69fe5f468897314e689d7aedef5e1f3d66299af0676c49bdb47a0ca3345f1cb65c3ea935f8a6e4689e234c07766d6493e847f07745efd015f050aae29074155de8b9b77e04e8", 0x1000}, {&(0x7f0000001200)="5fff3ba504b071ae9daddd2d46970e4cbfb3f6", 0x13}, {&(0x7f0000001240)="c1348717f86fae3c82ae3008d29a2c822f49e1e5b701b07ba5fd260bb7f9e72b603a4a31f4d47d0b6fac7afd5e8da5dc926e5f6d32cd1ba13c78dd6c3081232487912c937b3cf705124de5c5e8b4f1082f576f20da5b879aaf5c18b9bd5ba7b9cece84c1daba48e884fa9f2ab5e1faa121415740c58f289c3bf23bc510d41f58d3a77877a8a2d857d8d91d3203debbdeabbc4a792b2730a310646a610b8593b454e9db4a2ac413d54f66a6f6c233dcadd1bc4ec907e7053d387c3baa98cb5404b72d7dc9a16f51cbf5543a1087d669aa55c535c606237741f4e0a194048385908b3bb7d18cf9b400b03572e25e544f07c3bc8c", 0xf3}], 0x8, &(0x7f0000003c40)=ANY=[@ANYBLOB="180000000000000084000000050000003000000005000000180000000000000084000000000000005b1901040000ffff488ebb796bbcc351e93b0fb5df95ccb5c9f9afc6426a7917eed3f32b75b7010cdb1c08fea5e71e6ba6d4cc73e9ae723c3eb7a85cdbf856b47566e77b6c665a790f29aab966540196f55751144448a912ad9473be512c89"], 0x30, 0x20000000}, {&(0x7f0000001400)=@in={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000003500)=[{&(0x7f0000003480)="89b247c2d605f4963c8068caa53895566d4135af125d001ff71fff2b1587fe1f5a150c0fa989562cfec8a4187b1812c9a547e8dbb5a95eced8541a52ff53841e22cde49358f71812fbc344a19091cb29b2a4ff54d20d4689fbafe4d2b4d1b8705f111250ad924cd58d3a50eacba04dd343c9949fa7abbaff0bf316c1ba190a38", 0x80}], 0x1, &(0x7f0000003740)=[@sndinfo={0x20, 0x84, 0x2, {0x3702, 0x9, 0x0, 0xfffffffffffffffc, r6}}, @sndinfo={0x20, 0x84, 0x2, {0x3, 0x208, 0x1b0, 0x0, r7}}], 0x40, 0x8005}, {&(0x7f0000003780)=@in6={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x6}, 0x1c, &(0x7f0000003980)=[{&(0x7f00000037c0)="191f9c0178a4b0028dfaafa0b4e869e1b1ed550d314dcb419473d219dd0121b68de2d1b29ab909b14891afda126e2bcd724954c96750b1dcf131dfbf9ebdedfca3a11ea342a6ce37b0d2d1afaf115c8e9b7598888965e012821e6ea1db6d26afe72fc880875a1c5bc6bb18bb36c7fde5593d1307c391f5ef505752c6baf31c4b4b611df76eeda78ba7fee75b7ebf8b23bbfde3805b93b826a8a570c61509a9c418bb04785006f70e7d40fce70291eb3fcfe343e534230f56", 0xb8}, {&(0x7f0000003880)="2eec54cec0569da06da133b391e9273eb0206abf0215fda1472698167b6c84d9795766bf71366a8919104e80008207ec83d9012771cdfdaa0e9fefa24f58a1bced1d8c526ff873d4fb82348bf05be36f1994d3c5f65e51b5f26fb9d95f14eaface97d4e794f739eb7568465adbeb1dcafe18a5a53931a5f49a58e1a1e567f2ef7db267897ecdc5ce73eb35344435e84af2ba62028e8d356d4756e6a6230abe", 0x9f}, {&(0x7f0000003940)}], 0x3, &(0x7f00000039c0)=[@prinfo={0x18, 0x84, 0x5, {0x0, 0x1}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}], 0x30, 0x4}], 0x5, 0x4000001) 11:51:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r1}], 0x1, 0x0, 0x0, 0x0) [ 854.132763][ T26] audit: type=1800 audit(1565697071.753:688): pid=12149 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="loop3" ino=746 res=0 11:51:11 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsetxattr$security_smack_entry(r0, 0x0, 0x0, 0x0, 0x0) 11:51:11 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xf0030000}}}}}, &(0x7f0000000100)) 11:51:11 executing program 1: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x806, {{0x5, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x2, [0x0, 0x5a]}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101800, 0x0) setsockopt$rose(r0, 0x104, 0x3, &(0x7f0000000080)=0x7, 0x4) 11:51:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) dup3(r0, r2, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:51:11 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xf4010000}}}}}, &(0x7f0000000100)) 11:51:11 executing program 1: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x806, {{0x5, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x2, [0x0, 0x5a]}) syz_emit_ethernet(0x29, &(0x7f0000000040)={@empty, @dev={[], 0x27}, [], {@x25={0x805, {0x2, 0x6, 0xff, "31e5f24b11607552af4fb1b2db18e250d53bc0db6065ab21"}}}}, 0x0) 11:51:12 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xfdffffff}}}}}, &(0x7f0000000100)) 11:51:12 executing program 1: syz_emit_ethernet(0x1e, &(0x7f0000000040)={@dev={[], 0xc}, @local, [], {@can={0xc, {{0x1, 0x100000001, 0x2, 0x7}, 0x0, 0x1, 0x0, 0x0, "c5f9ce56708eb7c6"}}}}, &(0x7f0000000080)={0x1, 0x2, [0x6ef, 0x5fe, 0xcfd, 0x87e]}) syz_emit_ethernet(0x3fe, &(0x7f0000000000)=ANY=[@ANYBLOB="aa8aaaaaaaaaaaaaaaaaaaaa080000000000009078ac141400ac1414bb0e00907800"/49], &(0x7f0000000100)={0x0, 0x2, [0x0, 0x5a]}) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x2, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000300)={0x9, &(0x7f00000001c0)=[{}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @broadcast}]}) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180)={0x7, 0x7, 0x0, 0x7}, 0x8) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000140)=0x1) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000340)=0xaa3a798da6bf15c, 0x4) 11:51:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) dup3(r0, r2, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) [ 854.540991][T12190] QAT: Invalid ioctl 11:51:12 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xfe030000}}}}}, &(0x7f0000000100)) [ 854.566438][T12190] QAT: Invalid ioctl [ 854.581953][T12190] QAT: Invalid ioctl 11:51:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440)={0x8, "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", 0x1000}, 0xfffffc41) 11:51:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:51:12 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000003dc0)) write$cgroup_type(r0, &(0x7f0000000100)='threaded\x00', 0xff34) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") fallocate(r0, 0x3, 0x0, 0x10000408001) fallocate(r0, 0x3, 0x0, 0x80000003) 11:51:12 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xfeffffff}}}}}, &(0x7f0000000100)) 11:51:12 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/\xffrt\x98\x95\x19\x1e]\xff\xea\x10\x1b\x1d\xcco\x8f', 0x2761, 0x0) 11:51:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d993ff682339725d9bccdf5"], 0x14}, 0x1, 0x68}, 0x0) 11:51:12 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xffff0000}}}}}, &(0x7f0000000100)) 11:51:12 executing program 5: recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081ae", 0x8}], 0x1}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="00706964732011"], 0x7) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 855.009467][T12216] debugfs: Directory 'vcpu1' with parent '12216-4' already present! 11:51:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/13, 0xd}], 0x305}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xcf1c, 0x0, 0x0, 0x800e00551) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/142, 0x8e}], 0x1}, 0x42) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r3, 0x0) recvmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000024c0)=""/8, 0x8}], 0x1}, 0x0) shutdown(r4, 0x0) shutdown(r1, 0x0) 11:51:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d993ff682339725d9bccdf5"], 0x14}, 0x1, 0x68}, 0x0) 11:51:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:51:12 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xffffa888}}}}}, &(0x7f0000000100)) [ 855.284350][T12234] device nr0 entered promiscuous mode 11:51:13 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x260000, 0x0) fcntl$setpipe(r0, 0x407, 0x8) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f00000001c0)={0x3, 0x3ff, [{0x88, 0x0, 0x6}, {0x1, 0x0, 0xe055}, {0x6, 0x0, 0x3}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x200, 0x80) chdir(&(0x7f0000000180)='./file0\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) getsockname$unix(r2, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) write$UHID_INPUT(r2, &(0x7f0000001440)={0x8, "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", 0x1000}, 0xfffffc41) 11:51:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d993ff682339725d9bccdf5"], 0x14}, 0x1, 0x68}, 0x0) 11:51:13 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xffffca88}}}}}, &(0x7f0000000100)) 11:51:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:51:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x803, 0xe2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) getsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f0000000140), &(0x7f0000000100)=0xfffffffffffffed0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 11:51:13 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='trusted.overlay.opaque\x00', 0x0, 0xfffffffffffffd64, 0x3) [ 855.740725][ T26] audit: type=1800 audit(1565697073.363:689): pid=12255 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="loop3" ino=747 res=0 11:51:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d993ff682339725d9bccdf5"], 0x14}, 0x1, 0x68}, 0x0) 11:51:13 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xffffdd86}}}}}, &(0x7f0000000100)) 11:51:13 executing program 1: poll(0x0, 0x0, 0x80000000004e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x2a80, 0x2, 0x0, 0x800e00506) fchdir(0xffffffffffffffff) recvfrom$inet(r0, 0x0, 0x1789836bed901fc7, 0x2, 0x0, 0x800e0050e) shutdown(r0, 0x0) 11:51:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:51:13 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xffffff84}}}}}, &(0x7f0000000100)) 11:51:13 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d993ff682339725d9bccdf5"], 0x14}, 0x1, 0x68}, 0x0) 11:51:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) mount(&(0x7f0000000480)=@loop={'/dev/loop', 0x0}, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000500)='iso9660\x00', 0x2108080, &(0x7f0000000580)='vfat\x00') sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x1, 0x1, 0x4}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000080)="1d37c2ce06fb6f073e2b45f230aa1d57277d25f614d4c5f64ed2b4cf686dfd60f9b58bdc368c0eda1e0b5842816f043d28e5af32b65af8a473984efb46d995517d78b7a3854f9846e065fd2a3daeb91140d8b02281c97f46b38b65f967b6288ae62f4a7d8af6be57a339ee50100f49ae087f90bee084d477d5e3b50c4155dba034b6aaf6dfa6375653c6aa8de92480df6c1857434185440916f62ed2d46f14dd796c", 0xa2}, {&(0x7f00000001c0)="9fc666fd1e1887f6a32ba938e0080ee3a6b18fc8286e9048edea8afdf0e7e693f9f7b26a2a3c30fff00f71c516d76728e5d0f4f501fce7bb274b6c66b585e764d2728d322b6be8907aa90319d47dc078bae9ac2fda40ef47c990ab46bcae9a03418b3a05252a77101c1e294290800eceea22ef1d8052d1e30d8693d891264a92049144b2833e5646b038d67f014a987793cec61795e4bdb69dbd0573e84ff1945e49f1ec0154", 0xa6}, {&(0x7f0000000280)="9c8e01", 0x3}], 0x3, &(0x7f0000000340)=[@timestamping={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x663}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x1860000000}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x1ff}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}], 0xd8}, 0x24004000) write$UHID_INPUT(r0, &(0x7f0000001440)={0x8, "c0c814a55b6300d28afc61ac7dd1ffb869b761e8e53ee36e4be89e9fea175523e4468dec44bf8b5473c7a5062b4ede67dcb24cb9484ccfff2b3a70befc56e8ab2eee3483f5bf78c16beac035b700eb84e2216f268d02b717d2046c273814475b412437f7dc08a13a55d3c02132999dfd9fe80b750eff4d7c1da975b3835602728ae09e72527fcee19377e29c6c19e1ccce0f75e0e54001e3e83e473fa3d37eca8be1b3de565571e0e84f310c11fa8616068113b038aaa5c69967699fc2aa41c6f26fc22cf68e3577242c9b4ca20fab9de5885e0648fbd7af089b05f38f152d2f8144461608733c567b6dc5d2a07022c3764565c85abcfd99dd7a85e58939278235d50e8b321be7dbaa5141e097c28364fad2f713d666ca94f4e429687fcabb72aceeaf8abe5b506d98dc393b6e97492d785ead0ca2953f92c4d2b2c9f616e3d98b36be55a923fc5892413f7a3b615cec89b52e0ecdcee0aa5af72bcbb91b4bade7435dd8b529feaf13f8b48fcaca5952235d2e909f8831d8ca05a0daa3f6c581f388e0c1879b41fe63ef3d122bd0c5acd4fb07b96797918791075ae7383bb1bbdea574b31301ff37ecc45671ee2e7fc55bf6244025d1fd82dca56a42a23aa826a0b1e102bd87893ddc05649304eb1866c796e46e0d57f552bd572891ef892918bb2e7f2c6bcf68f388ea0c50f48c06de1b46b1434cdf25ca1288ebabe2a33d1c6effb77f91ef75471e93952caeda8ac2b2677e46d62b8366922d093832bccb949e177b4417864812d22972d81d89158288b5318d017329d4e8f66273abf74c434f318ebf32c7629342a85336387231b1e579d57cff0b125bef9dddf0fc33f71cb59d5a8972cda06ba6bba4a89cb8d3b465492c431698984998b2979ea61fed3d99b049724f2bdda5a0700ccb28825da1343f41290e569a6d38d4ae3968147cf39b097efd78e058fc71523c12e724bf93dc4ecc02b5cb18d13b59ec8f85368ac1ea93ed0149c60c53569dc69cdb3f37470eab26ef010b03a7e651b9e8e9065da347660836eddb3988c9a0f394aad055f727310f646d6cb35131d02aaf24735792bfce250798bebf0d1a4495fca568b9449e81afef2937b50faf873257d7efa07d31759474d50ca2a7922e79ab47dd59b11dfd1ec43fef3551aed81d01ee4ab997c6cecc39013dcaa442aec803e4cebbc288b4f9e87b30613f0ec88ddc6f60f56787f4040897e6e6bdac317d74b27f97f2efadb031f03c61954fd0232373582b7fa315d3eb9f67053126d2ed0636f04d669c47bdeb078fbda177533902e20b5ce9d8f395ea4c0aaf2cae774fe99bc40105a9ca184bcb598ab2f49c1df62d32d1a6d73a26812cb47a2ccaf0e9b759df89ad1e18238d897b9fd658f6786a92a0c12bd0ee6dad8a430a67962363e5b9afb3329e4f1f6fcd7e63cb8f24872bcf5b8c349d9ce423666ca39f16884219dea338b388e40f4ad996419cb3858637364d8e5af67f846d77b2749115131a3642ef56681315e4a2cbca5e60febabf693570f515e09c2a8994a8e2be3cba28118ef429d4de781118182607dd2c2d5aaba621ea29c140338bd8f1787fd2a3f43bb7fa22a8ce053adb331a4c78eab569af317e14360a6bf1c8b7394f34bfc1a941ac88dab334d5a2d45fc83bee28884698fd82339c972a06efb369220049ca89727513bd4262ad6f94f55f659ec98b684b1d92e1b6a303548a196cc5316e9845baaf01e737ef047d3d1ac4fe13de618e8fd6471c225e688b73b866213f4765c1a1ecf041f66a11177b0425b0423c455dccfa35a34f3b1c4c9850267bd41dcc366f4f8fef6982699e9aee7f3edff90217c84f6865234676e65911e5e99739792161766e959d061d6e86797b595ae3cffc043da0929dce1b4bd27e04532800f14f69398a681d46f00197f547fa138e676a4c84e586e9a2037faad7d7342221c229ff13606688ab70305dc28d01270604fbcb2b5777541e637a10e7d6c2dfa76461b18c8b303234282f31b7ed8afd0cdcc3978c6520a182000ea312296c7d9df08c2a67b944bc519113822014a831c8d6a7f8d26a7a443666b6077bdc1c11cf47001bcbb484d163543445c77a02140191bbb813da818b4dc3ef1ca420f624e5cb67c48024aeb8691b549202750899938067a3ad49da19e9fffc6486b3525fba8b2ff991fb3b4c1a536818f2dad96f713ac264a22136c6a3a9eacb4f69ab08cfe2b971a7d916833c6a0370d4b0bc428db2e4b4013899668b73caf9c983e2f07e46b4b5b4f0d231edee8b1951e1d0e34c881d1fc5c6be05b92b13680398e7109bd18048f0bd980fceb24e59411873e7a8a7f95f4da2ba5c082fdda710361e163a213a3dbb82c08a69020545da4636c09a67cd962182a011cf5eb1c3d999abc7b834ee518bb53afe19941927ca190699abf79c334c52e206fc851deb7398947ad5bd125ef3f51349497142e921c85506c739f6319ae0eb8e3c551ceb7e16afc2d6aad36841ed8eb560ef984ee5e00f1ead2c646546b3c145e3700b07fc257551641cf3dcb76a8b3cc75994f2c3eb521cea22d64c8b72b2de506fde8185b70b4707b7f571668a5925ca21e605904d7c896a5d7290b9c4fc75ecc7ddbbd7f6f003a74f53d1a5432e0377a3efce1e7ac61e36dc13aeea57400d4d3986db3fccb6edaf83f86daeb42f416f58c502e74178e013b399d0b155e0df86b40b5f3f2ab0ad61c90870cee340c07977b55622699101e5372677dd4e208fa6b5d4834a2d6f37b2ead107218aa0e702d1f6a60bd4ad3a2e22807237129fdc02993ef1fffe3c285bd4f7b093b2da8d772ce2df7874bf9b7fd0893eb66a4931acc38129bfe4a8fc6b28ea83bcca1220b66c86d4d90914bb9e9a425fce618f11b66f93aa78515eac0f3956cb1e8b6f12d7f6f22c1ca5563e280b15c64732aec2a37d6010cee0fd2263ea3ea2011043153284b4a5fc87cc0dd8c36f084ce715a6e9ba3e8b2586726255d122f2b5677d6590405ae031df8f83840ef3011a7f5d18037407758270d980aa65d5a4aa26a35a61b65178b6183b282771e89a8fe47bd3ea5a23146b924a47c3cc2540a9c8d91d4a8924e010fb6d3e60457e0aa86749cc3444707fda055a0f489aecda68af7f0d7d31cf25641a10bcc0d00996cddf9059121639fa3ff2e5490bae6b702fcf226d8e50f27f0973e5e4cf543445524d0fe3bd55d3f215978bfabcba0d44c076f5b333b2095c70f6a5426338bf0c065ddce27f6730606d84d1ccef8cebcd15085fa8a5d0975dc47eeb09a4ab6da21d01916c97f4e266c4b01f2bfb3b6a08bb5a7cf834e56782d824e7c55b591cd883ed9e806a4f7033bbab49a2b8ab2cb0f6da9d76968208236b35a51f8eba3769a676ad60d69c475706a630f3a078ebaa6ba5bc25719867cb61d48cc3a381b261165c04f3c93f37d72fc15f43df1de34e24e80a46f5d15fb362e71cb4a5365dde04a53dc5e42745fbd601ff148db416244dd76ac16f24138ef9a02491eb5b48d731a8bdcd46040d0ff11a07c040b83db84bfd21ffb1d818203cb7d3f8fca47f1dc510afa8219ab031aaba2147aed7c50228930e895a72abf55ca6997131e231ea92e0059b680735548adf2d572c3540e096a644deb3750e3b341bbeffee70ff22e0b4e56142e4c1965c01a646dd9b5b0055f88f08987ad45adb844b9ffc84792073048c28bcb60f2666802052ee45dcd9a2950d55ecf0234a3dcf67e83cfa0bfb1285eb54e6292d8075c9e1b459e48556f416898557c9c864fc5de459feb53e33dd1a6860a2d1a836ab5ff6efaee123b3715a7137787ee4345efbce38074e262f363a8ff400345c8539d44a7286c7291246810bce063f0877db6585842380b530a4aaef6e36779a95fed220cef6c1fff2fdd5031f83987dc3282d432f322852cc9dc6d00c59d5ed83b386ff97c521e528e59f2df932467ac02d17f8818c2de26d69725f42cecaf186fab7b6e10b1ebd9a9a12ed83cd382d9a6f9a9bed2736cb0ec0260057f5ec704d2e1a64caad59e02ff2022174b23564cb0942e6769b12e0ae4d65dc4c5e6b6ceaf2667e085909c93a9768b7bfdac612801c0bc3848bad51e2367f788cbd1c5091ce0e9c567528c72003712e91247d87f1ff60d3865fc687a35886822079392f8d151b89e09469bef98e59139c460a53805a93245148cbb9a6a010dadc87e9b1a0e0a89e87e433ff1c0ad4b125760858c8badff4d82cbd31cf88f3e2e16a4e960e1e0b5825fc0f2b21d660cf60069d43fb6a8a96c44fa922164f02c9cd5ebb6fad848871224d157777b5a70dc6deb988506bd03aa4ce2200e9ce23641221784250c22d2c8635a3512f45d433cf66e158eb261f48a23d54f5ef4358df3487da471eb5775bdba565ee170be126b2300d0dad050212606f2d77a63fa2ab430e62670e852b89944e611509415bee36bf0961c8918bd8b0eb8af45b1a9d0420c7101a9c5f4a63efb9cc8de7897b5e2b02cb5885ad8d0d8ac7754ba8d4e9d37175e614e3f3a6a7b122bbc6dd9ce78f1b9a4e940a1160bb85650d8932fe1a82d0525630ba017be5129625a45c3cae66c7cdaa33ee704791db81ef2e11a2f528974fa388cd929c934dbdb21425e6117839ab33b2926b036457db3a43083c3ec17231aed4ee5b607a45a5735c9470c03a424b43efcea953c078717344aeb1449c0dfa3a3ec224b542c16cf735466bdaf26b522aef1db547b14f07ebd4f5da34426a46007757be47ed3f643c47f2c4467762cd049d6f4cf8a78d04f8318bdedcee80871e91c0330499d88254555c456d9bde8a892394267eac15c230cf7e7ba19ebc01b1905c80476de3cea8258f6d0820d159f4aa8a37fb378b2685da4e0e89d253187219869f1157bbe4a8a43eabf65e86a6d9b21e25d91c43c3036914427833ed87073886719069148e2e47219bb5da5d9664d64dc5c4ff71c0e808dadbb53a23e41e3c02fd0c9e0704490f3283d1864d15d795882e6522f31445556cab6832f273dac0c7aef4e3f8c09a34d1624fdb087d852f2e827fb2c3105f1afda54b9dc12cfde3cf7747daa5ac70904e82636a13155303f9a1198d6e7f9dc7be394ebc5db9e8380e290e6cae5f320caa56aa94490789fce2e2540b3de8865396f58e14d61d3cb122f7bd1af5a27c6fe733eba3cc39106efc906ea967fb833e2480aa80bd56ccd9e5c25304e2b8135f1453af70059e599cb67bc8eaaa38c39768e74d3da8aba0135f0192d7ddf0149ce62f353b0360251f1f88b272c6e85b4ee4e0563a6de80de83749af6e6aa4d80cab7031aff3f7e8d0c9114940549f828a62be9fd6a16db001369728b4b93d4ecf91563ae03def3ca4e9900a97657c4ff1e41c5742fb3329ba882ed61645aedb22f2543b83cd4007e5d228697a48064acc32ece41f2d5ead3f31a9689249e8b4bb57ac0b136b6c60ec531708235b94db823344aafbb9b79e21959635664b2193c3add0b28767906b7ba4118e6548e9a23b49e9181dc6f7dc7857425c9ab1b1451bc4572fd060190d0b5a76b8368b68e72a212bd0f89d0778d293b1d32f155f30c9aafe7215d2e746ea8f2c73a30bcd8c093a489519b60616b15afe69074ee77fb65caf5faf0aad49106057a91fdcd622a07ac21eb5c221f2e65323228af41b3eb894517c34c4f60ba20fb6f6c4309a7357884c0eeeb0a4874550107f2d0ffdc412f86bdf712f96183b3932cfb4da3f179cde1a288df9af09c243fae8c67b0d208d9cdb7adde8d5e548e0624b19da4818ef656b88280a", 0x1000}, 0xfffffc41) 11:51:14 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = epoll_create(0x0) ioctl$TCSETAW(r0, 0x5407, 0x0) 11:51:14 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d993ff682339725d9bccdf5"], 0x14}, 0x1, 0x68}, 0x0) 11:51:14 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xffffff88}}}}}, &(0x7f0000000100)) 11:51:14 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) 11:51:14 executing