765] fs_context_for_mount+0x24/0x30 [ 510.509273][T19765] do_mount+0x10a7/0x2510 [ 510.513613][T19765] ? copy_mount_options+0x278/0x3c0 [ 510.518810][T19765] ? copy_mount_options+0x25e/0x3c0 [ 510.524005][T19765] ? copy_mount_options+0x264/0x3c0 [ 510.529203][T19765] ? copy_mount_options+0x308/0x3c0 [ 510.534398][T19765] ksys_mount+0xcc/0x100 [ 510.538858][T19765] __x64_sys_mount+0xbf/0xd0 [ 510.543472][T19765] do_syscall_64+0xf7/0x1c0 [ 510.548048][T19765] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 510.553973][T19765] RIP: 0033:0x45cc6a [ 510.557868][T19765] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 510.577579][T19765] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 510.586107][T19765] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 510.594122][T19765] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 510.602100][T19765] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 510.610085][T19765] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 510.618069][T19765] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:32 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x1, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r2, r3, 0x0) ioctl$SIOCAX25GETINFOOLD(r3, 0x89e9, &(0x7f0000000040)) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r5 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r4, r5, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r9 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r8, r9, 0x0) r10 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x8, 0x80000) r11 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r12 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r11, r12, 0x0) r13 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0xd) r14 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r15 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r14, r15, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r5, 0x6, &(0x7f0000000300)={0xca48, &(0x7f00000002c0)=[r6, r7, r9, r10, r1, r11, r0, r13, r15]}, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r16 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r17 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r16, r17, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r17, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000140)=0x4) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r1, 0x0, 0x0) 03:38:32 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:32 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:32 executing program 4 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 510.917650][T19778] FAULT_INJECTION: forcing a failure. [ 510.917650][T19778] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 510.930919][T19778] CPU: 0 PID: 19778 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 510.938819][T19778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.948877][T19778] Call Trace: [ 510.952173][T19778] dump_stack+0x1fb/0x318 [ 510.956503][T19778] should_fail+0x555/0x770 [ 510.960925][T19778] should_fail_alloc_page+0x55/0x60 [ 510.966119][T19778] prepare_alloc_pages+0x283/0x460 [ 510.971243][T19778] __alloc_pages_nodemask+0xb2/0x5d0 [ 510.976538][T19778] kmem_getpages+0x4d/0xa00 [ 510.981055][T19778] cache_grow_begin+0x7e/0x2c0 [ 510.985825][T19778] cache_alloc_refill+0x311/0x3f0 [ 510.990845][T19778] ? check_preemption_disabled+0xb7/0x2a0 [ 510.996564][T19778] __kmalloc+0x318/0x340 [ 511.000985][T19778] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 511.006701][T19778] tomoyo_realpath_from_path+0xdc/0x7c0 [ 511.012259][T19778] tomoyo_mount_permission+0x294/0xa30 [ 511.017714][T19778] ? filename_lookup+0x4b0/0x690 [ 511.022652][T19778] ? kmem_cache_free+0xd8/0xf0 [ 511.027446][T19778] tomoyo_sb_mount+0x35/0x40 [ 511.032039][T19778] security_sb_mount+0x84/0xe0 [ 511.036805][T19778] do_mount+0x10a/0x2510 [ 511.041039][T19778] ? copy_mount_options+0x278/0x3c0 [ 511.046233][T19778] ? copy_mount_options+0x25e/0x3c0 [ 511.051428][T19778] ? copy_mount_options+0x264/0x3c0 [ 511.056619][T19778] ? copy_mount_options+0x308/0x3c0 [ 511.061823][T19778] ksys_mount+0xcc/0x100 [ 511.066070][T19778] __x64_sys_mount+0xbf/0xd0 [ 511.070692][T19778] do_syscall_64+0xf7/0x1c0 [ 511.075216][T19778] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 511.081112][T19778] RIP: 0033:0x45cc6a [ 511.085007][T19778] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 511.104608][T19778] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:38:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 511.113099][T19778] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 511.121069][T19778] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 511.129055][T19778] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 511.137025][T19778] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 511.144994][T19778] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:33 executing program 4 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:33 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) [ 511.556972][T19792] FAULT_INJECTION: forcing a failure. [ 511.556972][T19792] name failslab, interval 1, probability 0, space 0, times 0 [ 511.604807][T19792] CPU: 0 PID: 19792 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 511.612743][T19792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.612748][T19792] Call Trace: [ 511.612766][T19792] dump_stack+0x1fb/0x318 [ 511.612780][T19792] should_fail+0x555/0x770 [ 511.612797][T19792] __should_failslab+0x11a/0x160 [ 511.612807][T19792] ? vfs_parse_fs_string+0xed/0x1a0 [ 511.612823][T19792] should_failslab+0x9/0x20 [ 511.645048][T19792] __kmalloc_track_caller+0x79/0x340 03:38:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:33 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 511.645063][T19792] kmemdup_nul+0x2a/0xa0 [ 511.645076][T19792] vfs_parse_fs_string+0xed/0x1a0 [ 511.645092][T19792] vfs_kern_mount+0x77/0x160 [ 511.645104][T19792] btrfs_mount+0x34f/0x18e0 [ 511.645122][T19792] ? check_preemption_disabled+0x47/0x2a0 [ 511.645137][T19792] ? vfs_parse_fs_string+0x13b/0x1a0 [ 511.645147][T19792] ? cap_capable+0x250/0x290 [ 511.645158][T19792] ? safesetid_security_capable+0x89/0xf0 [ 511.645171][T19792] legacy_get_tree+0xf9/0x1a0 [ 511.645179][T19792] ? btrfs_resize_thread_pool+0x290/0x290 [ 511.645190][T19792] vfs_get_tree+0x8b/0x2a0 [ 511.645204][T19792] do_mount+0x16c0/0x2510 [ 511.664248][T19792] ? copy_mount_options+0x308/0x3c0 [ 511.664260][T19792] ksys_mount+0xcc/0x100 [ 511.664270][T19792] __x64_sys_mount+0xbf/0xd0 [ 511.664284][T19792] do_syscall_64+0xf7/0x1c0 [ 511.664298][T19792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 511.664308][T19792] RIP: 0033:0x45cc6a [ 511.664318][T19792] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 511.664322][T19792] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 511.664331][T19792] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 511.664336][T19792] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 511.664342][T19792] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 511.664347][T19792] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 511.664353][T19792] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:34 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x800, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r3, r4, 0x0) r5 = fcntl$dupfd(r1, 0x406, r3) ioctl$SIOCGIFHWADDR(r5, 0x8927, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000000c0)=0x3, 0x4) 03:38:34 executing program 4 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:34 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:34 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 513.346904][T19809] FAULT_INJECTION: forcing a failure. [ 513.346904][T19809] name failslab, interval 1, probability 0, space 0, times 0 [ 513.396332][T19809] CPU: 0 PID: 19809 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 513.404272][T19809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.414331][T19809] Call Trace: [ 513.417630][T19809] dump_stack+0x1fb/0x318 [ 513.421976][T19809] should_fail+0x555/0x770 [ 513.426414][T19809] __should_failslab+0x11a/0x160 [ 513.431360][T19809] ? getname_kernel+0x59/0x2f0 [ 513.436148][T19809] should_failslab+0x9/0x20 [ 513.440655][T19809] kmem_cache_alloc+0x56/0x2e0 [ 513.445531][T19809] getname_kernel+0x59/0x2f0 [ 513.450119][T19809] kern_path+0x1f/0x40 [ 513.454190][T19809] tomoyo_mount_permission+0x7f1/0xa30 [ 513.459660][T19809] ? kmem_cache_free+0xd8/0xf0 [ 513.464450][T19809] tomoyo_sb_mount+0x35/0x40 [ 513.469044][T19809] security_sb_mount+0x84/0xe0 [ 513.473816][T19809] do_mount+0x10a/0x2510 [ 513.478056][T19809] ? copy_mount_options+0x278/0x3c0 [ 513.483262][T19809] ? copy_mount_options+0x25e/0x3c0 [ 513.488474][T19809] ? copy_mount_options+0x267/0x3c0 [ 513.493681][T19809] ? copy_mount_options+0x308/0x3c0 [ 513.498908][T19809] ksys_mount+0xcc/0x100 [ 513.503160][T19809] __x64_sys_mount+0xbf/0xd0 [ 513.507752][T19809] do_syscall_64+0xf7/0x1c0 [ 513.512309][T19809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 513.518246][T19809] RIP: 0033:0x45cc6a [ 513.522279][T19809] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 513.541889][T19809] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 513.550299][T19809] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 513.558271][T19809] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 513.566239][T19809] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 513.574224][T19809] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 513.582198][T19809] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:35 executing program 4 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:35 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 513.729671][T19825] FAULT_INJECTION: forcing a failure. [ 513.729671][T19825] name failslab, interval 1, probability 0, space 0, times 0 03:38:35 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x4, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) clone3(&(0x7f0000000340)={0x51b00500, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x35, 0x0, &(0x7f0000000140)=""/69, 0x45, &(0x7f0000000240)=""/255}, 0x40) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000040)='security.SMACK64\x00', 0x0, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x2) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000023c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000c76f4503775e3a23a7073a903fcb683e13e4cb99411d32a969f57fb87e54d66704d2654729"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)=ANY=[@ANYBLOB="980000001300810200"/20, @ANYRES32=r5, @ANYBLOB="000000000000000078002b0004000100"/80, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0800f9ff0000000000000000000000001000000100000900000000000000000000000002"], 0x98}}, 0x0) sendmsg$xdp(r1, &(0x7f0000000500)={&(0x7f00000003c0)={0x2c, 0x0, r5, 0x3d}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000400)="aa7cc155d077befe3b0c7f778d437dfb54475236e4e85d7f14fe5847efb6938c04915f9b7deb224b0f046009452b65f2f55e50d5d0e7156d63ed5a398273f049fe1662494ba45ede2feb48fc6b61792ddaeddfa2b44c0376b072b4f5987936978df38fa4218d61702ed2a8fbc8cdec2c329f40374152c513083d7952e88148505b1b0b1cf5b9d34183a9e7720178a138a69a53de29ed89e401", 0x99}, {&(0x7f0000000580)="6ec97f74a6a134f0fca7a718d4f8a35128b3a39602e9ddc8ae15ab41edeceade9feadd5e6f1deb4e56fb5b8cf6bee251f79e4b3ff3f658696096ef5345304fdd854d0736c7d4f1eecc359fdef9c640044d695f4111d798996d9e8e4bd9980fd49634b3fb6470122e7e42d8a1f43f56d812667d63b961938436f64937c2b1a1076c40f3cfa3920bdd251b4e141e75736d0203c8a8916da7b88670f17a7baba9198ddf4df87e3d44b800f2285f16f97b0c6d866415976eb34380a8b19b4d9c4283fb8b16cb7b45ae32ba4234ba1e774f", 0xcf}], 0x2, 0x0, 0x0, 0x28044035}, 0x24000800) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r7 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r6, r7, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000000680)={0x6, 0x2, 0x5, 0x7fffffff, 0x1, [{0x20, 0x6, 0x2, 0x0, 0x0, 0x2004}]}) write$binfmt_elf32(r0, 0x0, 0x0) 03:38:35 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 513.814259][T19825] CPU: 1 PID: 19825 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 513.822311][T19825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.832376][T19825] Call Trace: [ 513.835685][T19825] dump_stack+0x1fb/0x318 [ 513.840298][T19825] should_fail+0x555/0x770 [ 513.844732][T19825] __should_failslab+0x11a/0x160 [ 513.849692][T19825] should_failslab+0x9/0x20 [ 513.854220][T19825] kmem_cache_alloc_trace+0x5d/0x2f0 [ 513.859514][T19825] ? alloc_fs_context+0x65/0x640 [ 513.864459][T19825] alloc_fs_context+0x65/0x640 [ 513.864475][T19825] ? kfree+0x194/0x200 [ 513.864489][T19825] fs_context_for_mount+0x24/0x30 [ 513.864501][T19825] vfs_kern_mount+0x2c/0x160 [ 513.864514][T19825] btrfs_mount+0x34f/0x18e0 [ 513.864534][T19825] ? check_preemption_disabled+0x47/0x2a0 [ 513.864548][T19825] ? vfs_parse_fs_string+0x13b/0x1a0 [ 513.864557][T19825] ? cap_capable+0x250/0x290 [ 513.864568][T19825] ? safesetid_security_capable+0x89/0xf0 [ 513.864581][T19825] legacy_get_tree+0xf9/0x1a0 [ 513.873438][T19825] ? btrfs_resize_thread_pool+0x290/0x290 [ 513.873453][T19825] vfs_get_tree+0x8b/0x2a0 [ 513.873465][T19825] do_mount+0x16c0/0x2510 [ 513.873482][T19825] ? copy_mount_options+0x308/0x3c0 [ 513.873495][T19825] ksys_mount+0xcc/0x100 [ 513.873508][T19825] __x64_sys_mount+0xbf/0xd0 [ 513.873522][T19825] do_syscall_64+0xf7/0x1c0 [ 513.873544][T19825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 513.952383][T19825] RIP: 0033:0x45cc6a [ 513.956286][T19825] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 513.975891][T19825] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 513.984329][T19825] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 513.992307][T19825] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 514.000275][T19825] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 514.008243][T19825] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 514.016216][T19825] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:35 executing program 4 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 514.232356][T19834] IPVS: ftp: loaded support on port[0] = 21 [ 514.310504][T19835] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 514.331817][T19839] FAULT_INJECTION: forcing a failure. [ 514.331817][T19839] name failslab, interval 1, probability 0, space 0, times 0 [ 514.372614][T19839] CPU: 0 PID: 19839 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 514.380566][T19839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.390682][T19839] Call Trace: [ 514.394051][T19839] dump_stack+0x1fb/0x318 [ 514.398396][T19839] should_fail+0x555/0x770 [ 514.402845][T19839] __should_failslab+0x11a/0x160 [ 514.407937][T19839] should_failslab+0x9/0x20 [ 514.412465][T19839] kmem_cache_alloc_trace+0x5d/0x2f0 [ 514.417864][T19839] ? legacy_init_fs_context+0x51/0xc0 [ 514.423249][T19839] legacy_init_fs_context+0x51/0xc0 [ 514.428457][T19839] alloc_fs_context+0x53a/0x640 [ 514.433317][T19839] fs_context_for_mount+0x24/0x30 [ 514.438339][T19839] do_mount+0x10a7/0x2510 [ 514.442661][T19839] ? copy_mount_options+0x278/0x3c0 [ 514.447864][T19839] ? audit_tree_destroy_watch+0x20/0x20 [ 514.453410][T19839] ? copy_mount_options+0x308/0x3c0 [ 514.458607][T19839] ksys_mount+0xcc/0x100 [ 514.462872][T19839] __x64_sys_mount+0xbf/0xd0 [ 514.467496][T19839] do_syscall_64+0xf7/0x1c0 [ 514.472014][T19839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.477909][T19839] RIP: 0033:0x45cc6a [ 514.481827][T19839] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 514.501881][T19839] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 514.510295][T19839] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 514.518265][T19839] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 514.526235][T19839] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 514.534297][T19839] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 514.542268][T19839] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:37 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:37 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:37 executing program 4 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:37 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000040)={{0x5}, 'port0\x00', 0x31, 0x180c05, 0x7, 0xffffffff, 0xfffffffb, 0x6, 0x8, 0x0, 0x9, 0x20}) write$binfmt_elf32(r0, 0x0, 0x0) [ 516.425642][T19847] FAULT_INJECTION: forcing a failure. [ 516.425642][T19847] name failslab, interval 1, probability 0, space 0, times 0 [ 516.487567][T19847] CPU: 1 PID: 19847 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 516.495529][T19847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.505588][T19847] Call Trace: [ 516.508893][T19847] dump_stack+0x1fb/0x318 [ 516.513270][T19847] should_fail+0x555/0x770 [ 516.517708][T19847] __should_failslab+0x11a/0x160 [ 516.522669][T19847] should_failslab+0x9/0x20 [ 516.527180][T19847] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 516.527192][T19847] ? __kmalloc_node+0x3c/0x60 03:38:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 516.527204][T19847] ? smack_sb_eat_lsm_opts+0x867/0xa20 [ 516.527221][T19847] __kmalloc_node+0x3c/0x60 [ 516.527235][T19847] kvmalloc_node+0xcc/0x130 [ 516.537614][T19847] btrfs_mount_root+0xe3/0x1040 [ 516.537630][T19847] ? vfs_parse_fs_string+0x13b/0x1a0 [ 516.537639][T19847] ? rcu_read_lock_sched_held+0x10b/0x170 [ 516.537649][T19847] ? trace_kfree+0xb2/0x110 [ 516.537662][T19847] legacy_get_tree+0xf9/0x1a0 [ 516.537671][T19847] ? btrfs_control_open+0x40/0x40 [ 516.537684][T19847] vfs_get_tree+0x8b/0x2a0 [ 516.537698][T19847] vfs_kern_mount+0xc2/0x160 [ 516.537712][T19847] btrfs_mount+0x34f/0x18e0 [ 516.586565][T19847] ? check_preemption_disabled+0x47/0x2a0 [ 516.586584][T19847] ? vfs_parse_fs_string+0x13b/0x1a0 [ 516.586594][T19847] ? cap_capable+0x250/0x290 [ 516.586608][T19847] ? safesetid_security_capable+0x89/0xf0 [ 516.586625][T19847] legacy_get_tree+0xf9/0x1a0 [ 516.595705][T19847] ? btrfs_resize_thread_pool+0x290/0x290 [ 516.595721][T19847] vfs_get_tree+0x8b/0x2a0 [ 516.595733][T19847] do_mount+0x16c0/0x2510 [ 516.595747][T19847] ? copy_mount_options+0x308/0x3c0 [ 516.641631][T19847] ksys_mount+0xcc/0x100 [ 516.645879][T19847] __x64_sys_mount+0xbf/0xd0 [ 516.650473][T19847] do_syscall_64+0xf7/0x1c0 [ 516.654978][T19847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.660871][T19847] RIP: 0033:0x45cc6a [ 516.664781][T19847] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 516.684390][T19847] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 516.692800][T19847] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 516.700769][T19847] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 516.708739][T19847] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 516.716703][T19847] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 516.724702][T19847] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:38 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:38 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffeffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0xf84) write$binfmt_elf32(r0, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000080)={0x15, 0x7, 0x4d}) 03:38:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 516.883627][ C0] protocol 88fb is buggy, dev hsr_slave_0 03:38:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:38 executing program 4 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:38 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:38 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000080)={0x3, 0x7fffffff, {0x55, 0x0, 0x7, {0x1e, 0x1f}, {0x3d3, 0x101}, @ramp={0x6, 0x20, {0x7ff, 0x7, 0x0, 0x5}}}, {0x2, 0x81, 0x1000, {0xfa1, 0xae20}, {0x3f, 0xfff8}, @period={0x58, 0xb4, 0xe83, 0x0, 0x101, {0xfffb, 0x40, 0x3, 0xc2}, 0x6, &(0x7f0000000040)=[0x4, 0x4, 0x8001, 0x80, 0x0, 0x81]}}}) [ 517.159863][T19875] FAULT_INJECTION: forcing a failure. [ 517.159863][T19875] name failslab, interval 1, probability 0, space 0, times 0 03:38:38 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 517.254175][T19875] CPU: 0 PID: 19875 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 517.262139][T19875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.272207][T19875] Call Trace: [ 517.275522][T19875] dump_stack+0x1fb/0x318 [ 517.275558][T19875] should_fail+0x555/0x770 [ 517.284333][T19875] __should_failslab+0x11a/0x160 [ 517.284347][T19875] ? getname_kernel+0x59/0x2f0 [ 517.284359][T19875] should_failslab+0x9/0x20 [ 517.284370][T19875] kmem_cache_alloc+0x56/0x2e0 [ 517.284382][T19875] getname_kernel+0x59/0x2f0 [ 517.284392][T19875] kern_path+0x1f/0x40 [ 517.284402][T19875] blkdev_get_by_path+0x71/0x270 [ 517.284415][T19875] btrfs_scan_one_device+0xbd/0x450 [ 517.284424][T19875] ? btrfs_mount_root+0x477/0x1040 [ 517.284437][T19875] ? trace_hardirqs_on+0x74/0x80 [ 517.332428][T19875] btrfs_mount_root+0x4af/0x1040 [ 517.337383][T19875] ? trace_kfree+0xb2/0x110 [ 517.341898][T19875] legacy_get_tree+0xf9/0x1a0 [ 517.346573][T19875] ? btrfs_control_open+0x40/0x40 [ 517.351602][T19875] vfs_get_tree+0x8b/0x2a0 [ 517.356038][T19875] vfs_kern_mount+0xc2/0x160 [ 517.360657][T19875] btrfs_mount+0x34f/0x18e0 [ 517.365181][T19875] ? check_preemption_disabled+0x47/0x2a0 [ 517.370919][T19875] ? vfs_parse_fs_string+0x13b/0x1a0 [ 517.376230][T19875] ? cap_capable+0x250/0x290 [ 517.380851][T19875] ? safesetid_security_capable+0x89/0xf0 [ 517.386751][T19875] legacy_get_tree+0xf9/0x1a0 [ 517.391437][T19875] ? btrfs_resize_thread_pool+0x290/0x290 [ 517.397272][T19875] vfs_get_tree+0x8b/0x2a0 03:38:38 