program 1: 11:51:14 executing program 1: [ 856.659120][ T26] audit: type=1800 audit(1565697074.283:690): pid=12298 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="loop3" ino=748 res=0 11:51:14 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d993ff682339725d9bccdf5"], 0x14}, 0x1, 0x68}, 0x0) 11:51:14 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xffffff89}}}}}, &(0x7f0000000100)) 11:51:14 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) 11:51:14 executing program 1: 11:51:14 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xfffffffd}}}}}, &(0x7f0000000100)) 11:51:15 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x4, 0x47) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) semget(0x0, 0x100000000000001, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f00000003c0)) getegid() getgroups(0x0, 0x0) stat(0x0, &(0x7f0000000480)) getgroups(0x2, &(0x7f0000000500)=[0xee00, 0xee01]) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x4) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x45b, 0x0, 0x0) 11:51:15 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d993ff682339725d9bccdf5"], 0x14}, 0x1, 0x68}, 0x0) 11:51:15 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) 11:51:15 executing program 1: shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000080)=""/45, 0x2d}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r1, 0x0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r3, &(0x7f0000000000)=[{&(0x7f0000000140)=""/179, 0xb3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) shutdown(r2, 0x0) 11:51:15 executing program 5: poll(&(0x7f0000000140)=[{}, {}, {}, {}, {}], 0x5, 0x80000000004e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x2a80, 0x0, 0x0, 0x800e00506) getsockopt$sock_int(r0, 0xffff, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x1789836bed901fc7, 0x0, 0x0, 0x800e0050e) shutdown(r0, 0x0) 11:51:15 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xfffffffe}}}}}, &(0x7f0000000100)) [ 857.562132][ T26] audit: type=1800 audit(1565697075.183:691): pid=12342 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="loop3" ino=749 res=0 11:51:15 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x4000000000}}}}}, &(0x7f0000000100)) 11:51:15 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d993ff682339725d9bccdf5"], 0x14}, 0x1, 0x68}, 0x0) 11:51:15 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 11:51:15 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x10000000000}}}}}, &(0x7f0000000100)) 11:51:15 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d993ff682339725d9bccdf5"], 0x14}, 0x1, 0x68}, 0x0) 11:51:15 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 11:51:15 executing program 3: 11:51:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) 11:51:15 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x100000000000000}}}}}, &(0x7f0000000100)) 11:51:15 executing program 1: 11:51:15 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 11:51:15 executing program 5: 11:51:15 executing program 1: 11:51:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) 11:51:15 executing program 5: 11:51:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:51:15 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x200000000000000}}}}}, &(0x7f0000000100)) 11:51:16 executing program 3: 11:51:16 executing program 1: 11:51:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) 11:51:16 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x300000000000000}}}}}, &(0x7f0000000100)) 11:51:16 executing program 3: 11:51:16 executing program 5: 11:51:16 executing program 1: 11:51:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x68}, 0x0) 11:51:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:51:16 executing program 3: 11:51:16 executing program 5: 11:51:16 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x400000000000000}}}}}, &(0x7f0000000100)) 11:51:16 executing program 1: 11:51:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x68}, 0x0) 11:51:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:51:16 executing program 3: 11:51:16 executing program 5: 11:51:16 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x500000000000000}}}}}, &(0x7f0000000100)) 11:51:16 executing program 1: 11:51:16 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 11:51:16 executing program 1: 11:51:16 executing program 3: 11:51:16 executing program 5: 11:51:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x68}, 0x0) 11:51:16 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x600000000000000}}}}}, &(0x7f0000000100)) 11:51:16 executing program 3: 11:51:16 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 11:51:16 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x700000000000000}}}}}, &(0x7f0000000100)) 11:51:16 executing program 5: 11:51:16 executing program 1: 11:51:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000), 0x1, 0x68}, 0x0) 11:51:16 executing program 3: 11:51:16 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 11:51:16 executing program 5: 11:51:16 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x800000000000000}}}}}, &(0x7f0000000100)) 11:51:16 executing program 1: 11:51:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000), 0x1, 0x68}, 0x0) 11:51:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:51:16 executing program 1: 11:51:16 executing program 3: 11:51:16 executing program 5: 11:51:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000), 0x1, 0x68}, 0x0) 11:51:16 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x806000000000000}}}}}, &(0x7f0000000100)) 11:51:16 executing program 5: 11:51:16 executing program 3: 11:51:17 executing program 1: 11:51:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[]}, 0x1, 0x68}, 0x0) 11:51:17 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xa00000000000000}}}}}, &(0x7f0000000100)) 11:51:17 executing program 5: 11:51:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:51:17 executing program 3: 11:51:17 executing program 1: 11:51:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[]}, 0x1, 0x68}, 0x0) 11:51:17 executing program 5: 11:51:17 executing program 3: 11:51:17 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xb00000000000000}}}}}, &(0x7f0000000100)) 11:51:17 executing program 1: 11:51:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:51:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[]}, 0x1, 0x68}, 0x0) 11:51:17 executing program 1: 11:51:17 executing program 5: 11:51:17 executing program 3: 11:51:17 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xc00000000000000}}}}}, &(0x7f0000000100)) 11:51:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x68}, 0x0) 11:51:17 executing program 1: 11:51:17 executing program 5: 11:51:17 executing program 3: poll(&(0x7f0000000140)=[{}, {}, {}, {}, {}], 0x5, 0x80000000004e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x2a80, 0x2, 0x0, 0x800e00506) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) recvfrom$inet(r0, 0x0, 0x1789836bed901fc7, 0x2, 0x0, 0x800e0050e) shutdown(r0, 0x0) 11:51:17 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xd00000000000000}}}}}, &(0x7f0000000100)) 11:51:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:51:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x68}, 0x0) 11:51:17 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCSRS485(r0, 0x542f, 0x0) 11:51:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000003680)=[{&(0x7f0000000000)=""/243, 0xf3}, {0x0}, {0x0}], 0x3}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000940)=[{&(0x7f0000000180)=""/78, 0x4e}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r3, 0x0) r5 = dup(r4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r6, &(0x7f00000005c0)=[{&(0x7f0000000040)=""/231, 0xe7}], 0x1) r7 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r7, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r6, 0x0) r8 = socket$inet6_sctp(0x1c, 0x3, 0x84) readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/11, 0xb}], 0x1) shutdown(r7, 0x0) shutdown(r5, 0x0) shutdown(r1, 0x0) 11:51:17 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xf00000000000000}}}}}, &(0x7f0000000100)) 11:51:17 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x1100000000000000}}}}}, &(0x7f0000000100)) 11:51:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x68}, 0x0) 11:51:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:51:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b6"], 0x1}, 0x1, 0x68}, 0x0) 11:51:17 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x1400000000000000}}}}}, &(0x7f0000000100)) 11:51:17 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000000c0)={&(0x7f0000139ff0)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000000)="be", 0x1}], 0x1}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) 11:51:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000040)=""/20, 0x14}], 0x9, 0x0, 0x7a}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000080)=""/45, 0x2d}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r5, &(0x7f0000000000)=[{&(0x7f0000000140)=""/179, 0xb3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) shutdown(r4, 0x0) shutdown(r1, 0x0) 11:51:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:51:17 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x1f00000000000000}}}}}, &(0x7f0000000100)) 11:51:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b6"], 0x1}, 0x1, 0x68}, 0x0) 11:51:18 executing program 1: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xf4010000}}}}}, &(0x7f0000000100)) 11:51:18 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000000c0)={&(0x7f0000139ff0)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000000)="be", 0x1}], 0x1}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) 11:51:18 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x2100000000000000}}}}}, &(0x7f0000000100)) 11:51:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b6"], 0x1}, 0x1, 0x68}, 0x0) 11:51:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) 11:51:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4"], 0x1}, 0x1, 0x68}, 0x0) 11:51:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) 11:51:18 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000000c0)={&(0x7f0000139ff0)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000000)="be", 0x1}], 0x1}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) 11:51:18 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d9", 0xa9) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:18 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x2900000000000000}}}}}, &(0x7f0000000100)) 11:51:18 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r1, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000340)=0x7c9) write$cgroup_int(r1, &(0x7f00000002c0), 0x12) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000500)=@assoc_value, 0x0) sendfile(r1, r1, &(0x7f0000002580), 0x7fffffff) sendfile(r1, r1, &(0x7f0000000240), 0x80b0) 11:51:18 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000000c0)={&(0x7f0000139ff0)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000000)="be", 0x1}], 0x1}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) 11:51:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4"], 0x1}, 0x1, 0x68}, 0x0) 11:51:18 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x2b00000000000000}}}}}, &(0x7f0000000100)) 11:51:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4"], 0x1}, 0x1, 0x68}, 0x0) 11:51:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) 11:51:18 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) 11:51:18 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x2c00000000000000}}}}}, &(0x7f0000000100)) 11:51:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d"], 0x1}, 0x1, 0x68}, 0x0) 11:51:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 11:51:19 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d9", 0xa9) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:19 executing program 3: sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) 11:51:19 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r1, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000340)=0x7c9) write$cgroup_int(r1, &(0x7f00000002c0), 0x12) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000500)=@assoc_value, 0x0) sendfile(r1, r1, &(0x7f0000002580), 0x7fffffff) sendfile(r1, r1, &(0x7f0000000240), 0x80b0) 11:51:19 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x2f00000000000000}}}}}, &(0x7f0000000100)) 11:51:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d"], 0x1}, 0x1, 0x68}, 0x0) 11:51:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 11:51:19 executing program 3: sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) 11:51:19 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x3200000000000000}}}}}, &(0x7f0000000100)) 11:51:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d"], 0x1}, 0x1, 0x68}, 0x0) 11:51:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 11:51:19 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x3300000000000000}}}}}, &(0x7f0000000100)) 11:51:19 executing program 3: sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) 11:51:19 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d9", 0xa9) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d993ff6823397"], 0x1}, 0x1, 0x68}, 0x0) 11:51:20 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r1, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000340)=0x7c9) write$cgroup_int(r1, &(0x7f00000002c0), 0x12) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000500)=@assoc_value, 0x0) sendfile(r1, r1, &(0x7f0000002580), 0x7fffffff) sendfile(r1, r1, &(0x7f0000000240), 0x80b0) 11:51:20 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51", 0xa8) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:20 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x3a00000000000000}}}}}, &(0x7f0000000100)) 11:51:20 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) 11:51:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d993ff6823397"], 0x1}, 0x1, 0x68}, 0x0) 11:51:20 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51", 0xa8) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:20 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) 11:51:20 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x3c00000000000000}}}}}, &(0x7f0000000100)) 11:51:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d993ff6823397"], 0x1}, 0x1, 0x68}, 0x0) 11:51:20 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51", 0xa8) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:20 executing program 1: syz_emit_ethernet(0x3a, &(0x7f0000000200)={@local, @local, [{[], {0x8100, 0x8, 0x9, 0x4}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000100)={0x0, 0x2, [0x4, 0x5a, 0x0, 0x1]}) r0 = socket$inet(0x2, 0x0, 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xb03, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$evdev(r1, &(0x7f0000000140)=[{{0x77359400}, 0x0, 0x80000000, 0x66a}, {{0x77359400}, 0x11, 0x7190, 0x6}, {{r2, r3/1000+30000}, 0x11, 0x0, 0x9}, {{0x77359400}, 0x11, 0xfffffffffffffffb, 0x4}, {{0x0, 0x7530}, 0x4, 0x3b9, 0x2}, {{r4, r5/1000+10000}, 0x4, 0x0, 0x40a}], 0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1fffe0000000000, 0x0, 0x3ff, 0x4, 0x100000000}, &(0x7f00000004c0)=0x98) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000500)=@assoc_value={r6, 0x7}, &(0x7f0000000540)=0x8) 11:51:20 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x3f00000000000000}}}}}, &(0x7f0000000100)) 11:51:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d993ff682339725d9bc"], 0x1}, 0x1, 0x68}, 0x0) 11:51:20 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x4000000000000000}}}}}, &(0x7f0000000100)) 11:51:20 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) 11:51:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d993ff682339725d9bc"], 0x1}, 0x1, 0x68}, 0x0) 11:51:20 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51", 0xa8) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:20 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x4305000000000000}}}}}, &(0x7f0000000100)) 11:51:20 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @rand_addr="fb783f75d4daa3ee6a8fb16688072970"}]}, &(0x7f0000000180)=0x10) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)={0x0, 0x0, 0x30}, &(0x7f0000000040)=0x18) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000100)={0x0, 0x8000002, [0x4, 0x5a]}) 11:51:20 executing program 3: socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) 11:51:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d993ff682339725d9bc"], 0x1}, 0x1, 0x68}, 0x0) 11:51:20 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51", 0xa8) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:20 executing program 3: socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) 11:51:20 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x6000000000000000}}}}}, &(0x7f0000000100)) 11:51:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d993ff682339725d9bccd"], 0x1}, 0x1, 0x68}, 0x0) 11:51:20 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @rand_addr="fb783f75d4daa3ee6a8fb16688072970"}]}, &(0x7f0000000180)=0x10) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)={0x0, 0x0, 0x30}, &(0x7f0000000040)=0x18) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000100)={0x0, 0x8000002, [0x4, 0x5a]}) 11:51:20 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x6c00000000000000}}}}}, &(0x7f0000000100)) 11:51:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d993ff682339725d9bccd"], 0x1}, 0x1, 0x68}, 0x0) 11:51:20 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:20 executing program 3: socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) 11:51:20 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @rand_addr="fb783f75d4daa3ee6a8fb16688072970"}]}, &(0x7f0000000180)=0x10) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)={0x0, 0x0, 0x30}, &(0x7f0000000040)=0x18) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000100)={0x0, 0x8000002, [0x4, 0x5a]}) 11:51:20 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8004020000000000}}}}}, &(0x7f0000000100)) 11:51:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001300fbff0000000000000000050000002dd288283b91677d90aba6002edb17187ce6ff160cf1fef4a179b61821d247e78e7e4d77d89d1a7ee6e32026891e7c620ec4688e8293efb5b8099ac0031d993ff682339725d9bccd"], 0x1}, 0x1, 0x68}, 0x0) 11:51:20 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:20 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, 0x0, 0x0, 0x0) 11:51:20 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @rand_addr="fb783f75d4daa3ee6a8fb16688072970"}]}, &(0x7f0000000180)=0x10) shutdown(r0, 0x1) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000100)={0x0, 0x8000002, [0x4, 0x5a]}) 11:51:20 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x800e000000000000}}}}}, &(0x7f0000000100)) 11:51:20 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741", 0x55) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, 0x0, 0x0, 0x0) 11:51:21 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8035000000000000}}}}}, &(0x7f0000000100)) 11:51:21 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:21 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @rand_addr="fb783f75d4daa3ee6a8fb16688072970"}]}, &(0x7f0000000180)=0x10) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000100)={0x0, 0x8000002, [0x4, 0x5a]}) 11:51:21 executing program 4: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c0214772737fd4096dea58fc22dda13384e5f0cf0cd4", 0x51}], 0x1}, 0x20008800) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, 0x0, 0x0, 0x0) 11:51:21 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8100000000000000}}}}}, &(0x7f0000000100)) [ 863.552383][T12899] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 15279816269310997409 transid 0 /dev/loop4 11:51:21 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000400), 0x0, 0x0) 11:51:21 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x84ffffff00000000}}}}}, &(0x7f0000000100)) [ 863.640000][T12899] BTRFS error (device loop4): unsupported checksum algorithm: 22762 11:51:21 executing program 5: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c0214772737fd4096dea58fc22dda13384e5f0cf0c", 0x50}], 0x1, &(0x7f0000001a00)="83", 0x1, 0x840}, 0x20008800) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:21 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x86ddffff00000000}}}}}, &(0x7f0000000100)) 11:51:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000400), 0x0, 0x0) [ 863.720201][T12899] BTRFS error (device loop4): open_ctree failed [ 863.817039][T12925] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 3606333270274977 transid 0 /dev/loop5 11:51:21 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8847000000000000}}}}}, &(0x7f0000000100)) 11:51:21 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000340)=0x7c9) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) [ 863.880105][T12925] BTRFS error (device loop5): unsupported checksum algorithm: 22762 [ 863.938277][T12925] BTRFS error (device loop5): open_ctree failed 11:51:21 executing program 1: socket$inet6_sctp(0xa, 0x1, 0x84) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000100)={0x0, 0x8000002, [0x4, 0x5a]}) 11:51:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000400), 0x0, 0x0) 11:51:21 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8848000000000000}}}}}, &(0x7f0000000100)) 11:51:21 executing program 0: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c0214772737fd4096dea58fc22dda13384e5f0cf", 0x4f}], 0x1, &(0x7f0000001a00)="83", 0x1, 0x840}, 0x20008800) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:21 executing program 5: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c0214772737fd4096dea58fc22dda13384e5f0cf0c", 0x50}], 0x1, &(0x7f0000001a00)="83", 0x1, 0x840}, 0x20008800) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0}], 0x1, 0x0) [ 864.360003][T12953] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 228633549747105 transid 0 /dev/loop0 11:51:22 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8864000000000000}}}}}, &(0x7f0000000100)) [ 864.418193][T12952] BTRFS error (device loop0): unsupported checksum algorithm: 22762 [ 864.431252][T12952] BTRFS error (device loop0): open_ctree failed 11:51:22 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000100)={0x0, 0x8000002, [0x4, 0x5a]}) 11:51:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 11:51:22 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x88a8ffff00000000}}}}}, &(0x7f0000000100)) [ 864.471938][T12953] BTRFS error (device loop0): unsupported checksum algorithm: 22762 11:51:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0}], 0x1, 0x0) [ 864.576044][T12953] BTRFS error (device loop0): open_ctree failed 11:51:22 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000340)=0x7c9) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:22 executing program 5: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c0214772737fd4096dea58fc22dda13384e5f0", 0x4e}], 0x1, &(0x7f0000001a00)="83", 0x1, 0x840}, 0x20008800) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:22 executing program 1: syz_emit_ethernet(0x0, 0x0, &(0x7f0000000100)={0x0, 0x8000002, [0x4, 0x5a]}) 11:51:22 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x88caffff00000000}}}}}, &(0x7f0000000100)) 11:51:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)}], 0x1, 0x0) 11:51:22 executing program 0: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c0214772737fd4096dea58fc22dda13384e5f0cf", 0x4f}], 0x1, &(0x7f0000001a00)="83", 0x1, 0x840}, 0x20008800) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)}], 0x1, 0x0) 11:51:22 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x88ffffff00000000}}}}}, &(0x7f0000000100)) 11:51:22 executing program 1: syz_emit_ethernet(0x0, 0x0, &(0x7f0000000100)={0x0, 0x8000002, [0x4, 0x5a]}) [ 864.842134][T12992] BTRFS error (device loop0): unsupported checksum algorithm: 22762 11:51:22 executing program 5: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c0214772737fd4096dea58fc22dda13384e5f0", 0x4e}], 0x1, &(0x7f0000001a00)="83", 0x1, 0x840}, 0x20008800) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 864.913128][T12992] BTRFS error (device loop0): open_ctree failed 11:51:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)}], 0x1, 0x0) 11:51:22 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8906000000000000}}}}}, &(0x7f0000000100)) [ 865.013467][T13017] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 1034642797473 transid 0 /dev/loop5 [ 865.116378][T13017] BTRFS error (device loop5): unsupported checksum algorithm: 22762 [ 865.142277][T13017] BTRFS error (device loop5): open_ctree failed 11:51:23 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000340)=0x7c9) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:23 executing program 1: syz_emit_ethernet(0x0, 0x0, &(0x7f0000000100)={0x0, 0x8000002, [0x4, 0x5a]}) 11:51:23 executing program 0: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c0214772737fd4096dea58fc22dda13384e5f0cf", 0x4f}], 0x1, &(0x7f0000001a00)="83", 0x1, 0x840}, 0x20008800) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)=[@sndinfo={0x20}], 0x20}], 0x1, 0x0) 11:51:23 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x89ffffff00000000}}}}}, &(0x7f0000000100)) 11:51:23 executing program 5: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c0214772737fd4096dea58fc22dda13384e5f0", 0x4e}], 0x1, &(0x7f0000001a00)="83", 0x1, 0x840}, 0x20008800) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:23 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000100)={0x0, 0x8000002, [0x4, 0x5a]}) [ 865.738786][T13040] BTRFS error (device loop5): unsupported checksum algorithm: 22762 11:51:23 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xe803000000000000}}}}}, &(0x7f0000000100)) 11:51:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)=[@sndinfo={0x20}], 0x20}], 0x1, 0x0) [ 865.779102][T13040] BTRFS error (device loop5): open_ctree failed [ 865.792932][T13042] BTRFS error (device loop5): unsupported checksum algorithm: 22762 11:51:23 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000100)={0x0, 0x8000002, [0x4, 0x5a]}) 11:51:23 executing program 5: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c0214772737fd4096dea58fc22dda13384e5f0", 0x4e}], 0x1, &(0x7f0000001a00)="83", 0x1, 0x840}, 0x20008800) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:23 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xf003000000000000}}}}}, &(0x7f0000000100)) [ 865.846678][T13042] BTRFS error (device loop5): open_ctree failed [ 866.031739][T13071] BTRFS error (device loop5): unsupported checksum algorithm: 22762 [ 866.045656][T13071] BTRFS error (device loop5): open_ctree failed 11:51:24 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000340)=0x7c9) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:24 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000c3000)=[@sndinfo={0x20}], 0x20}], 0x1, 0x0) 11:51:24 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000100)={0x0, 0x8000002, [0x4, 0x5a]}) 11:51:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:24 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xf401000000000000}}}}}, &(0x7f0000000100)) 11:51:24 executing program 5: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c0214772737fd4096dea58fc22dda13384e5f0", 0x4e}], 0x1, &(0x7f0000001a00)="83", 0x1, 0x840}, 0x20008800) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:24 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xfdffffff00000000}}}}}, &(0x7f0000000100)) 11:51:24 executing program 3: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c0214772737fd4096dea58fc22dda13384e5f0cf0cd4eb0901b193d00f47332f4acd57b3f00b83d923cf8e0d54811009ba320b908a29b4e7d3f81eed3f9d37d9cc1ed34f549a317bb42d4dd9d9fb479024bb199f1d0e0c", 0x92}], 0x1, &(0x7f0000001a00)="83", 0x1, 0x840}, 0x20008800) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:24 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x8000002, [0x4, 0x5a]}) [ 866.623055][T13083] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop0 11:51:24 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xfe03000000000000}}}}}, &(0x7f0000000100)) 11:51:24 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, 0x0) [ 866.724539][T13083] BTRFS error (device loop0): superblock checksum mismatch [ 866.745355][T13083] BTRFS error (device loop0): open_ctree failed [ 866.760218][T13086] BTRFS error (device loop0): superblock checksum mismatch 11:51:24 executing program 3: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c02147", 0x3e}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 866.871485][T13086] BTRFS error (device loop0): open_ctree failed 11:51:24 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000340)=0x7c9) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:24 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, 0x0) 11:51:24 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xfeffffff00000000}}}}}, &(0x7f0000000100)) 11:51:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:24 executing program 5: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) 11:51:24 executing program 3: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c0214772737fd4096dea58fc22dda13384e5f0cf0cd4eb0901b193d00f47332f4acd57b3f00b83d923cf8e0d54811009ba320b908a29b4e7d3f81eed3f9d37d9cc1ed34f549a317bb42d4dd9d9fb479024bb199f1d0e0ce10e37590440846627", 0x9b}], 0x1, &(0x7f0000001a00)="83", 0x1, 0x840}, 0x20008800) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:24 executing program 5: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)="83", 0x1, 0x840}, 0x20008800) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:24 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, 0x0) 11:51:24 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xffff000000000000}}}}}, &(0x7f0000000100)) [ 867.272361][T13127] BTRFS error (device loop0): superblock checksum mismatch 11:51:25 executing program 3: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c021", 0x3d}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 867.354711][T13127] BTRFS error (device loop0): open_ctree failed 11:51:25 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xffffffff00000000}}}}}, &(0x7f0000000100)) 11:51:25 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x0, [0x4, 0x5a]}) [ 867.481188][T13146] BTRFS error (device loop5): superblock checksum mismatch [ 867.519669][T13152] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop3 [ 867.559925][T13146] BTRFS error (device loop5): open_ctree failed 11:51:25 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000340)=0x7c9) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:25 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x0, [0x4, 0x5a]}) 11:51:25 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2}}}}}, &(0x7f0000000100)) 11:51:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:25 executing program 5: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c021", 0x3d}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:25 executing program 3: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c021", 0x3d}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:25 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3}}}}}, &(0x7f0000000100)) 11:51:25 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x0, [0x4, 0x5a]}) [ 867.982390][T13175] BTRFS error (device loop3): superblock checksum mismatch [ 867.995535][T13176] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop0 11:51:25 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x4}}}}}, &(0x7f0000000100)) 11:51:25 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x8000002, [0x4]}) 11:51:25 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x8000002, [0x4]}) [ 868.049874][T13183] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop5 11:51:25 executing program 0: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c021", 0x3d}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 868.179905][T13175] BTRFS error (device loop3): open_ctree failed [ 868.308972][T13205] BTRFS error (device loop0): superblock checksum mismatch [ 868.329301][T13205] BTRFS error (device loop0): open_ctree failed 11:51:26 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000340)=0x7c9) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:26 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x8000002, [0x4]}) 11:51:26 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x5}}}}}, &(0x7f0000000100)) 11:51:26 executing program 5: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c021", 0x3d}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:26 executing program 3: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c021", 0x3d}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:26 executing program 0: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24", 0x3b}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:26 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x8000002, [0x0, 0x5a]}) 11:51:26 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x6}}}}}, &(0x7f0000000100)) 11:51:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440)={0x8, "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", 0x87f9000}, 0xfffffc41) [ 868.820868][T13223] BTRFS error (device loop0): superblock checksum mismatch [ 868.829798][T13221] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop0 new:/dev/loop3 [ 868.857022][T13224] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop0 new:/dev/loop5 11:51:26 executing program 3: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef", 0x3a}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:26 executing program 5: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c021", 0x3d}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:26 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x7}}}}}, &(0x7f0000000100)) [ 868.978514][T13223] BTRFS error (device loop0): open_ctree failed [ 869.080866][T13249] BTRFS error (device loop3): superblock checksum mismatch [ 869.090592][T13252] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop5 [ 869.156123][T13249] BTRFS error (device loop3): open_ctree failed 11:51:27 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000340)=0x7c9) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:27 executing program 0: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24", 0x3b}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:27 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8}}}}}, &(0x7f0000000100)) 11:51:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:27 executing program 3: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef", 0x3a}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:27 executing program 1: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef", 0x3a}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:27 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xa}}}}}, &(0x7f0000000100)) [ 869.702372][T13268] BTRFS error (device loop5): superblock checksum mismatch 11:51:27 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xb}}}}}, &(0x7f0000000100)) [ 869.751753][T13268] BTRFS error (device loop5): open_ctree failed [ 869.758785][T13270] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop0 [ 869.779312][T13272] BTRFS error (device loop3): superblock checksum mismatch 11:51:27 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xc}}}}}, &(0x7f0000000100)) 11:51:27 executing program 0: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) [ 869.842648][T13272] BTRFS error (device loop3): open_ctree failed 11:51:27 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xd}}}}}, &(0x7f0000000100)) 11:51:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 870.046417][T13299] BTRFS error (device loop5): superblock checksum mismatch [ 870.072185][T13299] BTRFS error (device loop5): open_ctree failed [ 870.241901][T13310] BTRFS error (device loop1): superblock checksum mismatch [ 870.249930][T13310] BTRFS error (device loop1): open_ctree failed 11:51:28 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000340)=0x7c9) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:28 executing program 3: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef", 0x3a}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:28 executing program 0: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) 11:51:28 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xf}}}}}, &(0x7f0000000100)) 11:51:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:28 executing program 1: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef", 0x3a}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:28 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x11}}}}}, &(0x7f0000000100)) 11:51:28 executing program 0: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) [ 870.607597][T13325] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop5 [ 870.625569][T13317] BTRFS error (device loop3): superblock checksum mismatch 11:51:28 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x14}}}}}, &(0x7f0000000100)) [ 870.666813][T13328] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop1 11:51:28 executing program 0: syz_emit_ethernet(0x0, 0x0, &(0x7f0000000100)) 11:51:28 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:28 executing program 1: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7", 0x1}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 870.793820][T13317] BTRFS error (device loop3): open_ctree failed [ 870.918015][T13351] BTRFS error (device loop1): superblock checksum mismatch [ 870.987549][T13351] BTRFS error (device loop1): open_ctree failed 11:51:29 executing program 0: syz_emit_ethernet(0x0, 0x0, &(0x7f0000000100)) 11:51:29 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x21}}}}}, &(0x7f0000000100)) 11:51:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:29 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:29 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:29 executing program 1: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7", 0x1}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:29 executing program 0: syz_emit_ethernet(0x0, 0x0, &(0x7f0000000100)) 11:51:29 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x29}}}}}, &(0x7f0000000100)) [ 871.515367][T13370] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop1 [ 871.585143][T13368] BTRFS error (device loop3): superblock checksum mismatch 11:51:29 executing program 0: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) 11:51:29 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2b}}}}}, &(0x7f0000000100)) 