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) listen(r0, 0x4) 03:38:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 517.401696][T19875] do_mount+0x16c0/0x2510 [ 517.406043][T19875] ? copy_mount_options+0x308/0x3c0 [ 517.411249][T19875] ksys_mount+0xcc/0x100 [ 517.415513][T19875] __x64_sys_mount+0xbf/0xd0 [ 517.415527][T19875] do_syscall_64+0xf7/0x1c0 [ 517.415546][T19875] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.415555][T19875] RIP: 0033:0x45cc6a [ 517.415565][T19875] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 03:38:39 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={r3, @in={{0x2, 0x0, @loopback}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000280)={r3, 0x7, 0x0, 0x0, 0xca66}, &(0x7f00000002c0)=0x18) r5 = socket(0x2000000000000021, 0x0, 0x10000000000002) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x1a, &(0x7f0000000180)={r7, @in={{0x2, 0x0, @loopback}}}, &(0x7f0000000240)=0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000000240)=[{&(0x7f00000006c0)="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", 0x800}, {0x0}], 0x2, &(0x7f0000000500)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2, 0x9, 0x80, r4}}, @dstaddrv6={0x20, 0x84, 0x8, @local}, @sndrcv={0x30, 0x84, 0x1, {0x7c5a, 0xfff, 0x200, 0x5, 0x1, 0x5, 0x0, 0x0, r7}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x7ff}}], 0xa8, 0x800}, 0x80) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000180)={r7, @in={{0x2, 0x4e20}}, 0xcf2c, 0xa4e, 0x4, 0x2, 0x4}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080)={r7, 0x6, 0xffff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000240)={r8, @in6={{0xa, 0x4e21, 0xfffffff9, @empty, 0x2019}}, [0x7, 0x4, 0x3, 0x100, 0x1ff, 0x0, 0x7ff, 0x1, 0xffffffff, 0xffffffff, 0x0, 0x1, 0x7, 0x3, 0x100000001]}, &(0x7f0000000100)=0x100) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 517.415570][T19875] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 517.415578][T19875] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 517.415583][T19875] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 517.415588][T19875] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 517.415593][T19875] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 517.415598][T19875] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:39 executing program 4 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 517.632704][T19898] FAULT_INJECTION: forcing a failure. [ 517.632704][T19898] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 517.653806][T19898] CPU: 0 PID: 19898 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 517.661748][T19898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.672423][T19898] Call Trace: [ 517.675740][T19898] dump_stack+0x1fb/0x318 [ 517.680092][T19898] should_fail+0x555/0x770 [ 517.684532][T19898] should_fail_alloc_page+0x55/0x60 [ 517.689864][T19898] prepare_alloc_pages+0x283/0x460 [ 517.694998][T19898] __alloc_pages_nodemask+0xb2/0x5d0 [ 517.700309][T19898] ? rcu_lock_release+0x26/0x30 [ 517.705168][T19898] alloc_pages_current+0x2db/0x500 [ 517.705182][T19898] __page_cache_alloc+0x7d/0x1e0 [ 517.705195][T19898] do_read_cache_page+0x1f8/0xcb0 [ 517.705208][T19898] read_cache_page_gfp+0x29/0x30 [ 517.705225][T19898] btrfs_scan_one_device+0x16a/0x450 03:38:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) [ 517.715253][T19898] ? trace_hardirqs_on+0x74/0x80 [ 517.715267][T19898] btrfs_mount_root+0x4af/0x1040 [ 517.715283][T19898] ? trace_kfree+0xb2/0x110 [ 517.715296][T19898] legacy_get_tree+0xf9/0x1a0 [ 517.715304][T19898] ? btrfs_control_open+0x40/0x40 [ 517.715315][T19898] vfs_get_tree+0x8b/0x2a0 [ 517.715328][T19898] vfs_kern_mount+0xc2/0x160 [ 517.715338][T19898] btrfs_mount+0x34f/0x18e0 [ 517.715357][T19898] ? check_preemption_disabled+0x47/0x2a0 [ 517.715373][T19898] ? vfs_parse_fs_string+0x13b/0x1a0 [ 517.715386][T19898] ? cap_capable+0x250/0x290 [ 517.783614][T19898] ? safesetid_security_capable+0x89/0xf0 [ 517.789343][T19898] legacy_get_tree+0xf9/0x1a0 [ 517.789357][T19898] ? btrfs_resize_thread_pool+0x290/0x290 [ 517.799742][T19898] vfs_get_tree+0x8b/0x2a0 [ 517.804179][T19898] do_mount+0x16c0/0x2510 [ 517.808550][T19898] ? copy_mount_options+0x308/0x3c0 [ 517.813758][T19898] ksys_mount+0xcc/0x100 [ 517.817998][T19898] __x64_sys_mount+0xbf/0xd0 [ 517.822589][T19898] do_syscall_64+0xf7/0x1c0 [ 517.822604][T19898] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.822614][T19898] RIP: 0033:0x45cc6a [ 517.822627][T19898] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 517.856482][T19898] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 517.864908][T19898] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 517.872895][T19898] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 03:38:39 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r2, 0xc0286415, &(0x7f00000000c0)={&(0x7f0000ffc000/0x2000)=nil, 0x6, 0x4, 0x3, &(0x7f0000ffc000/0x3000)=nil, 0x7}) write$binfmt_elf32(r0, 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r3, r4, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000280)={r4, &(0x7f0000000140)="a980de7c43e95739a7cdba5c7025dba5a728c0bbc0910e4cbae77e98125c3a2d639ceaa130ece738e4143ff723c4f24af1f619adeb45a0d2ab45137496a09a89d6e9a5c265486e0e920120c2e2fc96624eff2f1a7676e5eb2f6655482bcb9aac6f4d3c7bee84bed023", &(0x7f0000000240)=""/10, 0x4}, 0x20) r5 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r5, 0x10e, 0x5, &(0x7f0000000080)=0xed, 0x4) 03:38:39 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:39 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 517.880885][T19898] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 517.888878][T19898] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 517.896859][T19898] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:39 executing program 4 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 518.043160][T19908] FAULT_INJECTION: forcing a failure. [ 518.043160][T19908] name failslab, interval 1, probability 0, space 0, times 0 [ 518.063756][T19908] CPU: 1 PID: 19908 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 518.071707][T19908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.071713][T19908] Call Trace: [ 518.071733][T19908] dump_stack+0x1fb/0x318 [ 518.071746][T19908] should_fail+0x555/0x770 [ 518.071773][T19908] __should_failslab+0x11a/0x160 [ 518.098750][T19908] should_failslab+0x9/0x20 [ 518.098769][T19908] kmem_cache_alloc_trace+0x5d/0x2f0 [ 518.098779][T19908] ? alloc_fs_context+0x65/0x640 [ 518.098790][T19908] alloc_fs_context+0x65/0x640 [ 518.098804][T19908] ? _raw_read_unlock+0x2c/0x50 [ 518.113489][T19908] ? get_fs_type+0x47f/0x500 [ 518.113501][T19908] fs_context_for_mount+0x24/0x30 [ 518.113510][T19908] do_mount+0x10a7/0x2510 [ 518.113526][T19908] ? copy_mount_options+0x308/0x3c0 [ 518.113537][T19908] ksys_mount+0xcc/0x100 [ 518.113549][T19908] __x64_sys_mount+0xbf/0xd0 [ 518.113563][T19908] do_syscall_64+0xf7/0x1c0 [ 518.113581][T19908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.113591][T19908] RIP: 0033:0x45cc6a [ 518.113601][T19908] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 518.113616][T19908] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 518.195457][T19908] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 518.203430][T19908] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 518.211397][T19908] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 518.219365][T19908] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 518.227339][T19908] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:41 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) write(r0, &(0x7f0000000040)="51d2a25bafb376f0b3d540c4d711072f025fa349c7263c874ba41a981e5175947a3807ec92031d935a2642f6ada9c9a419806735557e0ef647a6a07a24466ab2e8dcb25ecc0112d2e8f0b7e9c069", 0x4e) open(0x0, 0x40800, 0x4) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x1, 0x0) recvfrom$ax25(r2, &(0x7f0000000100)=""/148, 0x94, 0xf41a919cf03c801e, &(0x7f0000000240)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) write$binfmt_elf32(r1, 0x0, 0x0) 03:38:41 executing program 4 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:41 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:41 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 520.230973][T19924] FAULT_INJECTION: forcing a failure. [ 520.230973][T19924] name failslab, interval 1, probability 0, space 0, times 0 [ 520.263632][T19924] CPU: 0 PID: 19924 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 520.271578][T19924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.281650][T19924] Call Trace: [ 520.284959][T19924] dump_stack+0x1fb/0x318 [ 520.289307][T19924] should_fail+0x555/0x770 [ 520.293745][T19924] __should_failslab+0x11a/0x160 [ 520.298704][T19924] ? vfs_parse_fs_string+0xed/0x1a0 [ 520.303950][T19924] should_failslab+0x9/0x20 [ 520.308467][T19924] __kmalloc_track_caller+0x79/0x340 [ 520.313760][T19924] kmemdup_nul+0x2a/0xa0 [ 520.318006][T19924] vfs_parse_fs_string+0xed/0x1a0 [ 520.323038][T19924] do_mount+0x11b8/0x2510 [ 520.327398][T19924] ? copy_mount_options+0x308/0x3c0 [ 520.332608][T19924] ksys_mount+0xcc/0x100 [ 520.336851][T19924] __x64_sys_mount+0xbf/0xd0 [ 520.341442][T19924] do_syscall_64+0xf7/0x1c0 [ 520.345946][T19924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.351837][T19924] RIP: 0033:0x45cc6a [ 520.355736][T19924] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 520.375350][T19924] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 520.383775][T19924] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 520.391911][T19924] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 520.399899][T19924] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 520.407889][T19924] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 520.416221][T19924] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:42 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x410}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=@RTM_GETNSID={0x2c, 0x5a, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0xe7e1836a44779bae}, 0x80) getresuid(&(0x7f0000000000), 0x0, 0x0) r1 = getpgrp(0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x1f, 0x3, 0x20, 0x81, 0x0, 0x0, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3eed9754, 0x2, @perf_bp={&(0x7f0000000040), 0x7}, 0x2108, 0x4, 0x6, 0x6, 0xe0bb, 0xd276, 0x5}, r1, 0x4, 0xffffffffffffffff, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r2, r3, 0x0) ioctl$BLKTRACESTOP(r3, 0x1275, 0x0) 03:38:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:38:42 executing program 4 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:42 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 520.591780][T19938] FAULT_INJECTION: forcing a failure. [ 520.591780][T19938] name failslab, interval 1, probability 0, space 