11:51:29 executing program 1: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c0214772737fd4096dea58fc22dda13384e5f0cf0cd4eb0901b193d00f47332f4acd57b3f00b83d923cf8e0d54811009ba320b908a29b4e7d3f81eed3f9d37d9cc1ed34f549a317bb42d4dd9d9fb479024bb199f1d0e0ce10e37590440846627dd16c09c9a1d87c35af642379add25477b", 0xac}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) [ 871.672119][T13368] BTRFS error (device loop3): open_ctree failed 11:51:29 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:29 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2c}}}}}, &(0x7f0000000100)) 11:51:29 executing program 0: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) 11:51:29 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:29 executing program 0: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) 11:51:29 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:29 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2f}}}}}, &(0x7f0000000100)) 11:51:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:29 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:29 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, 0x0) 11:51:30 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x32}}}}}, &(0x7f0000000100)) 11:51:30 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, 0x0) [ 872.478466][T13433] BTRFS error (device loop1): superblock checksum mismatch 11:51:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:30 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:30 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, 0x0) 11:51:30 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x33}}}}}, &(0x7f0000000100)) [ 872.551661][T13433] BTRFS error (device loop1): open_ctree failed 11:51:30 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:30 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3a}}}}}, &(0x7f0000000100)) 11:51:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:30 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:30 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3c}}}}}, &(0x7f0000000100)) 11:51:31 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x60}}}}}, &(0x7f0000000100)) 11:51:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 11:51:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 873.396603][T13481] BTRFS error (device loop1): superblock checksum mismatch 11:51:31 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x6c}}}}}, &(0x7f0000000100)) [ 873.449003][T13481] BTRFS error (device loop1): open_ctree failed 11:51:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:31 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 11:51:31 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x1f4}}}}}, &(0x7f0000000100)) 11:51:31 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 11:51:31 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x300}}}}}, &(0x7f0000000100)) 11:51:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 11:51:31 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3e8}}}}}, &(0x7f0000000100)) [ 874.209551][T13537] BTRFS error (device loop1): superblock checksum mismatch [ 874.235859][T13537] BTRFS error (device loop1): open_ctree failed 11:51:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 11:51:31 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3f0}}}}}, &(0x7f0000000100)) 11:51:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 11:51:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 11:51:32 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3fe}}}}}, &(0x7f0000000100)) 11:51:32 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:32 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:32 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0), 0x12) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000002580), 0x7fffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x80b0) 11:51:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 11:51:32 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x500}}}}}, &(0x7f0000000100)) 11:51:32 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 11:51:32 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0), 0x12) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000002580), 0x7fffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x80b0) 11:51:32 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x543}}}}}, &(0x7f0000000100)) 11:51:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 11:51:32 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x600}}}}}, &(0x7f0000000100)) 11:51:32 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0), 0x12) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000002580), 0x7fffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x80b0) 11:51:32 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 11:51:33 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x608}}}}}, &(0x7f0000000100)) 11:51:33 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 11:51:33 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 11:51:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:33 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x689}}}}}, &(0x7f0000000100)) 11:51:33 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 11:51:33 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:33 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x700}}}}}, &(0x7f0000000100)) [ 875.676416][T13653] BTRFS error (device loop0): superblock checksum mismatch 11:51:33 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x806}}}}}, &(0x7f0000000100)) 11:51:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:33 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) [ 875.800244][T13653] BTRFS error (device loop0): open_ctree failed 11:51:33 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xa00}}}}}, &(0x7f0000000100)) 11:51:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 11:51:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 11:51:33 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xb00}}}}}, &(0x7f0000000100)) 11:51:33 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xc00}}}}}, &(0x7f0000000100)) 11:51:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 11:51:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) [ 876.217270][T13716] BTRFS error (device loop0): superblock checksum mismatch 11:51:33 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xd00}}}}}, &(0x7f0000000100)) [ 876.299110][T13716] BTRFS error (device loop0): open_ctree failed 11:51:34 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:34 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xe80}}}}}, &(0x7f0000000100)) 11:51:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 11:51:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 11:51:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 11:51:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:34 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xf00}}}}}, &(0x7f0000000100)) 11:51:34 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 11:51:34 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x1100}}}}}, &(0x7f0000000100)) 11:51:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 11:51:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) [ 876.866500][T13763] BTRFS error (device loop0): superblock checksum mismatch 11:51:34 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 11:51:34 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x1400}}}}}, &(0x7f0000000100)) [ 876.930864][T13763] BTRFS error (device loop0): open_ctree failed 11:51:34 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:34 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x1f00}}}}}, &(0x7f0000000100)) 11:51:34 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 11:51:34 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 11:51:34 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2100}}}}}, &(0x7f0000000100)) 11:51:34 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 11:51:34 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2900}}}}}, &(0x7f0000000100)) 11:51:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 11:51:34 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 11:51:35 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:35 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2b00}}}}}, &(0x7f0000000100)) 11:51:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 11:51:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 11:51:35 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2c00}}}}}, &(0x7f0000000100)) 11:51:35 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2f00}}}}}, &(0x7f0000000100)) 11:51:35 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 11:51:35 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3200}}}}}, &(0x7f0000000100)) 11:51:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 11:51:35 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 11:51:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 11:51:35 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3300}}}}}, &(0x7f0000000100)) 11:51:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 11:51:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:35 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3580}}}}}, &(0x7f0000000100)) 11:51:36 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3a00}}}}}, &(0x7f0000000100)) 11:51:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 11:51:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 11:51:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 11:51:36 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947", 0xaa) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:36 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3c00}}}}}, &(0x7f0000000100)) 11:51:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 11:51:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 11:51:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 11:51:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 11:51:36 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3f00}}}}}, &(0x7f0000000100)) 11:51:36 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x4000}}}}}, &(0x7f0000000100)) 11:51:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 11:51:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 11:51:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 11:51:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 11:51:37 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:37 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x4305}}}}}, &(0x7f0000000100)) 11:51:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 11:51:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 11:51:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 11:51:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 11:51:37 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x4788}}}}}, &(0x7f0000000100)) 11:51:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 11:51:37 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x4888}}}}}, &(0x7f0000000100)) 11:51:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 11:51:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 11:51:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 11:51:38 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x6000}}}}}, &(0x7f0000000100)) 11:51:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 11:51:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 11:51:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 11:51:38 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 11:51:38 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x6488}}}}}, &(0x7f0000000100)) 11:51:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 11:51:38 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x6c00}}}}}, &(0x7f0000000100)) 11:51:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 11:51:38 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x800e}}}}}, &(0x7f0000000100)) 11:51:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 11:51:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 11:51:38 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8035}}}}}, &(0x7f0000000100)) 11:51:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 11:51:39 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8100}}}}}, &(0x7f0000000100)) 11:51:39 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 11:51:39 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8847}}}}}, &(0x7f0000000100)) 11:51:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 11:51:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 11:51:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 11:51:39 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8848}}}}}, &(0x7f0000000100)) 11:51:39 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8864}}}}}, &(0x7f0000000100)) 11:51:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 11:51:39 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8906}}}}}, &(0x7f0000000100)) 11:51:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 11:51:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 11:51:40 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xe803}}}}}, &(0x7f0000000100)) 11:51:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 11:51:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 11:51:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 11:51:40 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380), 0x0) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 11:51:40 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xf003}}}}}, &(0x7f0000000100)) 11:51:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 11:51:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 11:51:40 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xf401}}}}}, &(0x7f0000000100)) 11:51:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 11:51:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 11:51:40 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xfe03}}}}}, &(0x7f0000000100)) 11:51:40 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x20480}}}}}, &(0x7f0000000100)) 11:51:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 11:51:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 11:51:41 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380), 0x0) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 11:51:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 11:51:41 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x1000000}}}}}, &(0x7f0000000100)) 11:51:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 11:51:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 11:51:41 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2000000}}}}}, &(0x7f0000000100)) 11:51:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 11:51:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 11:51:41 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3000000}}}}}, &(0x7f0000000100)) 11:51:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 11:51:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 11:51:42 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380), 0x0) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 11:51:42 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x4000000}}}}}, &(0x7f0000000100)) 11:51:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 11:51:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 11:51:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 11:51:42 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x5000000}}}}}, &(0x7f0000000100)) 11:51:42 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x6000000}}}}}, &(0x7f0000000100)) 11:51:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 11:51:42 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x7000000}}}}}, &(0x7f0000000100)) 11:51:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 11:51:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 11:51:43 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741", 0x55) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:43 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8000000}}}}}, &(0x7f0000000100)) 11:51:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 11:51:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 11:51:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 11:51:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 11:51:43 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8060000}}}}}, &(0x7f0000000100)) 11:51:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:43 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xa000000}}}}}, &(0x7f0000000100)) 11:51:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 11:51:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 11:51:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:44 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741", 0x55) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:44 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xb000000}}}}}, &(0x7f0000000100)) 11:51:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 11:51:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 11:51:44 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xc000000}}}}}, &(0x7f0000000100)) 11:51:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 11:51:44 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xd000000}}}}}, &(0x7f0000000100)) 11:51:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:44 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xf000000}}}}}, &(0x7f0000000100)) 11:51:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:44 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741", 0x55) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 11:51:44 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x11000000}}}}}, &(0x7f0000000100)) 11:51:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 11:51:44 executing program 5: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c0214772737fd4096dea58fc22dda13384e5f0cf0cd4eb0901b193d00f47332f4acd57b3f00b83d923cf8e0d54811009ba320b908a29b4e7d3f81eed3f9d37d9cc1ed34f549a317bb42d4dd9d9fb479024bb199f1d0e0ce10e37590440846627dd16c09c9a1d87c35af642379add25477b", 0xac}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 11:51:44 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x14000000}}}}}, &(0x7f0000000100)) 11:51:45 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x1f000000}}}}}, &(0x7f0000000100)) 11:51:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 11:51:45 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:45 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x21000000}}}}}, &(0x7f0000000100)) 11:51:45 executing program 5: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="a7c17401eae1616826f5c0f35cf493b1d26894ace6c0629e1cc837128443332ff2e23aaa71a344d8f972b17ba8cb44b6c521a6adcd228dc0d9ef24c0214772737fd4096dea58fc22dda13384e5f0cf0cd4eb0901b193d00f47332f4acd57b3f00b83d923cf8e0d54811009ba320b908a29b4e7d3f81eed3f9d37d9cc1ed34f549a317bb42d4dd9d9fb479024bb199f1d0e0ce10e37590440846627dd16c09c9a1d87c35af642379add25477b", 0xac}], 0x1}, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 11:51:45 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 11:51:45 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x29000000}}}}}, &(0x7f0000000100)) 11:51:45 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:45 executing