0, times 0 [ 520.618232][T19938] CPU: 0 PID: 19938 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 520.626168][T19938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.636251][T19938] Call Trace: [ 520.636269][T19938] dump_stack+0x1fb/0x318 [ 520.636284][T19938] should_fail+0x555/0x770 [ 520.636301][T19938] __should_failslab+0x11a/0x160 [ 520.636311][T19938] ? getname_kernel+0x59/0x2f0 [ 520.636323][T19938] should_failslab+0x9/0x20 [ 520.636334][T19938] kmem_cache_alloc+0x56/0x2e0 [ 520.636345][T19938] getname_kernel+0x59/0x2f0 [ 520.636360][T19938] kern_path+0x1f/0x40 [ 520.653374][T19938] blkdev_get_by_path+0x71/0x270 [ 520.653395][T19938] btrfs_scan_one_device+0xbd/0x450 [ 520.686120][T19938] ? btrfs_mount_root+0x477/0x1040 [ 520.691242][T19938] ? trace_hardirqs_on+0x74/0x80 [ 520.696187][T19938] btrfs_mount_root+0x4af/0x1040 [ 520.701140][T19938] ? trace_kfree+0xb2/0x110 [ 520.705651][T19938] legacy_get_tree+0xf9/0x1a0 [ 520.710329][T19938] ? btrfs_control_open+0x40/0x40 [ 520.715369][T19938] vfs_get_tree+0x8b/0x2a0 [ 520.719798][T19938] vfs_kern_mount+0xc2/0x160 [ 520.724397][T19938] btrfs_mount+0x34f/0x18e0 [ 520.728921][T19938] ? check_preemption_disabled+0x47/0x2a0 [ 520.734661][T19938] ? vfs_parse_fs_string+0x13b/0x1a0 [ 520.739959][T19938] ? cap_capable+0x250/0x290 [ 520.744556][T19938] ? safesetid_security_capable+0x89/0xf0 [ 520.750280][T19938] legacy_get_tree+0xf9/0x1a0 [ 520.754954][T19938] ? btrfs_resize_thread_pool+0x290/0x290 [ 520.760691][T19938] vfs_get_tree+0x8b/0x2a0 [ 520.765129][T19938] do_mount+0x16c0/0x2510 [ 520.769471][T19938] ? copy_mount_options+0x308/0x3c0 [ 520.774671][T19938] ksys_mount+0xcc/0x100 [ 520.778912][T19938] __x64_sys_mount+0xbf/0xd0 [ 520.783501][T19938] do_syscall_64+0xf7/0x1c0 [ 520.788010][T19938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.793902][T19938] RIP: 0033:0x45cc6a [ 520.797795][T19938] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 520.817399][T19938] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 520.825810][T19938] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 520.833775][T19938] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 03:38:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) 03:38:42 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 520.841750][T19938] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 520.849717][T19938] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 520.857685][T19938] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:44 executing program 4 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:44 executing program 0: ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0xfe6) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000080)={0x10000, 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1}, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000040)='security.SMACK64IPOUT\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) setsockopt$rose(r2, 0x104, 0x9418490bcec9773f, &(0x7f0000000140)=0x7f, 0x4) get_thread_area(&(0x7f0000000240)={0x0, 0x20000800, 0x1d62b26adda8aeb0, 0x1, 0x1, 0x1, 0x1}) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000000c0)={'veth0_to_team\x00', {0x2, 0x4e24, @multicast1}}) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r3, r4, 0x0) setsockopt$RDS_RECVERR(r4, 0x114, 0x5, &(0x7f0000000180), 0x4) 03:38:44 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:44 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) [ 523.298002][T19959] FAULT_INJECTION: forcing a failure. [ 523.298002][T19959] name failslab, interval 1, probability 0, space 0, times 0 [ 523.332627][T19959] CPU: 1 PID: 19959 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 523.340567][T19959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.350641][T19959] Call Trace: [ 523.353941][T19959] dump_stack+0x1fb/0x318 [ 523.358279][T19959] should_fail+0x555/0x770 [ 523.362706][T19959] __should_failslab+0x11a/0x160 [ 523.367655][T19959] should_failslab+0x9/0x20 [ 523.372158][T19959] kmem_cache_alloc_trace+0x5d/0x2f0 [ 523.377454][T19959] ? alloc_fs_context+0x65/0x640 [ 523.382410][T19959] alloc_fs_context+0x65/0x640 [ 523.387177][T19959] ? kfree+0x194/0x200 [ 523.391257][T19959] fs_context_for_mount+0x24/0x30 [ 523.396282][T19959] vfs_kern_mount+0x2c/0x160 [ 523.400866][T19959] btrfs_mount+0x34f/0x18e0 [ 523.411369][T19959] ? check_preemption_disabled+0x47/0x2a0 [ 523.417093][T19959] ? vfs_parse_fs_string+0x13b/0x1a0 [ 523.422384][T19959] ? cap_capable+0x250/0x290 [ 523.426981][T19959] ? safesetid_security_capable+0x89/0xf0 [ 523.432709][T19959] legacy_get_tree+0xf9/0x1a0 [ 523.437382][T19959] ? btrfs_resize_thread_pool+0x290/0x290 [ 523.443234][T19959] vfs_get_tree+0x8b/0x2a0 [ 523.448378][T19959] do_mount+0x16c0/0x2510 [ 523.452718][T19959] ? copy_mount_options+0x308/0x3c0 [ 523.457939][T19959] ksys_mount+0xcc/0x100 [ 523.462194][T19959] __x64_sys_mount+0xbf/0xd0 [ 523.466794][T19959] do_syscall_64+0xf7/0x1c0 [ 523.471563][T19959] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 523.477448][T19959] RIP: 0033:0x45cc6a [ 523.481340][T19959] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 523.500953][T19959] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 523.509369][T19959] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 523.517340][T19959] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 523.525308][T19959] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 523.533277][T19959] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 523.541244][T19959] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:45 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:45 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x8040010) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x7}, 0x10) write$binfmt_elf32(r0, 0x0, 0x0) 03:38:45 executing program 4 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:45 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 523.850266][T19981] FAULT_INJECTION: forcing a failure. [ 523.850266][T19981] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 523.863517][T19981] CPU: 0 PID: 19981 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 523.871405][T19981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.881470][T19981] Call Trace: [ 523.884764][T19981] dump_stack+0x1fb/0x318 [ 523.889102][T19981] should_fail+0x555/0x770 [ 523.893527][T19981] should_fail_alloc_page+0x55/0x60 [ 523.898713][T19981] prepare_alloc_pages+0x283/0x460 [ 523.903818][T19981] __alloc_pages_nodemask+0xb2/0x5d0 [ 523.909088][T19981] kmem_getpages+0x4d/0xa00 [ 523.913575][T19981] cache_grow_begin+0x7e/0x2c0 [ 523.918320][T19981] cache_alloc_refill+0x311/0x3f0 [ 523.923326][T19981] ? check_preemption_disabled+0xb7/0x2a0 [ 523.929027][T19981] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 523.934376][T19981] ? btrfs_mount_root+0x1b2/0x1040 [ 523.939478][T19981] btrfs_mount_root+0x1b2/0x1040 [ 523.944396][T19981] ? vfs_parse_fs_string+0x13b/0x1a0 [ 523.949657][T19981] ? rcu_read_lock_sched_held+0x10b/0x170 [ 523.955353][T19981] ? trace_kfree+0xb2/0x110 [ 523.959854][T19981] legacy_get_tree+0xf9/0x1a0 [ 523.964506][T19981] ? btrfs_control_open+0x40/0x40 [ 523.969511][T19981] vfs_get_tree+0x8b/0x2a0 [ 523.973906][T19981] vfs_kern_mount+0xc2/0x160 [ 523.978475][T19981] btrfs_mount+0x34f/0x18e0 [ 523.982959][T19981] ? check_preemption_disabled+0x47/0x2a0 [ 523.989527][T19981] ? vfs_parse_fs_string+0x13b/0x1a0 [ 523.994787][T19981] ? cap_capable+0x250/0x290 [ 523.999357][T19981] ? safesetid_security_capable+0x89/0xf0 [ 524.005054][T19981] legacy_get_tree+0xf9/0x1a0 [ 524.009709][T19981] ? btrfs_resize_thread_pool+0x290/0x290 [ 524.015419][T19981] vfs_get_tree+0x8b/0x2a0 [ 524.019828][T19981] do_mount+0x16c0/0x2510 [ 524.024139][T19981] ? copy_mount_options+0x308/0x3c0 [ 524.029316][T19981] ksys_mount+0xcc/0x100 [ 524.033540][T19981] __x64_sys_mount+0xbf/0xd0 [ 524.038114][T19981] do_syscall_64+0xf7/0x1c0 [ 524.042599][T19981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.048469][T19981] RIP: 0033:0x45cc6a [ 524.052343][T19981] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 524.071926][T19981] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 524.080323][T19981] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 524.088287][T19981] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 03:38:45 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/73) [ 524.096236][T19981] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 524.105052][T19981] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 524.113003][T19981] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:45 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) 03:38:45 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x387}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, r1, 0x1) r2 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000)=0x0, 0x0, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x1) open(0x0, 0x2000, 0x4) write$binfmt_elf32(r2, 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r5 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r4, r5, 0x0) fstat(r2, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r4, r3, r6) syz_mount_image$iso9660(&(0x7f0000000400)='iso9660\x00', &(0x7f0000000440)='./file0\x00', 0xfff, 0x7, &(0x7f0000001900)=[{&(0x7f0000000480)="9f0416200d960d36894d91d4a1c62a1e8905f3192d5c94423ee181d01d6d71c5a04e282cd2a887c78f397df4efa52d23057e91a8c1baa6469751c606c22efb6678e92e185eaf5ae5d79efe862db7f7edb2f50d3318f4b625b739b86bceaa242b899ebf817a587adb35b5b5cef265124048", 0x71, 0x1}, {&(0x7f00000005c0)="fcc90dd81c48392002ae6079bb3f10ff001c857455adacf0834c1447352fe6457d8ca2e531c8762b6c8dec3f095ae8ae57dd639c2ebf37dc1697ebfa2b6c02c4dcdfdd8ec5557eb29063a3660360ac7281ca746c1ee568424835e19bf94469a78e8b390c678e0b411bb8c98f12284d236e5cbf070e99fc0915772cb9bf763c270721afcc68db79da327a0f32b87b7dfc961101cfa646cc70072245f605839b6240fee3767cc0249ef44a1419b5430fe41b44a26e6a0b1688c35443172a609cc1c28a5721726f9fd2e1f968b0c12b9e4a166a3c7ce953398d087dc0ea287772a5572d3b314a5e846d25b8", 0xea, 0x2}, {&(0x7f00000006c0)="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", 0x1000, 0x3}, {&(0x7f00000016c0)="eeffee46f5db54002ea939ce316fe4c118bd9ea4a3b596d96f9d9c6b764b94f7efb45aba4ce1d5d1c15be3174f27f19c24d7021d8f5feb54442bb826ddcdcb840e5f3a26e31435045bbf661cf6cba2b10ee792f9a2114428c4d2148cecb42aaa9f2eca4eeec00a3b577bf494d497bb615ec39e4c29b3137594e8fc4611f60ffba1b79c93fbffd7c097239e245f4efed1d7", 0x91, 0x3}, {&(0x7f0000001780)="81a2cb1efccd73d4d5a1a49e087ff03a91eb4177bcea75231850ce896f7e62162653e2c3d6f2c2cdafbf2234581314bc6af10c3cf5990adb7271de28a5aa815e70c86c7353ace45b6d81a34f4bf2f4378a1791096f4f666de4abac6d1889bba955225b540a80954854c0d9da53b805f0e6be05e3728e4db5b3d4aac3fabe62581c3ac64e5924dacf271393944b99f10742649d6cd0b85067b24c6834a3d9fbf32d3ce4d6e419f50af00e11b491d4bd3831fa", 0xb2, 0x1ff}, {&(0x7f0000001840)="58300be902f24cdb6acc0321bf481d197d2dceb58abbce68bca3cbffc2047668c2eb50f0555a0428995cc57a95a68b6fe44adf2e693f62a49ffc6ea7a5ece02d52dcd55597cd34c49b3cac271ffe82bdea7eb83c50357037b775f6af2b40d89a8c8780b51c9c2025fcf10523874e3976d2d4fcbc49ac85dddb997a10f5dfe4842445ba7c6d29eaed429fb4e436d65afd64fe8d0c2f3efa35a9785ee183fa56f7531a9f581c4d70ae508a4af70d74eea10d6a55", 0xb3, 0x1000}, {&(0x7f0000000500)="b44d3b57c266d90e", 0x8, 0xffffffffffffffff}], 0x4, &(0x7f00000019c0)={[{@block={'block', 0x3d, 0x400}}], [{@appraise='appraise'}]}) r7 = dup3(r2, 0xffffffffffffffff, 0x80000) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r7, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x170, r8, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100}]}, @TIPC_NLA_MEDIA={0x9c, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xcaa}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_MEDIA={0x84, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc479}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x84040}, 0x60020000) 03:38:45 executing program 4 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:45 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 524.358941][T19998] FAULT_INJECTION: forcing a failure. [ 524.358941][T19998] name failslab, interval 1, probability 0, space 0, times 0 [ 524.384383][T19998] CPU: 0 PID: 19998 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 524.392670][T19998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.402736][T19998] Call Trace: [ 524.406040][T19998] dump_stack+0x1fb/0x318 [ 524.410380][T19998] should_fail+0x555/0x770 [ 524.414822][T19998] __should_failslab+0x11a/0x160 [ 524.419778][T19998] ? getname_kernel+0x59/0x2f0 [ 524.424547][T19998] should_failslab+0x9/0x20 [ 524.429055][T19998] kmem_cache_alloc+0x56/0x2e0 [ 524.433829][T19998] getname_kernel+0x59/0x2f0 [ 524.438427][T19998] kern_path+0x1f/0x40 [ 524.442505][T19998] blkdev_get_by_path+0x71/0x270 [ 524.447455][T19998] btrfs_get_bdev_and_sb+0x48/0x280 [ 524.452663][T19998] open_fs_devices+0x14d/0xb40 [ 524.457451][T19998] ? list_sort+0x5fc/0x860 [ 524.461869][T19998] ? btrfs_open_devices+0x1b0/0x1b0 [ 524.467074][T19998] btrfs_open_devices+0x11d/0x1b0 [ 524.472100][T19998] btrfs_mount_root+0x6ef/0x1040 [ 524.477043][T19998] ? trace_kfree+0xb2/0x110 [ 524.481550][T19998] legacy_get_tree+0xf9/0x1a0 [ 524.486226][T19998] ? btrfs_control_open+0x40/0x40 [ 524.491253][T19998] vfs_get_tree+0x8b/0x2a0 [ 524.495675][T19998] vfs_kern_mount+0xc2/0x160 [ 524.500282][T19998] btrfs_mount+0x34f/0x18e0 [ 524.504795][T19998] ? check_preemption_disabled+0x47/0x2a0 [ 524.510531][T19998] ? vfs_parse_fs_string+0x13b/0x1a0 [ 524.515835][T19998] ? cap_capable+0x250/0x290 [ 524.520455][T19998] ? safesetid_security_capable+0x89/0xf0 [ 524.526196][T19998] legacy_get_tree+0xf9/0x1a0 [ 524.531004][T19998] ? btrfs_resize_thread_pool+0x290/0x290 [ 524.536742][T19998] vfs_get_tree+0x8b/0x2a0 [ 524.541170][T19998] do_mount+0x16c0/0x2510 [ 524.545515][T19998] ? copy_mount_options+0x308/0x3c0 [ 524.550808][T19998] ksys_mount+0xcc/0x100 [ 524.555061][T19998] __x64_sys_mount+0xbf/0xd0 [ 524.559661][T19998] do_syscall_64+0xf7/0x1c0 [ 524.564172][T19998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.570064][T19998] RIP: 0033:0x45cc6a [ 524.573961][T19998] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 524.593675][T19998] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 524.602092][T19998] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 524.610069][T19998] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 524.618054][T19998] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 524.626030][T19998] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 524.634472][T19998] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:46 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:48 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:48 executing program 4 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:48 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=0x0}) 03:38:48 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r2, r3, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r5, 0xee00) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)=0x0) setreuid(r5, r6) sendmsg$nl_generic(r3, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x188, 0x23, 0x200, 0x70bd26, 0x25dfdbfd, {0x1}, [@generic="6f09cbc981a2d0f81c028d351a6c81ac1425fa", @nested={0x128, 0xd, [@generic="ff0c611a9732e3ac0fbb9480bd819c15", @typed={0xc, 0x8e, @u64}, @typed={0x8, 0x94, @uid=r6}, @typed={0x8, 0x48, @fd=r0}, @generic="2f4c45771376ab6463a4107cedb709fe1a69f687d0a0048b7eeab61632402243c905efac58173d202ed20096f9da1bbbb87402dff521fe4b82a8ee5b51af5feb69a46638d75329047d2a3ce3fd8644dab4153f60721bcd168e446a79be5d2809a0c0cd903c01fc96ec4ef003eb6354ad44b55e63b6eae7d423b6788cd46a357554ddf5a69511f12ab412a0dd29489aa2f35cb167b9ee4ca13ea03ac6f683b2f7d6c918f199c774a95a63f97553a7502097272e6523e32a44a503fa8522e3e49951ccb6c9422ad73787afddcd7ae291387387aff646723b8b6c7d32018e43e7992024c9c070177641ce8b5114c7ba55a04be4652b6df3f6d2"]}, @generic="415cf66b882c0b2ba146edbe984da6b666aeac7f2fc52db4bdaaa2e8d428847c09562df0a5f5a60f4b34665c118485ec1c536137fc3351d685"]}, 0x188}, 0x1, 0x0, 0x0, 0x40}, 0x4000021) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) r9 = dup3(r7, r8, 0x0) r10 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_LOCK(r12, 0x4008642a, &(0x7f00000001c0)={r13}) ioctl$DRM_IOCTL_RM_CTX(r9, 0xc0086421, &(0x7f0000000040)={r13}) r14 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r10, r14, 0x0) sendmsg(r1, 0x0, 0x4000000) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r1, 0x0, 0x0) 03:38:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 526.657773][T20020] FAULT_INJECTION: forcing a failure. [ 526.657773][T20020] name failslab, interval 1, probability 0, space 0, times 0 [ 526.708325][T20020] CPU: 0 PID: 20020 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 526.716264][T20020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 526.726321][T20020] Call Trace: [ 526.729621][T20020] dump_stack+0x1fb/0x318 [ 526.734054][T20020] should_fail+0x555/0x770 [ 526.738476][T20020] __should_failslab+0x11a/0x160 [ 526.743415][T20020] should_failslab+0x9/0x20 [ 526.747922][T20020] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 526.753640][T20020] ? __kmalloc_node+0x3c/0x60 [ 526.758310][T20020] ? smack_sb_eat_lsm_opts+0x867/0xa20 [ 526.763779][T20020] __kmalloc_node+0x3c/0x60 [ 526.768281][T20020] kvmalloc_node+0xcc/0x130 [ 526.773224][T20020] btrfs_mount_root+0xe3/0x1040 [ 526.778074][T20020] ? vfs_parse_fs_string+0x13b/0x1a0 [ 526.783365][T20020] ? rcu_read_lock_sched_held+0x10b/0x170 [ 526.789075][T20020] ? trace_kfree+0xb2/0x110 [ 526.793569][T20020] legacy_get_tree+0xf9/0x1a0 [ 526.798247][T20020] ? btrfs_control_open+0x40/0x40 [ 526.803280][T20020] vfs_get_tree+0x8b/0x2a0 [ 526.807720][T20020] vfs_kern_mount+0xc2/0x160 [ 526.812320][T20020] btrfs_mount+0x34f/0x18e0 [ 526.816833][T20020] ? check_preemption_disabled+0x47/0x2a0 [ 526.822568][T20020] ? vfs_parse_fs_string+0x13b/0x1a0 [ 526.827860][T20020] ? cap_capable+0x250/0x290 [ 526.832460][T20020] ? safesetid_security_capable+0x89/0xf0 [ 526.838180][T20020] legacy_get_tree+0xf9/0x1a0 [ 526.842854][T20020] ? btrfs_resize_thread_pool+0x290/0x290 [ 526.848569][T20020] vfs_get_tree+0x8b/0x2a0 [ 526.852982][T20020] do_mount+0x16c0/0x2510 [ 526.857310][T20020] ? copy_mount_options+0x308/0x3c0 [ 526.862519][T20020] ksys_mount+0xcc/0x100 [ 526.866763][T20020] __x64_sys_mount+0xbf/0xd0 [ 526.871356][T20020] do_syscall_64+0xf7/0x1c0 [ 526.875862][T20020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.881741][T20020] RIP: 0033:0x45cc6a [ 526.885632][T20020] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 03:38:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 526.905248][T20020] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 526.913687][T20020] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 526.921670][T20020] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 526.929652][T20020] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 526.937617][T20020] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 526.937623][T20020] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:38:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=0x0}) 03:38:48 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:48 executing program 4 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:48 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:48 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x5, 0x8040) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={r4, @in={{0x2, 0x0, @loopback}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000280)={r4, 0x7, 0x0, 0x0, 0xca66}, &(0x7f00000002c0)=0x18) r6 = socket(0x2000000000000021, 0x0, 0x10000000000002) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x1a, &(0x7f0000000180)={r8, @in={{0x2, 0x0, @loopback}}}, &(0x7f0000000240)=0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000000240)=[{&(0x7f00000006c0)="cf837d38848479e1a4306c98b958d96b7fec7b65484797f27f7d3c53aa81d18bdc8105c2f9c00fdd5f7b5a3453b1e28c655e6209018366fbb5e648f0e787ad2deac8a94a11eacdbfab4c49cf1ba86b7690e5b7195fe3ae2bd26737e6802d6f5b70411163daa0234df9cbdd164a891c35af3c0859c22c3202fcdf1c739c1e10f9d861c9b217a7f2ad4d8a58e836f938c00212419fe6d3644e0dc5abe2a66d8c7fe82f442bd73fd46bfcabf9315126547f7f42adbffa4f8d2352a7bd1a80da57e2c58739f5e4a767cb5bd71f816e81e2322e03cb04e391564cd4823403110c455e3e771bf4c65cc3e5e72a1798b8d517eeb763c1160fdb857ad44b3fded7ecc64257f8493cf2c9aebbfbede56adb96a4f9859febc937ae637617595908db334b1eb27fb71daa01699e9d1344e254d165d1b7b67ba5858145bbd81a78ec1885dbe96af25449937955ebd3ecc208001391a1ea9f1e0b2821d6cf34395a45bb4e7c11c842e3f208d9796994cbe6f249de84181dc5271ce01bccfd875a5564d9c1da425c2e8b44808b044459d3148666fe5e8fb6fbc643b5ffbae86e944aa671931f5ea007dbb3698b50e7afbeb812a0eaaf80b76127d935fbbae64b39d17c380f85d09a4c6c8c034316b904d66a98107e8846ab1a4483e0db458c3fa3693b2738756c4cd44f57c1f2fbc956ceaed90ff5bfa80f96d5a80ac5596492523e0ae12017415dfaf8e3a178276646d7183fca088f80cb914f239bdccc32db925274d46614f7bffb8fafb4c55fe2815f8fd0bb35af614c385dbd8646a2d865b732647f86b1fd11cbef8cc84b1e323e4e578627fc336703a688c109d369a5e4cb9820aef5e1612567d8a28fa1027a00a0d1149e94b9fcfe44a72c399fccf8e6d01e91731b696199228820dcf0f92c79e28fa916bc4d3fa1be378cc8e686b92ba2c4fc0e142c49586046d72e82bf6634b764664edc09af4458203b9617b7234ee7a5393f10461fc1c8c402795949b3b2294f1b055545350da3a52eb936461399204a07b7207861a875cc5b2ad3889316988ca0355ff9777e8d74362a2541088f02b155479c74a8d754c1ade8de3156108b83903036a097830bb9f3322f9b790d03f1981a21eb5508058734cb03a72809fb13c0f5b69942fa8b0073400a113364b563a0dd0094edd8682d2419492b8a027d50eb3996756