program 5: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x8847, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) 11:51:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 11:51:45 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2b000000}}}}}, &(0x7f0000000100)) 11:51:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 11:51:45 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2c000000}}}}}, &(0x7f0000000100)) 11:51:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 11:51:46 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 888.365974][T14561] BTRFS error (device loop5): superblock checksum mismatch [ 888.444309][T14561] BTRFS error (device loop5): open_ctree failed 11:51:46 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1", 0x56) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:46 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2f000000}}}}}, &(0x7f0000000100)) 11:51:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 11:51:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x215) open$dir(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000000340)={0x90, 0x0, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}}, 0x90) 11:51:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 11:51:46 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x32000000}}}}}, &(0x7f0000000100)) 11:51:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 11:51:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440)={0x8, "c0c814a55b632bd28afc61ac7dd1ffb869b761e8e53ee36e4be89e9fea175523e4468dec44bf8b5473c7a5062b4ede67dcb24cb9484ccfff2b3a70befc56e8ab2eee3483f5bf78c16beac035b700eb84e2216f268d02b717d2046c273814475b412437f7dc08a13a55d3c02132999dfd9fe80b750eff4d7c1da975b3835602728ae09e72527fcee19377e29c6c19e1ccce0f75e0e54001e3e83e473fa3d37eca8be1b3de565571e0e84f310c11fa8616068113b038aaa5c69967699fc2aa41c6f26fc22cf68e3577242c9b4ca20fab9de5885e0648fbd7af089b05f38f152d2f8144461608733c567b6dc5d2a07022c3764565c85abcfd99dd7a85e58939278235d50e8b321be7dbaa5141e097c28364fad2f713d666ca94f4e429687fcabb72aceeaf8abe5b506d98dc393b6e97492d785ead0ca2953f92c4d2b2c9f616e3d98b36be55a923fc5892413f7a3b615cec89b52e0ecdcee0aa5af72bcbb91b4bade7435dd8b529feaf13f8b48fcaca5952235d2e909f8831d8ca05a0daa3f6c581f388e0c1879b41fe63ef3d122bd0c5acd4fb07b96797918791075ae7383bb1bbdea574b31301ff37ecc45671ee2e7fc55bf6244025d1fd82dca56a42a23aa826a0b1e102bd87893ddc05649304eb1866c796e46e0d57f552bd572891ef892918bb2e7f2c6bcf68f388ea0c50f48c06de1b46b1434cdf25ca1288ebabe2a33d1c6effb77f91ef75471e93952caeda8ac2b2677e46d62b8366922d093832bccb949e177b4417864812d22972d81d89158288b5318d017329d4e8f66273abf74c434f318ebf32c7629342a85336387231b1e579d57cff0b125bef9dddf0fc33f71cb59d5a8972cda06ba6bba4a89cb8d3b465492c431698984998b2979ea61fed3d99b049724f2bdda5a0700ccb28825da1343f41290e569a6d38d4ae3968147cf39b097efd78e058fc71523c12e724bf93dc4ecc02b5cb18d13b59ec8f85368ac1ea93ed0149c60c53569dc69cdb3f37470eab26ef010b03a7e651b9e8e9065da347660836eddb3988c9a0f394aad055f727310f646d6cb35131d02aaf24735792bfce250798bebf0d1a4495fca568b9449e81afef2937b50faf873257d7efa07d31759474d50ca2a7922e79ab47dd59b11dfd1ec43fef3551aed81d01ee4ab997c6cecc39013dcaa442aec803e4cebbc288b4f9e87b30613f0ec88ddc6f60f56787f4040897e6e6bdac317d74b27f97f2efadb031f03c61954fd0232373582b7fa315d3eb9f67053126d2ed0636f04d669c47bdeb078fbda177533902e20b5ce9d8f395ea4c0aaf2cae774fe99bc40105a9ca184bcb598ab2f49c1df62d32d1a6d73a26812cb47a2ccaf0e9b759df89ad1e18238d897b9fd658f6786a92a0c12bd0ee6dad8a430a67962363e5b9afb3329e4f1f6fcd7e63cb8f24872bcf5b8c349d9ce423666ca39f16884219dea338b388e40f4ad996419cb3858637364d8e5af67f846d77b2749115131a3642ef56681315e4a2cbca5e60febabf693570f515e09c2a8994a8e2be3cba28118ef429d4de781118182607dd2c2d5aaba621ea29c140338bd8f1787fd2a3f43bb7fa22a8ce053adb331a4c78eab569af317e14360a6bf1c8b7394f34bfc1a941ac88dab334d5a2d45fc83bee28884698fd82339c972a06efb369220049ca89727513bd4262ad6f94f55f659ec98b684b1d92e1b6a303548a196cc5316e9845baaf01e737ef047d3d1ac4fe13de618e8fd6471c225e688b73b866213f4765c1a1ecf041f66a11177b0425b0423c455dccfa35a34f3b1c4c9850267bd41dcc366f4f8fef6982699e9aee7f3edff90217c84f6865234676e65911e5e99739792161766e959d061d6e86797b595ae3cffc043da0929dce1b4bd27e04532800f14f69398a681d46f00197f547fa138e676a4c84e586e9a2037faad7d7342221c229ff13606688ab70305dc28d01270604fbcb2b5777541e637a10e7d6c2dfa76461b18c8b303234282f31b7ed8afd0cdcc3978c6520a182000ea312296c7d9df08c2a67b944bc519113822014a831c8d6a7f8d26a7a443666b6077bdc1c11cf47001bcbb484d163543445c77a02140191bbb813da818b4dc3ef1ca420f624e5cb67c48024aeb8691b549202750899938067a3ad49da19e9fffc6486b3525fba8b2ff991fb3b4c1a536818f2dad96f713ac264a22136c6a3a9eacb4f69ab08cfe2b971a7d916833c6a0370d4b0bc428db2e4b4013899668b73caf9c983e2f07e46b4b5b4f0d231edee8b1951e1d0e34c881d1fc5c6be05b92b13680398e7109bd18048f0bd980fceb24e59411873e7a8a7f95f4da2ba5c082fdda710361e163a213a3dbb82c08a69020545da4636c09a67cd962182a011cf5eb1c3d999abc7b834ee518bb53afe19941927ca190699abf79c334c52e206fc851deb7398947ad5bd125ef3f51349497142e921c85506c739f6319ae0eb8e3c551ceb7e16afc2d6aad36841ed8eb560ef984ee5e00f1ead2c646546b3c145e3700b07fc257551641cf3dcb76a8b3cc75994f2c3eb521cea22d64c8b72b2de506fde8185b70b4707b7f571668a5925ca21e605904d7c896a5d7290b9c4fc75ecc7ddbbd7f6f003a74f53d1a5432e0377a3efce1e7ac61e36dc13aeea57400d4d3986db3fccb6edaf83f86daeb42f416f58c502e74178e013b399d0b155e0df86b40b5f3f2ab0ad61c90870cee340c07977b55622699101e5372677dd4e208fa6b5d4834a2d6f37b2ead107218aa0e702d1f6a60bd4ad3a2e22807237129fdc02993ef1fffe3c285bd4f7b093b2da8d772ce2df7874bf9b7fd0893eb66a4931acc38129bfe4a8fc6b28ea83bcca1220b66c86d4d90914bb9e9a425fce618f11b66f93aa78515eac0f3956cb1e8b6f12d7f6f22c1ca5563e280b15c64732aec2a37d6010cee0fd2263ea3ea2011043153284b4a5fc87cc0dd8c36f084ce715a6e9ba3e8b2586726255d122f2b5677d6590405ae031df8f83840ef3011a7f5d18037407758270d980aa65d5a4aa26a35a61b65178b6183b282771e89a8fe47bd3ea5a23146b924a47c3cc2540a9c8d91d4a8924e010fb6d3e60457e0aa86749cc3444707fda055a0f489aecda68af7f0d7d31cf25641a10bcc0d00996cddf9059121639fa3ff2e5490bae6b702fcf226d8e50f27f0973e5e4cf543445524d0fe3bd55d3f215978bfabcba0d44c076f5b333b2095c70f6a5426338bf0c065ddce27f6730606d84d1ccef8cebcd15085fa8a5d0975dc47eeb09a4ab6da21d01916c97f4e266c4b01f2bfb3b6a08bb5a7cf834e56782d824e7c55b591cd883ed9e806a4f7033bbab49a2b8ab2cb0f6da9d76968208236b35a51f8eba3769a676ad60d69c475706a630f3a078ebaa6ba5bc25719867cb61d48cc3a381b261165c04f3c93f37d72fc15f43df1de34e24e80a46f5d15fb362e71cb4a5365dde04a53dc5e42745fbd601ff148db416244dd76ac16f24138ef9a02491eb5b48d731a8bdcd46040d0ff11a07c040b83db84bfd21ffb1d818203cb7d3f8fca47f1dc510afa8219ab031aaba2147aed7c50228930e895a72abf55ca6997131e231ea92e0059b680735548adf2d572c3540e096a644deb3750e3b341bbeffee70ff22e0b4e56142e4c1965c01a646dd9b5b0055f88f08987ad45adb844b9ffc84792073048c28bcb60f2666802052ee45dcd9a2950d55ecf0234a3dcf67e83cfa0bfb1285eb54e6292d8075c9e1b459e48556f416898557c9c864fc5de459feb53e33dd1a6860a2d1a836ab5ff6efaee123b3715a7137787ee4345efbce38074e262f363a8ff400345c8539d44a7286c7291246810bce063f0877db6585842380b530a4aaef6e36779a95fed220cef6c1fff2fdd5031f83987dc3282d432f322852cc9dc6d00c59d5ed83b386ff97c521e528e59f2df932467ac02d17f8818c2de26d69725f42cecaf186fab7b6e10b1ebd9a9a12ed83cd382d9a6f9a9bed2736cb0ec0260057f5ec704d2e1a64caad59e02ff2022174b23564cb0942e6769b12e0ae4d65dc4c5e6b6ceaf2667e085909c93a9768b7bfdac612801c0bc3848bad51e2367f788cbd1c5091ce0e9c567528c72003712e91247d87f1ff60d3865fc687a35886822079392f8d151b89e09469bef98e59139c460a53805a93245148cbb9a6a010dadc87e9b1a0e0a89e87e433ff1c0ad4b125760858c8badff4d82cbd31cf88f3e2e16a4e960e1e0b5825fc0f2b21d660cf60069d43fb6a8a96c44fa922164f02c9cd5ebb6fad848871224d157777b5a70dc6deb988506bd03aa4ce2200e9ce23641221784250c22d2c8635a3512f45d433cf66e158eb261f48a23d54f5ef4358df3487da471eb5775bdba565ee170be126b2300d0dad050212606f2d77a63fa2ab430e62670e852b89944e611509415bee36bf0961c8918bd8b0eb8af45b1a9d0420c7101a9c5f4a63efb9cc8de7897b5e2b02cb5885ad8d0d8ac7754ba8d4e9d37175e614e3f3a6a7b122bbc6dd9ce78f1b9a4e940a1160bb85650d8932fe1a82d0525630ba017be5129625a45c3cae66c7cdaa33ee704791db81ef2e11a2f528974fa388cd929c934dbdb21425e6117839ab33b2926b036457db3a43083c3ec17231aed4ee5b607a45a5735c9470c03a424b43efcea953c078717344aeb1449c0dfa3a3ec224b542c16cf735466bdaf26b522aef1db547b14f07ebd4f5da34426a46007757be47ed3f643c47f2c4467762cd049d6f4cf8a78d04f8318bdedcee80871e91c0330499d88254555c456d9bde8a892394267eac15c230cf7e7ba19ebc01b1905c80476de3cea8258f6d0820d159f4aa8a37fb378b2685da4e0e89d253187219869f1157bbe4a8a43eabf65e86a6d9b21e25d91c43c3036914427833ed87073886719069148e2e47219bb5da5d9664d64dc5c4ff71c0e808dadbb53a23e41e3c02fd0c9e0704490f3283d1864d15d795882e6522f31445556cab6832f273dac0c7aef4e3f8c09a34d1624fdb087d852f2e827fb2c3105f1afda54b9dc12cfde3cf7747daa5ac70904e82636a13155303f9a1198d6e7f9dc7be394ebc5db9e8380e290e6cae5f320caa56aa94490789fce2e2540b3de8865396f58e14d61d3cb122f7bd1af5a27c6fe733eba3cc39106efc906ea967fb833e2480aa80bd56ccd9e5c25304e2b8135f1453af70059e599cb67bc8eaaa38c39768e74d3da8aba0135f0192d7ddf0149ce62f353b0360251f1f88b272c6e85b4ee4e0563a6de80de83749af6e6aa4d80cab7031aff3f7e8d0c9114940549f828a62be9fd6a16db001369728b4b93d4ecf91563ae03def3ca4e9900a97657c4ff1e41c5742fb3329ba882ed61645aedb22f2543b83cd4007e5d228697a48064acc32ece41f2d5ead3f31a9689249e8b4bb57ac0b136b6c60ec531708235b94db823344aafbb9b79e21959635664b2193c3add0b28767906b7ba4118e6548e9a23b49e9181dc6f7dc7857425c9ab1b1451bc4572fd060190d0b5a76b8368b68e72a212bd0f89d0778d293b1d32f155f30c9aafe7215d2e746ea8f2c73a30bcd8c093a489519b60616b15afe69074ee77fb65caf5faf0aad49106057a91fdcd622a07ac21eb5c221f2e65323228af41b3eb894517c34c4f60ba20fb6f6c4309a7357884c0eeeb0a4874550107f2d0ffdc412f86bdf712f96183b3932cfb4da3f179cde1a288df9af09c243fae8c67b0d208d9cdb7adde8d5e548e0624b19da4818ef656b88280a", 0x1000}, 0xfffffc41) 11:51:46 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x33000000}}}}}, &(0x7f0000000100)) 11:51:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 11:51:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:47 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3a000000}}}}}, &(0x7f0000000100)) 11:51:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 11:51:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 11:51:47 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1", 0x56) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:47 executing program 5: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x50, 0x88a8ffff, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000100)={0x0, 0x2, [0x4, 0x5a]}) 11:51:47 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3c000000}}}}}, &(0x7f0000000100)) 11:51:47 executing program 5: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x50, 0x6488, 0x0, 0x0, 0x806, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000100)={0x0, 0x2, [0x4, 0x5a]}) 11:51:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 11:51:47 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:47 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3f000000}}}}}, &(0x7f0000000100)) 11:51:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 11:51:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 11:51:47 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x40000000}}}}}, &(0x7f0000000100)) [ 890.201357][T14688] FAULT_INJECTION: forcing a failure. [ 890.201357][T14688] name failslab, interval 1, probability 0, space 0, times 0 [ 890.236720][T14688] CPU: 1 PID: 14688 Comm: syz-executor.5 Not tainted 5.3.0-rc4 #73 [ 890.244777][T14688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.254938][T14688] Call Trace: [ 890.258229][T14688] dump_stack+0x1d8/0x2f8 [ 890.262553][T14688] should_fail+0x555/0x770 [ 890.266965][T14688] __should_failslab+0x11a/0x160 [ 890.271890][T14688] ? __se_sys_memfd_create+0x10a/0x4b0 [ 890.277339][T14688] should_failslab+0x9/0x20 [ 890.281868][T14688] __kmalloc+0x7a/0x340 [ 890.286117][T14688] __se_sys_memfd_create+0x10a/0x4b0 [ 890.291384][T14688] ? do_syscall_64+0x1d/0x140 [ 890.296051][T14688] __x64_sys_memfd_create+0x5b/0x70 [ 890.301244][T14688] do_syscall_64+0xfe/0x140 [ 890.305748][T14688] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 890.311624][T14688] RIP: 0033:0x459829 [ 890.315495][T14688] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 890.335911][T14688] RSP: 002b:00007f6edf00ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 11:51:48 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 890.344317][T14688] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 890.352277][T14688] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 890.360440][T14688] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 890.368467][T14688] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6edf00c6d4 [ 890.376445][T14688] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 890.491335][T14704] FAULT_INJECTION: forcing a failure. [ 890.491335][T14704] name failslab, interval 1, probability 0, space 0, times 0 [ 890.512854][T14704] CPU: 1 PID: 14704 Comm: syz-executor.5 Not tainted 5.3.0-rc4 #73 [ 890.520889][T14704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.531395][T14704] Call Trace: [ 890.534743][T14704] dump_stack+0x1d8/0x2f8 [ 890.539065][T14704] should_fail+0x555/0x770 [ 890.543468][T14704] __should_failslab+0x11a/0x160 [ 890.548390][T14704] ? shmem_alloc_inode+0x1b/0x40 [ 890.553446][T14704] should_failslab+0x9/0x20 [ 890.557939][T14704] kmem_cache_alloc+0x56/0x2e0 [ 890.562695][T14704] ? shmem_fallocate+0xc90/0xc90 [ 890.567703][T14704] shmem_alloc_inode+0x1b/0x40 [ 890.572450][T14704] ? shmem_fallocate+0xc90/0xc90 [ 890.577362][T14704] new_inode_pseudo+0x68/0x240 [ 890.582605][T14704] new_inode+0x28/0x1c0 [ 890.586756][T14704] ? __kasan_check_read+0x11/0x20 [ 890.591768][T14704] shmem_get_inode+0x11b/0x700 [ 890.596534][T14704] ? __alloc_fd+0x58f/0x630 [ 890.601144][T14704] __shmem_file_setup+0x129/0x280 [ 890.606160][T14704] shmem_file_setup+0x2f/0x40 [ 890.610840][T14704] __se_sys_memfd_create+0x28e/0x4b0 [ 890.616121][T14704] ? do_syscall_64+0x1d/0x140 [ 890.620813][T14704] __x64_sys_memfd_create+0x5b/0x70 [ 890.626003][T14704] do_syscall_64+0xfe/0x140 [ 890.630512][T14704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 890.636474][T14704] RIP: 0033:0x459829 [ 890.640350][T14704] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 890.660119][T14704] RSP: 002b:00007f6edf00ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 890.668548][T14704] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 890.676504][T14704] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 890.684473][T14704] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 890.692437][T14704] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6edf00c6d4 [ 890.700455][T14704] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:51:48 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1", 0x56) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 11:51:48 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x43050000}}}}}, &(0x7f0000000100)) 11:51:48 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:48 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x60000000}}}}}, &(0x7f0000000100)) [ 890.866398][T14718] FAULT_INJECTION: forcing a failure. [ 890.866398][T14718] name failslab, interval 1, probability 0, space 0, times 0 [ 890.938982][T14718] CPU: 0 PID: 14718 Comm: syz-executor.5 Not tainted 5.3.0-rc4 #73 [ 890.947260][T14718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.957997][T14718] Call Trace: [ 890.961997][T14718] dump_stack+0x1d8/0x2f8 [ 890.966426][T14718] should_fail+0x555/0x770 [ 890.970932][T14718] __should_failslab+0x11a/0x160 [ 890.975873][T14718] ? security_inode_alloc+0x36/0x1e0 [ 890.981281][T14718] should_failslab+0x9/0x20 [ 890.985880][T14718] kmem_cache_alloc+0x56/0x2e0 [ 890.990631][T14718] security_inode_alloc+0x36/0x1e0 [ 890.995844][T14718] inode_init_always+0x3b5/0x8d0 [ 891.000777][T14718] ? shmem_fallocate+0xc90/0xc90 [ 891.005708][T14718] new_inode_pseudo+0x7f/0x240 [ 891.010471][T14718] new_inode+0x28/0x1c0 [ 891.014630][T14718] ? __kasan_check_read+0x11/0x20 [ 891.019673][T14718] shmem_get_inode+0x11b/0x700 [ 891.024437][T14718] ? __alloc_fd+0x58f/0x630 [ 891.028938][T14718] __shmem_file_setup+0x129/0x280 [ 891.033973][T14718] shmem_file_setup+0x2f/0x40 [ 891.038656][T14718] __se_sys_memfd_create+0x28e/0x4b0 [ 891.043953][T14718] ? do_syscall_64+0x1d/0x140 [ 891.048971][T14718] __x64_sys_memfd_create+0x5b/0x70 [ 891.054158][T14718] do_syscall_64+0xfe/0x140 [ 891.058662][T14718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 891.064557][T14718] RIP: 0033:0x459829 [ 891.068449][T14718] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:51:48 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 891.088226][T14718] RSP: 002b:00007f6edf00ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 891.096708][T14718] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 891.104778][T14718] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 891.112757][T14718] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 891.120730][T14718] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6edf00c6d4 [ 891.128691][T14718] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:51:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 11:51:48 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x6c000000}}}}}, &(0x7f0000000100)) [ 891.263361][T14739] FAULT_INJECTION: forcing a failure. [ 891.263361][T14739] name failslab, interval 1, probability 0, space 0, times 0 [ 891.279289][T14739] CPU: 0 PID: 14739 Comm: syz-executor.5 Not tainted 5.3.0-rc4 #73 [ 891.287241][T14739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.297298][T14739] Call Trace: [ 891.300592][T14739] dump_stack+0x1d8/0x2f8 [ 891.304930][T14739] should_fail+0x555/0x770 [ 891.309357][T14739] __should_failslab+0x11a/0x160 [ 891.314297][T14739] ? __d_alloc+0x2d/0x6e0 [ 891.318630][T14739] should_failslab+0x9/0x20 [ 891.323135][T14739] kmem_cache_alloc+0x56/0x2e0 [ 891.327911][T14739] __d_alloc+0x2d/0x6e0 [ 891.332067][T14739] ? lockdep_init_map+0x2a/0x680 [ 891.337005][T14739] d_alloc_pseudo+0x1d/0x70 [ 891.341711][T14739] alloc_file_pseudo+0xc3/0x260 [ 891.346654][T14739] __shmem_file_setup+0x1a2/0x280 [ 891.351864][T14739] shmem_file_setup+0x2f/0x40 [ 891.356550][T14739] __se_sys_memfd_create+0x28e/0x4b0 [ 891.361870][T14739] ? do_syscall_64+0x1d/0x140 [ 891.366552][T14739] __x64_sys_memfd_create+0x5b/0x70 [ 891.371847][T14739] do_syscall_64+0xfe/0x140 [ 891.376798][T14739] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 891.382694][T14739] RIP: 0033:0x459829 [ 891.386620][T14739] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:51:48 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x80040200}}}}}, &(0x7f0000000100)) 11:51:49 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x800e0000}}}}}, &(0x7f0000000100)) [ 891.406448][T14739] RSP: 002b:00007f6edf00ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 891.415009][T14739] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 891.423096][T14739] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 891.431074][T14739] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 891.439047][T14739] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6edf00c6d4 [ 891.447022][T14739] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:51:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:49 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x80350000}}}}}, &(0x7f0000000100)) 11:51:49 