860d3e2ff684ec5f37e7d2d2f73ed3e8a5f4de27b8ab88f6593c93573b752ee670110311051f2181ad35aa8ad48e9b36b7cb562522ea23d690c2ab27262d9ed211815c70ea122abd146f1cea72ff2a5b832f507cb051ed25aa6eeabc410a0b616e8766b6ff80452f39f8ffd1fb4cbeed2f2284a291410804cee35d9ee17c42863e5e8e5a51e4557d10d088d29dde097a16398e826b9bd7ba0e6ada7b10516b02e5d6eb8825be5bbf727613efd3355be9a7e5a41ddc27b0df1c64714513ff61d2c09ff2df7a8a2c57c8fe107bc9fb6063be3ef98bd3749e9a050789c0117a268976f4d8867101090e6cc73363bf96b23e51749e2c1663cd36802138e73969da9a383ad1038e973adbddc4188320c50d7d36259b684778fb40ccb96bdf837036d0a1baf707e5757ea6af7e53d09dacc49ae6290c0e5d5b0d5997a632b64e2f74a00a4da72e898d07ba3213e8e32f913d6feec08a29059c054e9209e78f5a36259a95ebab6119e6fc3b6253f0f59b9f201db7dc119fa11fb7f539371a49bb46dc8ec16995483c8e109661d0cc64d098026c2856e09c1951771d0b39cb2a3e62b20395f9b24b00c4077a742aaaab6c6315f088ea446e6051a4bf0af8cc78dda3d0502f29f95d8f5799e5bd86b8154628516def4ce02a650f15678a5dffd0d11e4eb14de891e52f47d5c82c19b7f54228f04100c3ca8b23b98a3a77f58146c9bf3e3a2738c7f0de6a744626ab368d60f0a4581f7455af9171ac9bd4960d1b968ace85bde1c4ce9b31309c20fbc2ed71a2358760fa3e43b81fe7ff4660ba633c0730e433a620301f0e6e43a4fde04086577e52368d1fe8c31c45a7e217229c7c86e7b37d1cf070adf1eb4d2674dcdece2e2edb9f6413541c92ed456805bb2c6aba85902ebafd16bed2a1553ad3c1fec8568d945a278ec8226064b1590cf7f2926f6a13fd84d7cabe441e9b8c28244e1958ce3522f67662acfdf9a1d95ed6ebb567c48487ff9133eeb580eea80adab7c59c910f72a3dc8aae875c68c91b25a98198ae9fcc7da7320eca7c363803309daeda9854facc6afd810701d422f684d856ad2bd627fc5bf0498f690cb08bd5647c1598e62fcb5694188f3980baa7e05a8cd2c364f80253c039bdd97599f501c716f6fe7cc4a77d984329cb35a3bacbe467a82bac8c3980bf44c12e54c679d47a09ee459268d1d246a3dc34fe64dde519aa60e1a69d1790ae7ffdf8237bfa9a43518a041de9187537f99942a7f68244605ef50ed096967bf8d98b398cc3cbe658c93f457bc93ac95a71bc2c490b6d8a102e4d0687d1f15618553a2a96c531f02783cfdf58e477aded56b382a09573b78e843ee35420de67804999395c05ca54628ae5857c50a98f4243a6aaba15c244860e921b526917ec1918bf2dce39858ff6418404d6e6bd19c09385e78760032d6ef050de2e5ead177bc1887175fedda1f13b7cadb4c06c5acc41fe3e63f57d04b3084c65b8102918e5ebb274f71772bd3672ee40b2b1d82cc8cf5f1553c399c5e2e565b83c55568c9ce018e1e75f5ba00e1d57e92c7056c4a468defb964a47b09e2948286ccb20c2a0a118126b99ab6b461a5ec8f12ae2c722102c99dcb9891620ce201fb20fade700693a3563a3c97fb602948c7fcac4da2418b18a8ffd8e3f12600a238911f97ad858efffd136ebbe10679c9f3d0", 0x800}, {0x0}], 0x2, &(0x7f0000000500)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2, 0x9, 0x80, r5}}, @dstaddrv6={0x20, 0x84, 0x8, @local}, @sndrcv={0x30, 0x84, 0x1, {0x7c5a, 0xfff, 0x200, 0x5, 0x1, 0x5, 0x0, 0x0, r8}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x7ff}}], 0xa8, 0x800}, 0x80) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000180)={r8, @in={{0x2, 0x4e20}}, 0xcf2c, 0xa4e, 0x2, 0xcd, 0x4}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000080)={r8, 0x72, "89dd079e8c8082dc9dd678c3d1f636ccc1ec4b8cfb3cace94e61d9873e87e86db34ff8dab1bfa70c43f8bc90f8fb04abde40690127a814924365c50db438f17e51b71e235749ef3859aa9e1dbd4c6ff1afb9102d1381da779c2e0c87847394d908c16d94dab95934c7ea0d5c1b311d170f0d"}, &(0x7f0000000100)=0x7a) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) r9 = socket(0x5, 0x4, 0x81) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r9) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:38:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 527.272621][T20048] FAULT_INJECTION: forcing a failure. [ 527.272621][T20048] name failslab, interval 1, probability 0, space 0, times 0 [ 527.393845][T20048] CPU: 0 PID: 20048 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 527.401807][T20048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.411868][T20048] Call Trace: [ 527.415169][T20048] dump_stack+0x1fb/0x318 [ 527.419514][T20048] should_fail+0x555/0x770 [ 527.423948][T20048] __should_failslab+0x11a/0x160 [ 527.428889][T20048] should_failslab+0x9/0x20 [ 527.433388][T20048] kmem_cache_alloc_trace+0x5d/0x2f0 [ 527.438652][T20048] ? btrfs_mount_root+0x12c/0x1040 [ 527.443746][T20048] btrfs_mount_root+0x12c/0x1040 [ 527.448685][T20048] ? vfs_parse_fs_string+0x13b/0x1a0 [ 527.453965][T20048] ? rcu_read_lock_sched_held+0x10b/0x170 [ 527.459668][T20048] ? trace_kfree+0xb2/0x110 [ 527.464151][T20048] legacy_get_tree+0xf9/0x1a0 [ 527.468822][T20048] ? btrfs_control_open+0x40/0x40 [ 527.473826][T20048] vfs_get_tree+0x8b/0x2a0 [ 527.478250][T20048] vfs_kern_mount+0xc2/0x160 [ 527.482819][T20048] btrfs_mount+0x34f/0x18e0 [ 527.487306][T20048] ? check_preemption_disabled+0x47/0x2a0 [ 527.493008][T20048] ? vfs_parse_fs_string+0x13b/0x1a0 [ 527.498270][T20048] ? cap_capable+0x250/0x290 [ 527.502838][T20048] ? safesetid_security_capable+0x89/0xf0 [ 527.508604][T20048] legacy_get_tree+0xf9/0x1a0 [ 527.513298][T20048] ? btrfs_resize_thread_pool+0x290/0x290 [ 527.519007][T20048] vfs_get_tree+0x8b/0x2a0 [ 527.523405][T20048] do_mount+0x16c0/0x2510 [ 527.527718][T20048] ? copy_mount_options+0x308/0x3c0 [ 527.532908][T20048] ksys_mount+0xcc/0x100 [ 527.537142][T20048] __x64_sys_mount+0xbf/0xd0 [ 527.541717][T20048] do_syscall_64+0xf7/0x1c0 [ 527.546198][T20048] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 527.552065][T20048] RIP: 0033:0x45cc6a [ 527.555939][T20048] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 527.576564][T20048] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 527.584953][T20048] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a 03:38:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:49 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x40000, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000080)={0x61, "26a3d38feef67073bdb557bd6912d40c335edd5beddf68c7914473c34e80e38d3efa06ffe410f73da2a00ca9942c8333f9c3f44dd0803c4a281554770908c53185a727ab5f95ef08655eb616b7d9c17364c65d393f502c8d1e2913450d3cbf619e"}) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) connect$bt_sco(r2, &(0x7f0000000140)={0x1f, {0x88, 0x4, 0x6, 0x43, 0x40, 0x2}}, 0x8) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 527.592903][T20048] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 527.600852][T20048] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 527.608801][T20048] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 527.616751][T20048] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:49 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:49 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000001080)="0f3a0f7f0dbdbaf80c66b8be0f9d8a66efbafc0ced0f01c9ba430066edf30fb23e00006426660f383390ffff3636660ff48a0400baa10066ed0f7928baf80c66b8ecac648866efbafc0c66b80a00000066ef", 0x52}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=0x0}) 03:38:49 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) getresuid(&(0x7f0000000000), 0x0, 0x0) getcwd(&(0x7f0000000040)=""/212, 0xd4) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:38:49 executing program 4 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 528.117665][T20090] FAULT_INJECTION: forcing a failure. [ 528.117665][T20090] name failslab, interval 1, probability 0, space 0, times 0 [ 528.131240][T20090] CPU: 1 PID: 20090 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 528.139157][T20090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.149220][T20090] Call Trace: [ 528.152529][T20090] dump_stack+0x1fb/0x318 [ 528.156881][T20090] should_fail+0x555/0x770 [ 528.161309][T20090] __should_failslab+0x11a/0x160 [ 528.161331][T20090] ? getname_kernel+0x59/0x2f0 [ 528.161344][T20090] should_failslab+0x9/0x20 [ 528.161357][T20090] kmem_cache_alloc+0x56/0x2e0 [ 528.161375][T20090] getname_kernel+0x59/0x2f0 [ 528.175555][T20090] kern_path+0x1f/0x40 [ 528.175570][T20090] blkdev_get_by_path+0x71/0x270 [ 528.175586][T20090] btrfs_get_bdev_and_sb+0x48/0x280 [ 528.175599][T20090] open_fs_devices+0x14d/0xb40 [ 528.175614][T20090] ? list_sort+0x5fc/0x860 [ 528.175625][T20090] ? btrfs_open_devices+0x1b0/0x1b0 [ 528.175639][T20090] btrfs_open_devices+0x11d/0x1b0 [ 528.175653][T20090] btrfs_mount_root+0x6ef/0x1040 [ 528.175669][T20090] ? trace_kfree+0xb2/0x110 [ 528.227870][T20090] legacy_get_tree+0xf9/0x1a0 [ 528.232543][T20090] ? btrfs_control_open+0x40/0x40 [ 528.237566][T20090] vfs_get_tree+0x8b/0x2a0 [ 528.241982][T20090] vfs_kern_mount+0xc2/0x160 [ 528.246572][T20090] btrfs_mount+0x34f/0x18e0 [ 528.251082][T20090] ? check_preemption_disabled+0x47/0x2a0 [ 528.256808][T20090] ? vfs_parse_fs_string+0x13b/0x1a0 [ 528.262088][T20090] ? cap_capable+0x250/0x290 [ 528.266674][T20090] ? safesetid_security_capable+0x89/0xf0 [ 528.272394][T20090] legacy_get_tree+0xf9/0x1a0 [ 528.277069][T20090] ? btrfs_resize_thread_pool+0x290/0x290 [ 528.282787][T20090] vfs_get_tree+0x8b/0x2a0 [ 528.287201][T20090] do_mount+0x16c0/0x2510 [ 528.291531][T20090] ? copy_mount_options+0x308/0x3c0 [ 528.296724][T20090] ksys_mount+0xcc/0x100 [ 528.300967][T20090] __x64_sys_mount+0xbf/0xd0 [ 528.305556][T20090] do_syscall_64+0xf7/0x1c0 [ 528.310058][T20090] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.315948][T20090] RIP: 0033:0x45cc6a [ 528.320044][T20090] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 528.339642][T20090] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 528.348049][T20090] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 528.356016][T20090] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 03:38:49 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:49 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040)={0x5}, 0x1) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) [ 528.363985][T20090] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 528.371950][T20090] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 528.379914][T20090] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:50 executing program 4 (fault-call:0 fault-nth:80): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:50 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 528.600906][T20102] FAULT_INJECTION: forcing a failure. [ 528.600906][T20102] name failslab, interval 1, probability 0, space 0, times 0 [ 528.639163][T20102] CPU: 1 PID: 20102 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 528.647103][T20102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.657167][T20102] Call Trace: [ 528.660474][T20102] dump_stack+0x1fb/0x318 [ 528.664826][T20102] should_fail+0x555/0x770 [ 528.669264][T20102] __should_failslab+0x11a/0x160 [ 528.674220][T20102] ? mempool_alloc_slab+0x4d/0x70 [ 528.679261][T20102] should_failslab+0x9/0x20 [ 528.683781][T20102] kmem_cache_alloc+0x56/0x2e0 [ 528.688569][T20102] mempool_alloc_slab+0x4d/0x70 [ 528.693440][T20102] ? mempool_free+0x350/0x350 [ 528.698125][T20102] mempool_alloc+0x104/0x5e0 [ 528.702739][T20102] bio_alloc_bioset+0x1c0/0x5e0 [ 528.707611][T20102] submit_bh_wbc+0x1d5/0x700 [ 528.712218][T20102] block_read_full_page+0x9de/0xbd0 [ 528.717437][T20102] ? blkdev_direct_IO+0xd0/0xd0 [ 528.722287][T20102] ? lru_cache_add+0x2db/0x3b0 [ 528.727068][T20102] ? add_to_page_cache_lru+0x2d4/0x4a0 [ 528.732791][T20102] blkdev_readpage+0x1c/0x20 [ 528.737387][T20102] do_read_cache_page+0x798/0xcb0 [ 528.742420][T20102] read_cache_page_gfp+0x29/0x30 [ 528.747365][T20102] btrfs_scan_one_device+0x16a/0x450 [ 528.752660][T20102] ? trace_hardirqs_on+0x74/0x80 [ 528.757612][T20102] btrfs_mount_root+0x4af/0x1040 [ 528.762559][T20102] ? trace_kfree+0xb2/0x110 [ 528.767070][T20102] legacy_get_tree+0xf9/0x1a0 [ 528.771743][T20102] ? btrfs_control_open+0x40/0x40 [ 528.776776][T20102] vfs_get_tree+0x8b/0x2a0 [ 528.781207][T20102] vfs_kern_mount+0xc2/0x160 [ 528.785811][T20102] btrfs_mount+0x34f/0x18e0 [ 528.790331][T20102] ? check_preemption_disabled+0x47/0x2a0 [ 528.796179][T20102] ? vfs_parse_fs_string+0x13b/0x1a0 [ 528.801470][T20102] ? cap_capable+0x250/0x290 [ 528.806072][T20102] ? safesetid_security_capable+0x89/0xf0 [ 528.811801][T20102] legacy_get_tree+0xf9/0x1a0 [ 528.816479][T20102] ? btrfs_resize_thread_pool+0x290/0x290 [ 528.822209][T20102] vfs_get_tree+0x8b/0x2a0 [ 528.826629][T20102] do_mount+0x16c0/0x2510 [ 528.830971][T20102] ? copy_mount_options+0x308/0x3c0 [ 528.836173][T20102] ksys_mount+0xcc/0x100 [ 528.840434][T20102] __x64_sys_mount+0xbf/0xd0 [ 528.845133][T20102] do_syscall_64+0xf7/0x1c0 [ 528.849645][T20102] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.855545][T20102] RIP: 0033:0x45cc6a [ 528.859435][T20102] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 528.879044][T20102] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 528.887459][T20102] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a 03:38:50 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 528.895442][T20102] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 528.903420][T20102] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 528.911408][T20102] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 528.919390][T20102] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:50 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x70, 0x9c, 0x7, 0xc7, 0x7, 0x0, 0xffffffff00000000, 0x81002, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x28, 0x2, @perf_bp={&(0x7f00000000c0), 0x1}, 0x0, 0xdbc, 0x8, 0x0, 0x8, 0xfffffff7, 0x7f}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x6) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, r2, 0x1) r3 = socket(0x1e, 0x1, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x1) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x40a001, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r5, r6, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r6, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x40000) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r3, 0x0, 0x0) 03:38:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000001c0)={0x0}) ioctl$MON_IOCG_STATS(r0, 0x80089203, 0x0) r1 = getpid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) 03:38:50 executing program 4 (fault-call:0 fault-nth:81): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 529.128573][T20117] FAULT_INJECTION: forcing a failure. [ 529.128573][T20117] name failslab, interval 1, probability 0, space 0, times 0 [ 529.143798][T20117] CPU: 0 PID: 20117 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 529.151725][T20117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.161787][T20117] Call Trace: [ 529.165085][T20117] dump_stack+0x1fb/0x318 [ 529.169436][T20117] should_fail+0x555/0x770 [ 529.173864][T20117] __should_failslab+0x11a/0x160 [ 529.178810][T20117] should_failslab+0x9/0x20 [ 529.183311][T20117] kmem_cache_alloc_trace+0x5d/0x2f0 [ 529.188600][T20117] ? btrfs_mount_root+0x1b2/0x1040 [ 529.193714][T20117] btrfs_mount_root+0x1b2/0x1040 [ 529.198652][T20117] ? vfs_parse_fs_string+0x13b/0x1a0 [ 529.203931][T20117] ? rcu_read_lock_sched_held+0x10b/0x170 [ 529.209650][T20117] ? trace_kfree+0xb2/0x110 [ 529.214158][T20117] legacy_get_tree+0xf9/0x1a0 [ 529.218832][T20117] ? btrfs_control_open+0x40/0x40 [ 529.223858][T20117] vfs_get_tree+0x8b/0x2a0 [ 529.228275][T20117] vfs_kern_mount+0xc2/0x160 [ 529.232863][T20117] btrfs_mount+0x34f/0x18e0 [ 529.237370][T20117] ? check_preemption_disabled+0x47/0x2a0 [ 529.243094][T20117] ? vfs_parse_fs_string+0x13b/0x1a0 [ 529.248375][T20117] ? cap_capable+0x250/0x290 [ 529.252984][T20117] ? safesetid_security_capable+0x89/0xf0 [ 529.258724][T20117] legacy_get_tree+0xf9/0x1a0 [ 529.263406][T20117] ? btrfs_resize_thread_pool+0x290/0x290 [ 529.269140][T20117] vfs_get_tree+0x8b/0x2a0 [ 529.273556][T20117] do_mount+0x16c0/0x2510 [ 529.277888][T20117] ? copy_mount_options+0x308/0x3c0 [ 529.283213][T20117] ksys_mount+0xcc/0x100 [ 529.287458][T20117] __x64_sys_mount+0xbf/0xd0 [ 529.292052][T20117] do_syscall_64+0xf7/0x1c0 [ 529.296555][T20117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 529.302441][T20117] RIP: 0033:0x45cc6a [ 529.306332][T20117] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 529.326281][T20117] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 529.334691][T20117] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 529.342661][T20117] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 529.350634][T20117] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 529.358601][T20117] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 529.366570][T20117] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:52 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:52 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:52 executing program 4 (fault-call:0 fault-nth:82): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:52 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:38:52 executing program 5: 03:38:52 executing program 5: [ 530.994654][T20126] FAULT_INJECTION: forcing a failure. [ 530.994654][T20126] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 531.031563][T20126] CPU: 1 PID: 20126 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 531.039500][T20126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.039506][T20126] Call Trace: [ 531.039524][T20126] dump_stack+0x1fb/0x318 [ 531.039540][T20126] should_fail+0x555/0x770 [ 531.039557][T20126] should_fail_alloc_page+0x55/0x60 [ 531.039566][T20126] prepare_alloc_pages+0x283/0x460 [ 531.039581][T20126] __alloc_pages_nodemask+0xb2/0x5d0 [ 531.039593][T20126] ? rcu_lock_release+0x26/0x30 [ 531.039611][T20126] alloc_pages_current+0x2db/0x500 [ 531.039623][T20126] __page_cache_alloc+0x7d/0x1e0 [ 531.039636][T20126] do_read_cache_page+0x1f8/0xcb0 [ 531.039651][T20126] read_cache_page_gfp+0x29/0x30 [ 531.039661][T20126] btrfs_scan_one_device+0x16a/0x450 [ 531.039675][T20126] ? trace_hardirqs_on+0x74/0x80 [ 531.057352][T20126] btrfs_mount_root+0x4af/0x1040 [ 531.057373][T20126] ? trace_kfree+0xb2/0x110 [ 531.057389][T20126] legacy_get_tree+0xf9/0x1a0 [ 531.057398][T20126] ? btrfs_control_open+0x40/0x40 [ 531.057412][T20126] vfs_get_tree+0x8b/0x2a0 [ 531.057424][T20126] vfs_kern_mount+0xc2/0x160 03:38:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 531.057437][T20126] btrfs_mount+0x34f/0x18e0 [ 531.145713][T20126] ? check_preemption_disabled+0x47/0x2a0 [ 531.151444][T20126] ? vfs_parse_fs_string+0x13b/0x1a0 [ 531.151456][T20126] ? cap_capable+0x250/0x290 [ 531.151468][T20126] ? safesetid_security_capable+0x89/0xf0 [ 531.151489][T20126] legacy_get_tree+0xf9/0x1a0 [ 531.151499][T20126] ? btrfs_resize_thread_pool+0x290/0x290 [ 531.151515][T20126] vfs_get_tree+0x8b/0x2a0 [ 531.167079][T20126] do_mount+0x16c0/0x2510 [ 531.167096][T20126] ? copy_mount_options+0x308/0x3c0 03:38:52 executing program 5: [ 531.167108][T20126] ksys_mount+0xcc/0x100 [ 531.167119][T20126] __x64_sys_mount+0xbf/0xd0 [ 531.167134][T20126] do_syscall_64+0xf7/0x1c0 [ 531.167149][T20126] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.167159][T20126] RIP: 0033:0x45cc6a [ 531.167170][T20126] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 531.167175][T20126] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 531.167185][T20126] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 531.167191][T20126] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 531.167197][T20126] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 531.167201][T20126] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 531.167206][T20126] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:52 executing program 4 (fault-call:0 fault-nth:83): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:52 executing program 5: 03:38:52 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x50820f26cb0a8f43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit_group(0x68) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r1 = open(0x0, 0x40800, 0x4) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000040)=""/61) write$binfmt_elf32(r0, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x220000, 0x0) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000080)=[0x9, 0x1]) 03:38:52 executing program 5: 03:38:52 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:52 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 531.435305][T20145] FAULT_INJECTION: forcing a failure. [ 531.435305][T20145] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 531.448545][T20145] CPU: 0 PID: 20145 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 531.456438][T20145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.466498][T20145] Call Trace: [ 531.469801][T20145] dump_stack+0x1fb/0x318 [ 531.474149][T20145] should_fail+0x555/0x770 [ 531.479716][T20145] should_fail_alloc_page+0x55/0x60 [ 531.484933][T20145] prepare_alloc_pages+0x283/0x460 [ 531.490062][T20145] __alloc_pages_nodemask+0xb2/0x5d0 [ 531.495367][T20145] kmem_getpages+0x4d/0xa00 [ 531.499895][T20145] cache_grow_begin+0x7e/0x2c0 [ 531.504675][T20145] cache_alloc_refill+0x311/0x3f0 [ 531.509886][T20145] ? check_preemption_disabled+0xb7/0x2a0 [ 531.515657][T20145] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 531.521035][T20145] ? btrfs_mount_root+0x1b2/0x1040 [ 531.526162][T20145] btrfs_mount_root+0x1b2/0x1040 03:38:53 executing program 0: setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0x6, 0x84}, {0x6, 0x5}]}, 0x14, 0x2) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) sendmsg(r3, 0x0, 0x4000000) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:38:53 executing program 5: [ 531.531127][T20145] ? vfs_parse_fs_string+0x13b/0x1a0 [ 531.536421][T20145] ? rcu_read_lock_sched_held+0x10b/0x170 [ 531.542147][T20145] ? trace_kfree+0xb2/0x110 [ 531.546661][T20145] legacy_get_tree+0xf9/0x1a0 [ 531.551346][T20145] ? btrfs_control_open+0x40/0x40 [ 531.556380][T20145] vfs_get_tree+0x8b/0x2a0 [ 531.560805][T20145] vfs_kern_mount+0xc2/0x160 [ 531.565405][T20145] btrfs_mount+0x34f/0x18e0 [ 531.569932][T20145] ? check_preemption_disabled+0x47/0x2a0 [ 531.575673][T20145] ? vfs_parse_fs_string+0x13b/0x1a0 [ 531.580968][T20145] ? cap_capable+0x250/0x290 03:38:53 executing program 5: [ 531.585570][T20145] ? safesetid_security_capable+0x89/0xf0 [ 531.591320][T20145] legacy_get_tree+0xf9/0x1a0 [ 531.596093][T20145] ? btrfs_resize_thread_pool+0x290/0x290 [ 531.601828][T20145] vfs_get_tree+0x8b/0x2a0 [ 531.606263][T20145] do_mount+0x16c0/0x2510 [ 531.610617][T20145] ? copy_mount_options+0x308/0x3c0 [ 531.615826][T20145] ksys_mount+0xcc/0x100 [ 531.620080][T20145] __x64_sys_mount+0xbf/0xd0 [ 531.625484][T20145] do_syscall_64+0xf7/0x1c0 [ 531.630006][T20145] entry_SYSCALL_64_after_hwframe+0x49/0xbe 03:38:53 executing program 5: [ 531.635907][T20145] RIP: 0033:0x45cc6a [ 531.639807][T20145] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 531.659415][T20145] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 531.667834][T20145] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 531.675827][T20145] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 531.683800][T20145] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 531.691782][T20145] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 531.699975][T20145] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 531.708127][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 531.714101][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 531.714184][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 531.714219][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:38:55 executing program 4 (fault-call:0 fault-nth:84): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:38:55 executing program 5: 03:38:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61", 0x99}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:38:55 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:55 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendto$ax25(r1, &(0x7f00000000c0)="a197b1d2759b9e1e6dbdb63075675db5dd69f2381cee795b179bf9952a58f41a9784c7b93bff4c9e0aff9d2721bcb0e3c7b8e07f18b0f1b551d5cbca3690f70cde2e5aeba869453dd2243231b5636b0413921aadda0bdb6d094eb23d64bbdafbd62dc86199f8dafcb01f073a67870246e6ee6da039f815fc61cb4cbd4f01d641db9b", 0x82, 0x40, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) r2 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000540)='.\x00', &(0x7f0000000580)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$GETPID(r3, 0x1, 0xb, &(0x7f0000000280)=""/89) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r2, 0x0, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0xfffffffffffffff8, 0x101000) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f0000000240)) 03:38:55 executing program 5: [ 534.273705][T20171] FAULT_INJECTION: forcing a failure. [ 534.273705][T20171] name failslab, interval 1, probability 0, space 0, times 0 03:38:55 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x40800, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) [ 534.367922][T20171] CPU: 1 PID: 20171 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 534.375875][T20171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.375880][T20171] Call Trace: [ 534.375899][T20171] dump_stack+0x1fb/0x318 [ 534.375915][T20171] should_fail+0x555/0x770 [ 534.375937][T20171] __should_failslab+0x11a/0x160 [ 534.393594][T20171] should_failslab+0x9/0x20 [ 534.393608][T20171] kmem_cache_alloc_trace+0x5d/0x2f0 [ 534.393619][T20171] ? btrfs_alloc_device+0x78/0x580 [ 534.393632][T20171] btrfs_alloc_device+0x78/0x580 [ 534.393643][T20171] ? blkdev_put+0x2c8/0x3b0 [ 534.393656][T20171] close_fs_devices+0x4ae/0x8d0 [ 534.393677][T20171] btrfs_close_devices+0x33/0x130 [ 534.437088][T20171] btrfs_mount_root+0xa9d/0x1040 [ 534.442030][T20171] ? trace_kfree+0xb2/0x110 [ 534.446533][T20171] legacy_get_tree+0xf9/0x1a0 [ 534.451206][T20171] ? btrfs_control_open+0x40/0x40 [ 534.456229][T20171] vfs_get_tree+0x8b/0x2a0 [ 534.460642][T20171] vfs_kern_mount+0xc2/0x160 [ 534.465230][T20171] btrfs_mount+0x34f/0x18e0 [ 534.469738][T20171] ? check_preemption_disabled+0x47/0x2a0 [ 534.475468][T20171] ? vfs_parse_fs_string+0x13b/0x1a0 [ 534.480783][T20171] ? cap_capable+0x250/0x290 [ 534.485380][T20171] ? safesetid_security_capable+0x89/0xf0 [ 534.491110][T20171] legacy_get_tree+0xf9/0x1a0 [ 534.495784][T20171] ? btrfs_resize_thread_pool+0x290/0x290 [ 534.501511][T20171] vfs_get_tree+0x8b/0x2a0 [ 534.505953][T20171] do_mount+0x16c0/0x2510 [ 534.510297][T20171] ? copy_mount_options+0x308/0x3c0 [ 534.515847][T20171] ksys_mount+0xcc/0x100 [ 534.520123][T20171] __x64_sys_mount+0xbf/0xd0 [ 534.524713][T20171] do_syscall_64+0xf7/0x1c0 [ 534.529216][T20171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.535105][T20171] RIP: 0033:0x45cc6a [ 534.538997][T20171] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 534.558615][T20171] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:38:56 executing program 5: [ 534.567029][T20171] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 534.574996][T20171] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 534.582967][T20171] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 534.590933][T20171] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 534.599248][T20171] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 03:38:56 executing program 5: 03:38:56 executing program 1: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000480)={0x0, "aa78b13a3780fa7b1792c3dae75773181100", 0x0, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x81ee9a19f4f3894a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 03:38:56 executing program 3: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)=0xfffffffffffffd4a) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)={0x6, 0x6, 0x3f, {0x77359400}, 0x3, 0x1}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) [ 534.853827][T20171] ------------[ cut here ]------------ [ 534.859781][T20171] kernel BUG at fs/btrfs/volumes.c:1266! [ 534.899315][T20171] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 534.906039][T20171] CPU: 0 PID: 20171 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 534.917656][T20171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.927727][T20171] RIP: 0010:close_fs_devices+0x8c1/0x8d0 [ 534.933353][T20171] Code: 73 f9 fe 48 8b 5d c0 e9 73 ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 7c 87 48 89 df e8 09 73 f9 fe e9 7a ff ff ff e8 7f 34 c0 fe <0f> 0b e8 78 34 c0 fe 0f 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 [ 534.952953][T20171] RSP: 0018:ffff88802b1bf9a0 EFLAGS: 00010246 [ 534.959011][T20171] RAX: ffffffff82b32261 RBX: ffff8880951290e8 RCX: 0000000000040000 [ 534.967348][T20171] RDX: ffffc9000e7a1000 RSI: 000000000003ffff RDI: 0000000000040000 [ 534.975319][T20171] RBP: ffff88802b1bfa30 R08: ffffffff82b3f668 R09: ffffed1015d46b05 [ 534.986933][T20171] R10: ffffed1015d46b05 R11: 0000000000000000 R12: dffffc0000000000 [ 534.994898][T20171] R13: ffff8880951290f0 R14: ffff888095129000 R15: ffff8880a2e2b000 [ 535.002886][T20171] FS: 00007fdb10197700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 535.011809][T20171] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 535.018384][T20171] CR2: 0000000000000010 CR3: 000000008a15c000 CR4: 00000000001426f0 [ 535.026350][T20171] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 535.034317][T20171] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 535.042281][T20171] Call Trace: [ 535.045577][T20171] btrfs_close_devices+0x33/0x130 [ 535.050594][T20171] btrfs_mount_root+0xa9d/0x1040 [ 535.055549][T20171] ? trace_kfree+0xb2/0x110 [ 535.060046][T20171] legacy_get_tree+0xf9/0x1a0 [ 535.064897][T20171] ? btrfs_control_open+0x40/0x40 [ 535.069920][T20171] vfs_get_tree+0x8b/0x2a0 [ 535.074940][T20171] vfs_kern_mount+0xc2/0x160 [ 535.079520][T20171] btrfs_mount+0x34f/0x18e0 [ 535.084027][T20171] ? check_preemption_disabled+0x47/0x2a0 [ 535.089741][T20171] ? vfs_parse_fs_string+0x13b/0x1a0 [ 535.095015][T20171] ? cap_capable+0x250/0x290 [ 535.099602][T20171] ? safesetid_security_capable+0x89/0xf0 [ 535.105314][T20171] legacy_get_tree+0xf9/0x1a0 [ 535.109987][T20171] ? btrfs_resize_thread_pool+0x290/0x290 [ 535.115701][T20171] vfs_get_tree+0x8b/0x2a0 [ 535.120113][T20171] do_mount+0x16c0/0x2510 [ 535.124437][T20171] ? copy_mount_options+0x308/0x3c0 [ 535.129626][T20171] ksys_mount+0xcc/0x100 [ 535.133867][T20171] __x64_sys_mount+0xbf/0xd0 [ 535.138453][T20171] do_syscall_64+0xf7/0x1c0 [ 535.142954][T20171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 535.148837][T20171] RIP: 0033:0x45cc6a [ 535.152723][T20171] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 535.172322][T20171] RSP: 002b:00007fdb10196a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 535.181249][T20171] RAX: ffffffffffffffda RBX: 00007fdb10196b40 RCX: 000000000045cc6a [ 535.189215][T20171] RDX: 00007fdb10196ae0 RSI: 0000000020000100 RDI: 00007fdb10196b00 [ 535.197282][T20171] RBP: 0000000000000001 R08: 00007fdb10196b40 R09: 00007fdb10196ae0 [ 535.205261][T20171] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 535.213227][T20171] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 535.221201][T20171] Modules linked in: [ 535.229700][T20171] ---[ end trace 30333d34d65d540d ]--- [ 535.230288][ T3901] kobject: 'loop4' (00000000683bbede): kobject_uevent_env [ 535.235350][T20171] RIP: 0010:close_fs_devices+0x8c1/0x8d0 [ 535.242451][ T3901] kobject: 'loop4' (00000000683bbede): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 535.248563][T20171] Code: 73 f9 fe 48 8b 5d c0 e9 73 ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 7c 87 48 89 df e8 09 73 f9 fe e9 7a ff ff ff e8 7f 34 c0 fe <0f> 0b e8 78 34 c0 fe 0f 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 [ 535.278787][T20171] RSP: 0018:ffff88802b1bf9a0 EFLAGS: 00010246 [ 535.285328][T20171] RAX: ffffffff82b32261 RBX: ffff8880951290e8 RCX: 0000000000040000 [ 535.293409][T20171] RDX: ffffc9000e7a1000 RSI: 000000000003ffff RDI: 0000000000040000 [ 535.301776][T20171] RBP: ffff88802b1bfa30 R08: ffffffff82b3f668 R09: ffffed1015d46b05 [ 535.310075][T20171] R10: ffffed1015d46b05 R11: 0000000000000000 R12: dffffc0000000000 [ 535.318454][T20171] R13: ffff8880951290f0 R14: ffff888095129000 R15: ffff8880a2e2b000 [ 535.326833][T20171] FS: 00007fdb10197700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 535.336267][T20171] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 535.342987][T20171] CR2: 0000000000738000 CR3: 000000008a15c000 CR4: 00000000001426f0 [ 535.351379][T20171] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 535.360119][T20171] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 535.368553][T20171] Kernel panic - not syncing: Fatal exception [ 535.375956][T20171] Kernel Offset: disabled [ 535.380288][T20171] Rebooting in 86400 seconds..