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:49 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:49 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f", 0x6b) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) [ 891.769791][T14766] FAULT_INJECTION: forcing a failure. [ 891.769791][T14766] name failslab, interval 1, probability 0, space 0, times 0 [ 891.783580][T14767] FAULT_INJECTION: forcing a failure. [ 891.783580][T14767] name failslab, interval 1, probability 0, space 0, times 0 [ 891.811670][T14766] CPU: 0 PID: 14766 Comm: syz-executor.5 Not tainted 5.3.0-rc4 #73 [ 891.819700][T14766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.829834][T14766] Call Trace: [ 891.829853][T14766] dump_stack+0x1d8/0x2f8 [ 891.829867][T14766] should_fail+0x555/0x770 [ 891.829881][T14766] __should_failslab+0x11a/0x160 [ 891.829889][T14766] ? __alloc_file+0x2c/0x390 [ 891.829902][T14766] should_failslab+0x9/0x20 [ 891.829915][T14766] kmem_cache_alloc+0x56/0x2e0 [ 891.861545][T14766] ? trace_lock_release+0x135/0x1a0 [ 891.866743][T14766] __alloc_file+0x2c/0x390 [ 891.871161][T14766] alloc_empty_file+0xac/0x1b0 [ 891.876014][T14766] alloc_file+0x60/0x4c0 [ 891.880246][T14766] alloc_file_pseudo+0x1d4/0x260 [ 891.885365][T14766] __shmem_file_setup+0x1a2/0x280 [ 891.890378][T14766] shmem_file_setup+0x2f/0x40 [ 891.895039][T14766] __se_sys_memfd_create+0x28e/0x4b0 [ 891.900316][T14766] ? do_syscall_64+0x1d/0x140 [ 891.904985][T14766] __x64_sys_memfd_create+0x5b/0x70 [ 891.910168][T14766] do_syscall_64+0xfe/0x140 [ 891.914663][T14766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 891.920551][T14766] RIP: 0033:0x459829 [ 891.924610][T14766] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 891.944401][T14766] RSP: 002b:00007f6edf00ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 891.953097][T14766] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 891.961765][T14766] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 891.969856][T14766] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 891.977828][T14766] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6edf00c6d4 [ 891.985799][T14766] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 891.993801][T14767] CPU: 1 PID: 14767 Comm: syz-executor.1 Not tainted 5.3.0-rc4 #73 [ 892.001697][T14767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.011754][T14767] Call Trace: [ 892.015133][T14767] dump_stack+0x1d8/0x2f8 11:51:49 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x81000000}}}}}, &(0x7f0000000100)) 11:51:49 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 892.019461][T14767] should_fail+0x555/0x770 [ 892.023874][T14767] __should_failslab+0x11a/0x160 [ 892.028983][T14767] ? __se_sys_memfd_create+0x10a/0x4b0 [ 892.034423][T14767] should_failslab+0x9/0x20 [ 892.039038][T14767] __kmalloc+0x7a/0x340 [ 892.043178][T14767] __se_sys_memfd_create+0x10a/0x4b0 [ 892.048446][T14767] ? do_syscall_64+0x1d/0x140 [ 892.053215][T14767] __x64_sys_memfd_create+0x5b/0x70 [ 892.058399][T14767] do_syscall_64+0xfe/0x140 [ 892.062932][T14767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 892.069189][T14767] RIP: 0033:0x459829 [ 892.073073][T14767] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 892.092677][T14767] RSP: 002b:00007f93b2fcea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 892.101069][T14767] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 892.109029][T14767] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 11:51:49 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:49 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f", 0x6b) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) [ 892.117010][T14767] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 892.124973][T14767] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f93b2fcf6d4 [ 892.132931][T14767] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:51:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:51:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) [ 892.220270][T14779] FAULT_INJECTION: forcing a failure. [ 892.220270][T14779] name failslab, interval 1, probability 0, space 0, times 0 [ 892.299101][T14791] FAULT_INJECTION: forcing a failure. [ 892.299101][T14791] name failslab, interval 1, probability 0, space 0, times 0 [ 892.310328][T14779] CPU: 0 PID: 14779 Comm: syz-executor.5 Not tainted 5.3.0-rc4 #73 [ 892.319604][T14779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.319609][T14779] Call Trace: [ 892.319626][T14779] dump_stack+0x1d8/0x2f8 [ 892.319641][T14779] should_fail+0x555/0x770 [ 892.319654][T14779] __should_failslab+0x11a/0x160 [ 892.319669][T14779] ? security_file_alloc+0x36/0x200 [ 892.352842][T14779] should_failslab+0x9/0x20 [ 892.357378][T14779] kmem_cache_alloc+0x56/0x2e0 [ 892.362254][T14779] security_file_alloc+0x36/0x200 [ 892.362268][T14779] __alloc_file+0xde/0x390 [ 892.362279][T14779] alloc_empty_file+0xac/0x1b0 [ 892.362288][T14779] alloc_file+0x60/0x4c0 [ 892.362301][T14779] alloc_file_pseudo+0x1d4/0x260 [ 892.362318][T14779] __shmem_file_setup+0x1a2/0x280 [ 892.362330][T14779] shmem_file_setup+0x2f/0x40 [ 892.396463][T14779] __se_sys_memfd_create+0x28e/0x4b0 [ 892.402033][T14779] ? do_syscall_64+0x1d/0x140 [ 892.406722][T14779] __x64_sys_memfd_create+0x5b/0x70 [ 892.411924][T14779] do_syscall_64+0xfe/0x140 [ 892.416431][T14779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 892.422323][T14779] RIP: 0033:0x459829 [ 892.426474][T14779] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:51:50 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x84ffffff}}}}}, &(0x7f0000000100)) [ 892.446078][T14779] RSP: 002b:00007f6edf00ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 892.454573][T14779] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 892.464021][T14779] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 892.472348][T14779] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 892.480329][T14779] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6edf00c6d4 [ 892.488307][T14779] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 892.499317][T14791] CPU: 1 PID: 14791 Comm: syz-executor.1 Not tainted 5.3.0-rc4 #73 [ 892.507432][T14791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.517571][T14791] Call Trace: [ 892.520861][T14791] dump_stack+0x1d8/0x2f8 [ 892.525285][T14791] should_fail+0x555/0x770 [ 892.529870][T14791] __should_failslab+0x11a/0x160 [ 892.534801][T14791] ? shmem_alloc_inode+0x1b/0x40 [ 892.539742][T14791] should_failslab+0x9/0x20 [ 892.544244][T14791] kmem_cache_alloc+0x56/0x2e0 [ 892.549012][T14791] ? shmem_fallocate+0xc90/0xc90 [ 892.553939][T14791] shmem_alloc_inode+0x1b/0x40 [ 892.558710][T14791] ? shmem_fallocate+0xc90/0xc90 [ 892.563634][T14791] new_inode_pseudo+0x68/0x240 [ 892.568396][T14791] new_inode+0x28/0x1c0 [ 892.572560][T14791] ? __kasan_check_read+0x11/0x20 [ 892.577590][T14791] shmem_get_inode+0x11b/0x700 [ 892.582356][T14791] ? __alloc_fd+0x58f/0x630 [ 892.586920][T14791] __shmem_file_setup+0x129/0x280 [ 892.591937][T14791] shmem_file_setup+0x2f/0x40 [ 892.596593][T14791] __se_sys_memfd_create+0x28e/0x4b0 [ 892.601862][T14791] ? do_syscall_64+0x1d/0x140 [ 892.606530][T14791] __x64_sys_memfd_create+0x5b/0x70 [ 892.611729][T14791] do_syscall_64+0xfe/0x140 [ 892.616275][T14791] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 892.622176][T14791] RIP: 0033:0x459829 [ 892.626078][T14791] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:51:50 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:50 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 892.645761][T14791] RSP: 002b:00007f93b2fcea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 892.654162][T14791] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 892.663600][T14791] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 892.671560][T14791] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 892.679515][T14791] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f93b2fcf6d4 [ 892.687472][T14791] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 892.773139][T14807] FAULT_INJECTION: forcing a failure. [ 892.773139][T14807] name failslab, interval 1, probability 0, space 0, times 0 [ 892.787684][T14808] FAULT_INJECTION: forcing a failure. [ 892.787684][T14808] name failslab, interval 1, probability 0, space 0, times 0 [ 892.810100][T14808] CPU: 0 PID: 14808 Comm: syz-executor.5 Not tainted 5.3.0-rc4 #73 11:51:50 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x86ddffff}}}}}, &(0x7f0000000100)) [ 892.818003][T14808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.828109][T14808] Call Trace: [ 892.831410][T14808] dump_stack+0x1d8/0x2f8 [ 892.835840][T14808] should_fail+0x555/0x770 [ 892.840271][T14808] __should_failslab+0x11a/0x160 [ 892.845312][T14808] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 892.851076][T14808] should_failslab+0x9/0x20 [ 892.855585][T14808] __kmalloc+0x7a/0x340 [ 892.859743][T14808] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 892.865463][T14808] tomoyo_realpath_from_path+0xdc/0x7c0 [ 892.871011][T14808] tomoyo_path_perm+0x192/0x850 [ 892.875881][T14808] ? perf_trace_lock_acquire+0x97/0x3b0 [ 892.881522][T14808] tomoyo_path_truncate+0x1c/0x20 [ 892.886540][T14808] security_path_truncate+0xd5/0x150 [ 892.891830][T14808] do_sys_ftruncate+0x493/0x710 [ 892.896672][T14808] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 892.902391][T14808] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 892.907839][T14808] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 892.913548][T14808] ? trace_hardirqs_off_caller+0x58/0x80 [ 892.919167][T14808] ? do_syscall_64+0x1d/0x140 [ 892.923838][T14808] __x64_sys_ftruncate+0x60/0x70 [ 892.928781][T14808] do_syscall_64+0xfe/0x140 [ 892.933390][T14808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 892.939402][T14808] RIP: 0033:0x4597f7 [ 892.943287][T14808] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 892.964805][T14808] RSP: 002b:00007f6edf00ba88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 892.973215][T14808] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 00000000004597f7 [ 892.981185][T14808] RDX: 0000000020000028 RSI: 0000000000020000 RDI: 0000000000000004 [ 892.989151][T14808] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 892.997123][T14808] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 893.005089][T14808] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 893.013089][T14807] CPU: 1 PID: 14807 Comm: syz-executor.1 Not tainted 5.3.0-rc4 #73 11:51:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) [ 893.016732][T14808] ERROR: Out of memory at tomoyo_realpath_from_path. [ 893.020973][T14807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 893.020977][T14807] Call Trace: [ 893.020993][T14807] dump_stack+0x1d8/0x2f8 [ 893.021008][T14807] should_fail+0x555/0x770 [ 893.021023][T14807] __should_failslab+0x11a/0x160 [ 893.021033][T14807] ? security_inode_alloc+0x36/0x1e0 [ 893.021048][T14807] should_failslab+0x9/0x20 [ 893.038269][T14807] kmem_cache_alloc+0x56/0x2e0 [ 893.038284][T14807] security_inode_alloc+0x36/0x1e0 [ 893.038296][T14807] inode_init_always+0x3b5/0x8d0 [ 893.038307][T14807] ? shmem_fallocate+0xc90/0xc90 [ 893.038316][T14807] new_inode_pseudo+0x7f/0x240 [ 893.038325][T14807] new_inode+0x28/0x1c0 [ 893.038333][T14807] ? __kasan_check_read+0x11/0x20 [ 893.038346][T14807] shmem_get_inode+0x11b/0x700 [ 893.045916][T14807] ? __alloc_fd+0x58f/0x630 [ 893.045929][T14807] __shmem_file_setup+0x129/0x280 [ 893.045942][T14807] shmem_file_setup+0x2f/0x40 [ 893.045952][T14807] __se_sys_memfd_create+0x28e/0x4b0 11:51:50 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f", 0x6b) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:50 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 893.045963][T14807] ? do_syscall_64+0x1d/0x140 [ 893.045973][T14807] __x64_sys_memfd_create+0x5b/0x70 [ 893.045982][T14807] do_syscall_64+0xfe/0x140 [ 893.045996][T14807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 893.103736][T14807] RIP: 0033:0x459829 [ 893.103747][T14807] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 893.103752][T14807] RSP: 002b:00007f93b2fcea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 893.103762][T14807] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 893.103768][T14807] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 893.103774][T14807] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 893.103779][T14807] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f93b2fcf6d4 [ 893.103783][T14807] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:51:50 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x88470000}}}}}, &(0x7f0000000100)) [ 893.292921][T14808] BTRFS error (device loop5): superblock checksum mismatch [ 893.298453][T14824] FAULT_INJECTION: forcing a failure. [ 893.298453][T14824] name failslab, interval 1, probability 0, space 0, times 0 [ 893.315159][T14824] CPU: 0 PID: 14824 Comm: syz-executor.1 Not tainted 5.3.0-rc4 #73 [ 893.323076][T14824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 893.333305][T14824] Call Trace: [ 893.336604][T14824] dump_stack+0x1d8/0x2f8 [ 893.341280][T14824] should_fail+0x555/0x770 [ 893.345729][T14824] __should_failslab+0x11a/0x160 [ 893.351181][T14824] ? __d_alloc+0x2d/0x6e0 [ 893.355584][T14824] should_failslab+0x9/0x20 [ 893.360508][T14824] kmem_cache_alloc+0x56/0x2e0 [ 893.365976][T14824] __d_alloc+0x2d/0x6e0 [ 893.370130][T14824] ? lockdep_init_map+0x2a/0x680 [ 893.375061][T14824] d_alloc_pseudo+0x1d/0x70 [ 893.379573][T14824] alloc_file_pseudo+0xc3/0x260 [ 893.384424][T14824] __shmem_file_setup+0x1a2/0x280 [ 893.389553][T14824] shmem_file_setup+0x2f/0x40 [ 893.394221][T14824] __se_sys_memfd_create+0x28e/0x4b0 [ 893.399679][T14824] ? do_syscall_64+0x1d/0x140 [ 893.404354][T14824] __x64_sys_memfd_create+0x5b/0x70 [ 893.409552][T14824] do_syscall_64+0xfe/0x140 [ 893.414062][T14824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 893.419951][T14824] RIP: 0033:0x459829 [ 893.423827][T14824] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:51:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) [ 893.443860][T14824] RSP: 002b:00007f93b2fcea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 893.452344][T14824] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 893.460518][T14824] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 893.468579][T14824] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 893.476574][T14824] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f93b2fcf6d4 [ 893.484542][T14824] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:51:51 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:51 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x88480000}}}}}, &(0x7f0000000100)) [ 893.513734][T14808] BTRFS error (device loop5): open_ctree failed 11:51:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:51:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) [ 893.653738][T14838] FAULT_INJECTION: forcing a failure. [ 893.653738][T14838] name failslab, interval 1, probability 0, space 0, times 0 11:51:51 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x88640000}}}}}, &(0x7f0000000100)) [ 893.710537][T14838] CPU: 0 PID: 14838 Comm: syz-executor.1 Not tainted 5.3.0-rc4 #73 [ 893.718465][T14838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 893.728524][T14838] Call Trace: [ 893.731858][T14838] dump_stack+0x1d8/0x2f8 [ 893.736196][T14838] should_fail+0x555/0x770 [ 893.740629][T14838] __should_failslab+0x11a/0x160 [ 893.745822][T14838] ? __alloc_file+0x2c/0x390 [ 893.750534][T14838] should_failslab+0x9/0x20 [ 893.755161][T14838] kmem_cache_alloc+0x56/0x2e0 [ 893.759930][T14838] ? trace_lock_release+0x135/0x1a0 [ 893.765369][T14838] __alloc_file+0x2c/0x390 [ 893.769770][T14838] alloc_empty_file+0xac/0x1b0 [ 893.774521][T14838] alloc_file+0x60/0x4c0 [ 893.778767][T14838] alloc_file_pseudo+0x1d4/0x260 [ 893.783721][T14838] __shmem_file_setup+0x1a2/0x280 [ 893.789018][T14838] shmem_file_setup+0x2f/0x40 [ 893.793831][T14838] __se_sys_memfd_create+0x28e/0x4b0 [ 893.799220][T14838] ? do_syscall_64+0x1d/0x140 [ 893.804057][T14838] __x64_sys_memfd_create+0x5b/0x70 [ 893.809248][T14838] do_syscall_64+0xfe/0x140 [ 893.813748][T14838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 893.819659][T14838] RIP: 0033:0x459829 [ 893.823555][T14838] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 893.843432][T14838] RSP: 002b:00007f93b2fcea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 893.851833][T14838] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 11:51:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:51 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 893.859811][T14838] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 893.867788][T14838] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 893.875784][T14838] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f93b2fcf6d4 [ 893.883758][T14838] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:51:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 893.971915][T14849] BTRFS error (device loop5): superblock checksum mismatch [ 894.020833][T14859] FAULT_INJECTION: forcing a failure. [ 894.020833][T14859] name failslab, interval 1, probability 0, space 0, times 0 [ 894.034023][T14849] BTRFS error (device loop5): open_ctree failed 11:51:51 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91", 0x76) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:51 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x88a8ffff}}}}}, &(0x7f0000000100)) 11:51:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) [ 894.075888][T14859] CPU: 1 PID: 14859 Comm: syz-executor.1 Not tainted 5.3.0-rc4 #73 [ 894.083911][T14859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 894.093967][T14859] Call Trace: [ 894.097254][T14859] dump_stack+0x1d8/0x2f8 [ 894.101579][T14859] should_fail+0x555/0x770 [ 894.105995][T14859] __should_failslab+0x11a/0x160 [ 894.110916][T14859] ? security_file_alloc+0x36/0x200 [ 894.116099][T14859] should_failslab+0x9/0x20 [ 894.120588][T14859] kmem_cache_alloc+0x56/0x2e0 [ 894.125390][T14859] security_file_alloc+0x36/0x200 [ 894.130405][T14859] __alloc_file+0xde/0x390 [ 894.134815][T14859] alloc_empty_file+0xac/0x1b0 [ 894.139590][T14859] alloc_file+0x60/0x4c0 [ 894.143896][T14859] alloc_file_pseudo+0x1d4/0x260 [ 894.148932][T14859] __shmem_file_setup+0x1a2/0x280 [ 894.154134][T14859] shmem_file_setup+0x2f/0x40 [ 894.158788][T14859] __se_sys_memfd_create+0x28e/0x4b0 [ 894.164051][T14859] ? do_syscall_64+0x1d/0x140 [ 894.168765][T14859] __x64_sys_memfd_create+0x5b/0x70 [ 894.174047][T14859] do_syscall_64+0xfe/0x140 [ 894.178538][T14859] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 894.192200][T14859] RIP: 0033:0x459829 [ 894.196076][T14859] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 894.215664][T14859] RSP: 002b:00007f93b2fcea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 11:51:51 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:51 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000100)) [ 894.224054][T14859] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 894.232008][T14859] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 894.239978][T14859] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 894.249941][T14859] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f93b2fcf6d4 [ 894.258160][T14859] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 894.315957][T14869] FAULT_INJECTION: forcing a failure. [ 894.315957][T14869] name failslab, interval 1, probability 0, space 0, times 0 [ 894.329454][T14869] CPU: 0 PID: 14869 Comm: syz-executor.1 Not tainted 5.3.0-rc4 #73 [ 894.337484][T14869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 894.347690][T14869] Call Trace: [ 894.350990][T14869] dump_stack+0x1d8/0x2f8 [ 894.355315][T14869] should_fail+0x555/0x770 [ 894.359720][T14869] __should_failslab+0x11a/0x160 [ 894.364645][T14869] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 894.370357][T14869] should_failslab+0x9/0x20 [ 894.374853][T14869] __kmalloc+0x7a/0x340 [ 894.378986][T14869] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 894.384680][T14869] tomoyo_realpath_from_path+0xdc/0x7c0 [ 894.390208][T14869] tomoyo_path_perm+0x192/0x850 [ 894.395045][T14869] ? perf_trace_lock_acquire+0x97/0x3b0 [ 894.400587][T14869] tomoyo_path_truncate+0x1c/0x20 [ 894.405592][T14869] security_path_truncate+0xd5/0x150 [ 894.410854][T14869] do_sys_ftruncate+0x493/0x710 [ 894.415681][T14869] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 894.421393][T14869] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 894.426941][T14869] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 894.432721][T14869] ? trace_hardirqs_off_caller+0x58/0x80 [ 894.438333][T14869] ? do_syscall_64+0x1d/0x140 [ 894.443003][T14869] __x64_sys_ftruncate+0x60/0x70 [ 894.447927][T14869] do_syscall_64+0xfe/0x140 [ 894.452510][T14869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 894.458384][T14869] RIP: 0033:0x4597f7 [ 894.462257][T14869] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 894.481846][T14869] RSP: 002b:00007f93b2fcea88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 894.490233][T14869] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 00000000004597f7 [ 894.498305][T14869] RDX: 0000000020000028 RSI: 0000000000020000 RDI: 0000000000000004 [ 894.506251][T14869] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 894.514200][T14869] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 894.522148][T14869] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 894.531762][T14869] ERROR: Out of memory at tomoyo_realpath_from_path. 11:51:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 11:51:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='\ntrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:52 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x88ffffff}}}}}, &(0x7f0000000100)) 11:51:52 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x89060000}}}}}, &(0x7f0000000100)) 11:51:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 11:51:52 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) [ 894.878771][T14912] FAULT_INJECTION: forcing a failure. [ 894.878771][T14912] name failslab, interval 1, probability 0, space 0, times 0 [ 894.892797][T14912] CPU: 0 PID: 14912 Comm: syz-executor.1 Not tainted 5.3.0-rc4 #73 [ 894.900697][T14912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 894.900702][T14912] Call Trace: [ 894.900720][T14912] dump_stack+0x1d8/0x2f8 [ 894.900734][T14912] should_fail+0x555/0x770 [ 894.900755][T14912] __should_failslab+0x11a/0x160 [ 894.922839][T14912] ? tomoyo_encode2+0x273/0x5a0 [ 894.922852][T14912] should_failslab+0x9/0x20 [ 894.922862][T14912] __kmalloc+0x7a/0x340 [ 894.922871][T14912] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 894.922881][T14912] tomoyo_encode2+0x273/0x5a0 [ 894.922892][T14912] ? dynamic_dname+0xf0/0xf0 [ 894.922902][T14912] tomoyo_realpath_from_path+0x769/0x7c0 [ 894.922917][T14912] tomoyo_path_perm+0x192/0x850 [ 894.922929][T14912] ? perf_trace_lock_acquire+0x97/0x3b0 [ 894.922956][T14912] tomoyo_path_truncate+0x1c/0x20 [ 894.979129][T14912] security_path_truncate+0xd5/0x150 [ 894.984418][T14912] do_sys_ftruncate+0x493/0x710 [ 894.989286][T14912] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 894.995004][T14912] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 895.000463][T14912] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 895.006193][T14912] ? trace_hardirqs_off_caller+0x58/0x80 [ 895.011825][T14912] ? do_syscall_64+0x1d/0x140 [ 895.016583][T14912] __x64_sys_ftruncate+0x60/0x70 [ 895.021517][T14912] do_syscall_64+0xfe/0x140 [ 895.026126][T14912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 895.032158][T14912] RIP: 0033:0x4597f7 [ 895.036050][T14912] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 895.055758][T14912] RSP: 002b:00007f93b2fcea88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 895.064300][T14912] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 00000000004597f7 [ 895.072285][T14912] RDX: 0000000020000028 RSI: 0000000000020000 RDI: 0000000000000004 [ 895.080282][T14912] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 895.088262][T14912] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 895.096231][T14912] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 895.104794][T14912] ERROR: Out of memory at tomoyo_realpath_from_path. 11:51:53 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91", 0x76) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:53 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x89ffffff}}}}}, &(0x7f0000000100)) 11:51:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 11:51:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 11:51:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='\x1ctrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:53 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:53 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xe8030000}}}}}, &(0x7f0000000100)) [ 895.457303][T14941] FAULT_INJECTION: forcing a failure. [ 895.457303][T14941] name failslab, interval 1, probability 0, space 0, times 0 [ 895.476544][T14941] CPU: 0 PID: 14941 Comm: syz-executor.1 Not tainted 5.3.0-rc4 #73 [ 895.484575][T14941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 895.494632][T14941] Call Trace: [ 895.497924][T14941] dump_stack+0x1d8/0x2f8 [ 895.502238][T14941] should_fail+0x555/0x770 [ 895.506666][T14941] __should_failslab+0x11a/0x160 [ 895.511857][T14941] ? tomoyo_encode2+0x273/0x5a0 [ 895.516705][T14941] should_failslab+0x9/0x20 [ 895.521188][T14941] __kmalloc+0x7a/0x340 [ 895.525322][T14941] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 895.531022][T14941] tomoyo_encode2+0x273/0x5a0 [ 895.535680][T14941] ? dynamic_dname+0xf0/0xf0 [ 895.540263][T14941] tomoyo_realpath_from_path+0x769/0x7c0 [ 895.546054][T14941] tomoyo_path_perm+0x192/0x850 [ 895.550986][T14941] ? perf_trace_lock_acquire+0x97/0x3b0 [ 895.556611][T14941] tomoyo_path_truncate+0x1c/0x20 [ 895.561620][T14941] security_path_truncate+0xd5/0x150 [ 895.567163][T14941] do_sys_ftruncate+0x493/0x710 [ 895.572007][T14941] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 895.577762][T14941] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 895.583197][T14941] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 895.588890][T14941] ? trace_hardirqs_off_caller+0x58/0x80 [ 895.594503][T14941] ? do_syscall_64+0x1d/0x140 [ 895.602537][T14941] __x64_sys_ftruncate+0x60/0x70 [ 895.607558][T14941] do_syscall_64+0xfe/0x140 [ 895.612042][T14941] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 895.617914][T14941] RIP: 0033:0x4597f7 [ 895.621786][T14941] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 895.641371][T14941] RSP: 002b:00007f93b2fcea88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 895.649761][T14941] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 00000000004597f7 11:51:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) [ 895.658176][T14941] RDX: 0000000020000028 RSI: 0000000000020000 RDI: 0000000000000004 [ 895.666130][T14941] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 895.675071][T14941] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 895.683022][T14941] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 895.703039][T14941] ERROR: Out of memory at tomoyo_realpath_from_path. 11:51:53 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xf0030000}}}}}, &(0x7f0000000100)) 11:51:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 11:51:53 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xf4010000}}}}}, &(0x7f0000000100)) 11:51:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='%trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:53 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91", 0x76) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:53 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:53 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xfdffffff}}}}}, &(0x7f0000000100)) 11:51:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 11:51:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='.trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:53 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xfe030000}}}}}, &(0x7f0000000100)) [ 896.339051][T15003] FAULT_INJECTION: forcing a failure. [ 896.339051][T15003] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 896.353664][T15003] CPU: 1 PID: 15003 Comm: syz-executor.1 Not tainted 5.3.0-rc4 #73 [ 896.361567][T15003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 896.372094][T15003] Call Trace: [ 896.375384][T15003] dump_stack+0x1d8/0x2f8 [ 896.379851][T15003] should_fail+0x555/0x770 [ 896.384267][T15003] should_fail_alloc_page+0x55/0x60 [ 896.389450][T15003] prepare_alloc_pages+0x283/0x470 [ 896.394541][T15003] __alloc_pages_nodemask+0xb2/0x5d0 [ 896.399815][T15003] ? percpu_counter_add_batch+0x153/0x170 [ 896.405958][T15003] alloc_pages_vma+0x4f7/0xca0 [ 896.410714][T15003] shmem_alloc_and_acct_page+0x42c/0xbc0 [ 896.416336][T15003] shmem_getpage_gfp+0x1270/0x2c00 [ 896.421577][T15003] shmem_write_begin+0xcb/0x1b0 [ 896.426421][T15003] generic_perform_write+0x25d/0x4e0 [ 896.431870][T15003] __generic_file_write_iter+0x24b/0x520 [ 896.437524][T15003] generic_file_write_iter+0x445/0x5d0 [ 896.442983][T15003] __vfs_write+0x5a1/0x740 [ 896.447575][T15003] vfs_write+0x275/0x590 [ 896.452059][T15003] __x64_sys_pwrite64+0x162/0x1d0 [ 896.457062][T15003] do_syscall_64+0xfe/0x140 [ 896.461572][T15003] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 896.467475][T15003] RIP: 0033:0x413777 [ 896.471368][T15003] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 896.490961][T15003] RSP: 002b:00007f93b2fcea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 896.499352][T15003] RAX: ffffffffffffffda RBX: 0000000020000010 RCX: 0000000000413777 [ 896.507304][T15003] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 896.515262][T15003] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 896.523247][T15003] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 896.531209][T15003] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:51:54 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xfeffffff}}}}}, &(0x7f0000000100)) 11:51:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 11:51:54 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xffff0000}}}}}, &(0x7f0000000100)) 11:51:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='/trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:54 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 896.961300][T15037] FAULT_INJECTION: forcing a failure. [ 896.961300][T15037] name failslab, interval 1, probability 0, space 0, times 0 [ 896.974191][T15037] CPU: 1 PID: 15037 Comm: syz-executor.1 Not tainted 5.3.0-rc4 #73 [ 896.982079][T15037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 896.992131][T15037] Call Trace: [ 896.995420][T15037] dump_stack+0x1d8/0x2f8 [ 896.999757][T15037] should_fail+0x555/0x770 [ 897.004201][T15037] __should_failslab+0x11a/0x160 [ 897.009136][T15037] ? xas_create+0x1197/0x1910 [ 897.013796][T15037] should_failslab+0x9/0x20 [ 897.018437][T15037] kmem_cache_alloc+0x56/0x2e0 [ 897.023300][T15037] xas_create+0x1197/0x1910 [ 897.027908][T15037] xas_create_range+0x142/0x700 [ 897.032761][T15037] shmem_add_to_page_cache+0x8e1/0x1230 [ 897.038381][T15037] shmem_getpage_gfp+0x184b/0x2c00 [ 897.043666][T15037] shmem_write_begin+0xcb/0x1b0 [ 897.048513][T15037] generic_perform_write+0x25d/0x4e0 [ 897.053987][T15037] __generic_file_write_iter+0x24b/0x520 [ 897.059605][T15037] generic_file_write_iter+0x445/0x5d0 [ 897.065050][T15037] __vfs_write+0x5a1/0x740 [ 897.069453][T15037] vfs_write+0x275/0x590 [ 897.073700][T15037] __x64_sys_pwrite64+0x162/0x1d0 [ 897.078719][T15037] do_syscall_64+0xfe/0x140 [ 897.083214][T15037] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 897.089084][T15037] RIP: 0033:0x413777 [ 897.092955][T15037] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 897.112740][T15037] RSP: 002b:00007f93b2fcea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 897.121149][T15037] RAX: ffffffffffffffda RBX: 0000000020000010 RCX: 0000000000413777 [ 897.129118][T15037] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 897.137190][T15037] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 897.145778][T15037] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 897.153736][T15037] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:51:55 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe", 0x7b) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:55 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xffffa888}}}}}, &(0x7f0000000100)) 11:51:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 11:51:55 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='\\trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:55 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 897.425083][T15055] FAULT_INJECTION: forcing a failure. [ 897.425083][T15055] name failslab, interval 1, probability 0, space 0, times 0 [ 897.428260][T15061] FAULT_INJECTION: forcing a failure. [ 897.428260][T15061] name failslab, interval 1, probability 0, space 0, times 0 [ 897.460317][T15055] CPU: 0 PID: 15055 Comm: syz-executor.1 Not tainted 5.3.0-rc4 #73 [ 897.468251][T15055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 897.478303][T15055] Call Trace: [ 897.478320][T15055] dump_stack+0x1d8/0x2f8 [ 897.478335][T15055] should_fail+0x555/0x770 [ 897.478351][T15055] __should_failslab+0x11a/0x160 [ 897.485939][T15055] ? getname_flags+0xba/0x640 [ 897.485950][T15055] should_failslab+0x9/0x20 [ 897.485959][T15055] kmem_cache_alloc+0x56/0x2e0 [ 897.485967][T15055] ? check_preemption_disabled+0xb7/0x2a0 [ 897.485976][T15055] getname_flags+0xba/0x640 [ 897.485987][T15055] getname+0x19/0x20 [ 897.485995][T15055] do_sys_open+0x261/0x560 [ 897.486007][T15055] __x64_sys_open+0x87/0x90 [ 897.486019][T15055] do_syscall_64+0xfe/0x140 [ 897.486031][T15055] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 897.486040][T15055] RIP: 0033:0x413711 [ 897.486052][T15055] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 897.566425][T15055] RSP: 002b:00007f93b2fcea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 897.574825][T15055] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000413711 [ 897.582780][T15055] RDX: 00007f93b2fceb0a RSI: 0000000000000002 RDI: 00007f93b2fceb00 [ 897.590831][T15055] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 897.602101][T15055] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 897.610066][T15055] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 897.618130][T15061] CPU: 1 PID: 15061 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 11:51:55 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:55 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xffffca88}}}}}, &(0x7f0000000100)) [ 897.626124][T15061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 897.636181][T15061] Call Trace: [ 897.639466][T15061] dump_stack+0x1d8/0x2f8 [ 897.643875][T15061] should_fail+0x555/0x770 [ 897.643895][T15061] __should_failslab+0x11a/0x160 [ 897.653234][T15061] ? __se_sys_memfd_create+0x10a/0x4b0 [ 897.653246][T15061] should_failslab+0x9/0x20 [ 897.653256][T15061] __kmalloc+0x7a/0x340 [ 897.653268][T15061] __se_sys_memfd_create+0x10a/0x4b0 [ 897.672695][T15061] ? do_syscall_64+0x1d/0x140 [ 897.677397][T15061] __x64_sys_memfd_create+0x5b/0x70 [ 897.682596][T15061] do_syscall_64+0xfe/0x140 [ 897.687087][T15061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 897.693315][T15061] RIP: 0033:0x459829 [ 897.697270][T15061] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 897.717265][T15061] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 11:51:55 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 897.725880][T15061] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 897.733866][T15061] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 897.741831][T15061] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 897.749790][T15061] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f250541d6d4 [ 897.757749][T15061] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:51:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) [ 897.881354][T15080] FAULT_INJECTION: forcing a failure. [ 897.881354][T15080] name failslab, interval 1, probability 0, space 0, times 0 [ 897.914132][T15082] FAULT_INJECTION: forcing a failure. [ 897.914132][T15082] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 897.927452][T15082] CPU: 0 PID: 15082 Comm: syz-executor.1 Not tainted 5.3.0-rc4 #73 [ 897.935363][T15082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 897.945674][T15082] Call Trace: [ 897.948957][T15082] dump_stack+0x1d8/0x2f8 [ 897.953425][T15082] should_fail+0x555/0x770 [ 897.957839][T15082] should_fail_alloc_page+0x55/0x60 [ 897.963037][T15082] prepare_alloc_pages+0x283/0x470 [ 897.968152][T15082] __alloc_pages_nodemask+0xb2/0x5d0 [ 897.973427][T15082] kmem_getpages+0x56/0xa20 [ 897.977932][T15082] ? trace_lock_release+0x135/0x1a0 [ 897.983122][T15082] cache_grow_begin+0x7e/0x2c0 [ 897.987877][T15082] cache_alloc_refill+0x311/0x3f0 [ 897.992979][T15082] ? check_preemption_disabled+0xb7/0x2a0 [ 897.998684][T15082] kmem_cache_alloc+0x2b9/0x2e0 [ 898.003525][T15082] ? getname_flags+0xba/0x640 [ 898.008206][T15082] getname_flags+0xba/0x640 [ 898.012704][T15082] getname+0x19/0x20 [ 898.016592][T15082] do_sys_open+0x261/0x560 [ 898.020996][T15082] __x64_sys_open+0x87/0x90 [ 898.025484][T15082] do_syscall_64+0xfe/0x140 [ 898.030090][T15082] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 898.036236][T15082] RIP: 0033:0x413711 [ 898.040141][T15082] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 898.059831][T15082] RSP: 002b:00007f93b2fcea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 898.068239][T15082] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000413711 11:51:55 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xffffdd86}}}}}, &(0x7f0000000100)) [ 898.076441][T15082] RDX: 00007f93b2fceb0a RSI: 0000000000000002 RDI: 00007f93b2fceb00 [ 898.084423][T15082] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 898.092487][T15082] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 898.100812][T15082] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 898.113792][T15080] CPU: 0 PID: 15080 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 898.121708][T15080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 898.131762][T15080] Call Trace: [ 898.135053][T15080] dump_stack+0x1d8/0x2f8 [ 898.139390][T15080] should_fail+0x555/0x770 [ 898.143793][T15080] __should_failslab+0x11a/0x160 [ 898.148711][T15080] ? shmem_alloc_inode+0x1b/0x40 [ 898.153625][T15080] should_failslab+0x9/0x20 [ 898.158107][T15080] kmem_cache_alloc+0x56/0x2e0 [ 898.162851][T15080] ? shmem_fallocate+0xc90/0xc90 [ 898.167768][T15080] shmem_alloc_inode+0x1b/0x40 [ 898.172516][T15080] ? shmem_fallocate+0xc90/0xc90 [ 898.177430][T15080] new_inode_pseudo+0x68/0x240 [ 898.182187][T15080] new_inode+0x28/0x1c0 [ 898.186320][T15080] ? __kasan_check_read+0x11/0x20 [ 898.191496][T15080] shmem_get_inode+0x11b/0x700 [ 898.196240][T15080] ? __alloc_fd+0x58f/0x630 [ 898.200719][T15080] __shmem_file_setup+0x129/0x280 [ 898.205724][T15080] shmem_file_setup+0x2f/0x40 [ 898.210381][T15080] __se_sys_memfd_create+0x28e/0x4b0 [ 898.215643][T15080] ? do_syscall_64+0x1d/0x140 [ 898.220298][T15080] __x64_sys_memfd_create+0x5b/0x70 [ 898.225474][T15080] do_syscall_64+0xfe/0x140 [ 898.229960][T15080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 898.235827][T15080] RIP: 0033:0x459829 [ 898.239698][T15080] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 898.259287][T15080] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 898.267678][T15080] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 11:51:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='atrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:55 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe", 0x7b) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) [ 898.275649][T15080] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 898.283623][T15080] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 898.291573][T15080] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f250541d6d4 [ 898.299521][T15080] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:51:55 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xffffff84}}}}}, &(0x7f0000000100)) 11:51:56 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 898.476452][T15100] FAULT_INJECTION: forcing a failure. [ 898.476452][T15100] name failslab, interval 1, probability 0, space 0, times 0 [ 898.493303][T15100] CPU: 0 PID: 15100 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 898.501345][T15100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 898.511419][T15100] Call Trace: [ 898.514697][T15100] dump_stack+0x1d8/0x2f8 [ 898.519018][T15100] should_fail+0x555/0x770 [ 898.523424][T15100] __should_failslab+0x11a/0x160 [ 898.528354][T15100] ? security_inode_alloc+0x36/0x1e0 [ 898.533641][T15100] should_failslab+0x9/0x20 [ 898.538131][T15100] kmem_cache_alloc+0x56/0x2e0 [ 898.542983][T15100] security_inode_alloc+0x36/0x1e0 [ 898.548085][T15100] inode_init_always+0x3b5/0x8d0 [ 898.553015][T15100] ? shmem_fallocate+0xc90/0xc90 [ 898.557947][T15100] new_inode_pseudo+0x7f/0x240 [ 898.562827][T15100] new_inode+0x28/0x1c0 [ 898.567090][T15100] ? __kasan_check_read+0x11/0x20 [ 898.572116][T15100] shmem_get_inode+0x11b/0x700 [ 898.576867][T15100] ? __alloc_fd+0x58f/0x630 [ 898.581356][T15100] __shmem_file_setup+0x129/0x280 [ 898.586382][T15100] shmem_file_setup+0x2f/0x40 [ 898.591059][T15100] __se_sys_memfd_create+0x28e/0x4b0 [ 898.596336][T15100] ? do_syscall_64+0x1d/0x140 [ 898.600997][T15100] __x64_sys_memfd_create+0x5b/0x70 [ 898.606192][T15100] do_syscall_64+0xfe/0x140 [ 898.610783][T15100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 898.616684][T15100] RIP: 0033:0x459829 [ 898.620573][T15100] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 898.640235][T15100] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 898.648747][T15100] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 898.656721][T15100] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 898.664699][T15100] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 11:51:56 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xffffff88}}}}}, &(0x7f0000000100)) 11:51:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) [ 898.672660][T15100] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f250541d6d4 [ 898.680627][T15100] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:51:56 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:56 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xffffff89}}}}}, &(0x7f0000000100)) [ 898.817084][T15115] FAULT_INJECTION: forcing a failure. [ 898.817084][T15115] name failslab, interval 1, probability 0, space 0, times 0 [ 898.830370][T15115] CPU: 0 PID: 15115 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 898.838380][T15115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 898.848442][T15115] Call Trace: [ 898.851749][T15115] dump_stack+0x1d8/0x2f8 [ 898.856357][T15115] should_fail+0x555/0x770 [ 898.860774][T15115] __should_failslab+0x11a/0x160 [ 898.865708][T15115] ? __d_alloc+0x2d/0x6e0 [ 898.870138][T15115] should_failslab+0x9/0x20 [ 898.874654][T15115] kmem_cache_alloc+0x56/0x2e0 [ 898.879430][T15115] __d_alloc+0x2d/0x6e0 [ 898.883611][T15115] ? lockdep_init_map+0x2a/0x680 [ 898.888557][T15115] d_alloc_pseudo+0x1d/0x70 [ 898.893059][T15115] alloc_file_pseudo+0xc3/0x260 [ 898.897900][T15115] __shmem_file_setup+0x1a2/0x280 [ 898.902913][T15115] shmem_file_setup+0x2f/0x40 [ 898.907588][T15115] __se_sys_memfd_create+0x28e/0x4b0 [ 898.912873][T15115] ? do_syscall_64+0x1d/0x140 [ 898.917648][T15115] __x64_sys_memfd_create+0x5b/0x70 [ 898.922834][T15115] do_syscall_64+0xfe/0x140 [ 898.927440][T15115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 898.933337][T15115] RIP: 0033:0x459829 [ 898.937216][T15115] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 898.956807][T15115] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 11:51:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='ctrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 898.965209][T15115] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 898.973187][T15115] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 898.981155][T15115] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 898.989129][T15115] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f250541d6d4 [ 898.997101][T15115] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:51:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 11:51:56 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xfffffffd}}}}}, &(0x7f0000000100)) 11:51:56 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 899.161098][T15138] FAULT_INJECTION: forcing a failure. [ 899.161098][T15138] name failslab, interval 1, probability 0, space 0, times 0 [ 899.180046][T15138] CPU: 0 PID: 15138 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 899.187972][T15138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 899.198139][T15138] Call Trace: [ 899.201441][T15138] dump_stack+0x1d8/0x2f8 [ 899.205772][T15138] should_fail+0x555/0x770 [ 899.210187][T15138] __should_failslab+0x11a/0x160 [ 899.215115][T15138] ? __alloc_file+0x2c/0x390 [ 899.219715][T15138] should_failslab+0x9/0x20 [ 899.224202][T15138] kmem_cache_alloc+0x56/0x2e0 [ 899.228945][T15138] ? trace_lock_release+0x135/0x1a0 [ 899.234122][T15138] __alloc_file+0x2c/0x390 [ 899.238520][T15138] alloc_empty_file+0xac/0x1b0 [ 899.243267][T15138] alloc_file+0x60/0x4c0 [ 899.247491][T15138] alloc_file_pseudo+0x1d4/0x260 [ 899.252520][T15138] __shmem_file_setup+0x1a2/0x280 [ 899.257609][T15138] shmem_file_setup+0x2f/0x40 [ 899.262359][T15138] __se_sys_memfd_create+0x28e/0x4b0 [ 899.267621][T15138] ? do_syscall_64+0x1d/0x140 [ 899.272369][T15138] __x64_sys_memfd_create+0x5b/0x70 [ 899.278297][T15138] do_syscall_64+0xfe/0x140 [ 899.282780][T15138] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 899.288648][T15138] RIP: 0033:0x459829 [ 899.292607][T15138] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 899.312185][T15138] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 899.320570][T15138] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 899.328518][T15138] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 899.336560][T15138] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 899.344686][T15138] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f250541d6d4 [ 899.352737][T15138] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:51:57 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe", 0x7b) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:57 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xfffffffe}}}}}, &(0x7f0000000100)) 11:51:57 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='b\nrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='%trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) [ 899.459308][T15147] FAULT_INJECTION: forcing a failure. [ 899.459308][T15147] name failslab, interval 1, probability 0, space 0, times 0 11:51:57 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x4000000000}}}}}, &(0x7f0000000100)) [ 899.545252][T15147] CPU: 1 PID: 15147 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 899.553180][T15147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 899.553186][T15147] Call Trace: [ 899.553204][T15147] dump_stack+0x1d8/0x2f8 [ 899.553221][T15147] should_fail+0x555/0x770 [ 899.566590][T15147] __should_failslab+0x11a/0x160 [ 899.566601][T15147] ? security_file_alloc+0x36/0x200 [ 899.566702][T15147] should_failslab+0x9/0x20 [ 899.566717][T15147] kmem_cache_alloc+0x56/0x2e0 [ 899.595009][T15147] security_file_alloc+0x36/0x200 [ 899.600017][T15147] __alloc_file+0xde/0x390 [ 899.604419][T15147] alloc_empty_file+0xac/0x1b0 [ 899.609166][T15147] alloc_file+0x60/0x4c0 [ 899.613410][T15147] alloc_file_pseudo+0x1d4/0x260 [ 899.618340][T15147] __shmem_file_setup+0x1a2/0x280 [ 899.623460][T15147] shmem_file_setup+0x2f/0x40 [ 899.628129][T15147] __se_sys_memfd_create+0x28e/0x4b0 [ 899.633395][T15147] ? do_syscall_64+0x1d/0x140 [ 899.638060][T15147] __x64_sys_memfd_create+0x5b/0x70 [ 899.643394][T15147] do_syscall_64+0xfe/0x140 [ 899.647878][T15147] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 899.653743][T15147] RIP: 0033:0x459829 [ 899.657635][T15147] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 899.677401][T15147] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 899.685799][T15147] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 11:51:57 executing program 0 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 899.693771][T15147] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 899.701729][T15147] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 899.709680][T15147] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f250541d6d4 [ 899.717634][T15147] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:51:57 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61", 0x7e) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:57 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x10000000000}}}}}, &(0x7f0000000100)) [ 899.824919][T15177] FAULT_INJECTION: forcing a failure. [ 899.824919][T15177] name failslab, interval 1, probability 0, space 0, times 0 [ 899.839887][T15177] CPU: 1 PID: 15177 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 899.847795][T15177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 899.847800][T15177] Call Trace: [ 899.847820][T15177] dump_stack+0x1d8/0x2f8 [ 899.847835][T15177] should_fail+0x555/0x770 [ 899.847849][T15177] __should_failslab+0x11a/0x160 [ 899.847861][T15177] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 899.847872][T15177] should_failslab+0x9/0x20 [ 899.847883][T15177] __kmalloc+0x7a/0x340 [ 899.847892][T15177] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 899.847902][T15177] tomoyo_realpath_from_path+0xdc/0x7c0 [ 899.847916][T15177] tomoyo_path_perm+0x192/0x850 [ 899.847928][T15177] ? perf_trace_lock_acquire+0x97/0x3b0 [ 899.847954][T15177] tomoyo_path_truncate+0x1c/0x20 [ 899.847964][T15177] security_path_truncate+0xd5/0x150 11:51:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) [ 899.847974][T15177] do_sys_ftruncate+0x493/0x710 [ 899.847985][T15177] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 899.847999][T15177] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 899.861349][T15177] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 899.861357][T15177] ? trace_hardirqs_off_caller+0x58/0x80 [ 899.861369][T15177] ? do_syscall_64+0x1d/0x140 [ 899.861381][T15177] __x64_sys_ftruncate+0x60/0x70 [ 899.861393][T15177] do_syscall_64+0xfe/0x140 [ 899.895236][T15177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 899.895245][T15177] RIP: 0033:0x4597f7 11:51:57 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x100000000000000}}}}}, &(0x7f0000000100)) [ 899.895256][T15177] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 899.905683][T15177] RSP: 002b:00007f250541ca88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 899.905692][T15177] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 00000000004597f7 [ 899.905697][T15177] RDX: 0000000020000028 RSI: 0000000000020000 RDI: 0000000000000004 [ 899.905703][T15177] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 11:51:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='\\trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 899.905708][T15177] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 899.905714][T15177] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 899.924200][T15177] ERROR: Out of memory at tomoyo_realpath_from_path. 11:51:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='b%rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:57 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x200000000000000}}}}}, &(0x7f0000000100)) 11:51:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) 11:51:57 executing program 0 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:57 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x300000000000000}}}}}, &(0x7f0000000100)) [ 900.357709][T15216] FAULT_INJECTION: forcing a failure. [ 900.357709][T15216] name failslab, interval 1, probability 0, space 0, times 0 [ 900.370933][T15216] CPU: 0 PID: 15216 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 900.378832][T15216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 900.388875][T15216] Call Trace: [ 900.392159][T15216] dump_stack+0x1d8/0x2f8 [ 900.396549][T15216] should_fail+0x555/0x770 [ 900.400957][T15216] __should_failslab+0x11a/0x160 [ 900.405872][T15216] ? tomoyo_encode2+0x273/0x5a0 [ 900.410720][T15216] should_failslab+0x9/0x20 [ 900.415199][T15216] __kmalloc+0x7a/0x340 [ 900.419331][T15216] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 900.425024][T15216] tomoyo_encode2+0x273/0x5a0 [ 900.433256][T15216] ? dynamic_dname+0xf0/0xf0 [ 900.437827][T15216] tomoyo_realpath_from_path+0x769/0x7c0 [ 900.443439][T15216] tomoyo_path_perm+0x192/0x850 [ 900.448270][T15216] ? perf_trace_lock_acquire+0x97/0x3b0 [ 900.453802][T15216] tomoyo_path_truncate+0x1c/0x20 [ 900.458805][T15216] security_path_truncate+0xd5/0x150 [ 900.464073][T15216] do_sys_ftruncate+0x493/0x710 [ 900.468903][T15216] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 900.474606][T15216] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 900.480043][T15216] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 900.485734][T15216] ? trace_hardirqs_off_caller+0x58/0x80 [ 900.491346][T15216] ? do_syscall_64+0x1d/0x140 [ 900.495998][T15216] __x64_sys_ftruncate+0x60/0x70 [ 900.500912][T15216] do_syscall_64+0xfe/0x140 [ 900.505395][T15216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 900.511286][T15216] RIP: 0033:0x4597f7 [ 900.515169][T15216] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 900.535017][T15216] RSP: 002b:00007f250541ca88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 900.543424][T15216] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 00000000004597f7 11:51:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='b%rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 900.551387][T15216] RDX: 0000000020000028 RSI: 0000000000020000 RDI: 0000000000000004 [ 900.559423][T15216] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 900.567371][T15216] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 900.575327][T15216] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 900.590910][T15216] ERROR: Out of memory at tomoyo_realpath_from_path. 11:51:58 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x400000000000000}}}}}, &(0x7f0000000100)) 11:51:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) 11:51:58 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x500000000000000}}}}}, &(0x7f0000000100)) 11:51:58 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61", 0x7e) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='b/rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:58 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x600000000000000}}}}}, &(0x7f0000000100)) 11:51:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) 11:51:58 executing program 0 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:58 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x700000000000000}}}}}, &(0x7f0000000100)) 11:51:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='b\\rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 901.008929][T15264] FAULT_INJECTION: forcing a failure. [ 901.008929][T15264] name failslab, interval 1, probability 0, space 0, times 0 [ 901.024556][T15264] CPU: 1 PID: 15264 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 901.032728][T15264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 901.042986][T15264] Call Trace: [ 901.046272][T15264] dump_stack+0x1d8/0x2f8 [ 901.050713][T15264] should_fail+0x555/0x770 [ 901.055134][T15264] __should_failslab+0x11a/0x160 [ 901.060063][T15264] ? tomoyo_encode2+0x273/0x5a0 [ 901.064900][T15264] should_failslab+0x9/0x20 [ 901.069651][T15264] __kmalloc+0x7a/0x340 [ 901.073814][T15264] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 901.079553][T15264] tomoyo_encode2+0x273/0x5a0 [ 901.084223][T15264] ? dynamic_dname+0xf0/0xf0 [ 901.088792][T15264] tomoyo_realpath_from_path+0x769/0x7c0 [ 901.094495][T15264] tomoyo_path_perm+0x192/0x850 [ 901.099325][T15264] ? perf_trace_lock_acquire+0x97/0x3b0 [ 901.104857][T15264] tomoyo_path_truncate+0x1c/0x20 [ 901.109867][T15264] security_path_truncate+0xd5/0x150 [ 901.115140][T15264] do_sys_ftruncate+0x493/0x710 [ 901.119980][T15264] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 901.125686][T15264] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 901.131125][T15264] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 901.136821][T15264] ? trace_hardirqs_off_caller+0x58/0x80 [ 901.142438][T15264] ? do_syscall_64+0x1d/0x140 [ 901.147098][T15264] __x64_sys_ftruncate+0x60/0x70 [ 901.152022][T15264] do_syscall_64+0xfe/0x140 [ 901.156546][T15264] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 901.162419][T15264] RIP: 0033:0x4597f7 [ 901.166292][T15264] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 901.185901][T15264] RSP: 002b:00007f250541ca88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 901.194325][T15264] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 00000000004597f7 [ 901.202290][T15264] RDX: 0000000020000028 RSI: 0000000000020000 RDI: 0000000000000004 [ 901.210245][T15264] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 901.218304][T15264] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 901.226264][T15264] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 901.235360][T15264] ERROR: Out of memory at tomoyo_realpath_from_path. 11:51:58 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x800000000000000}}}}}, &(0x7f0000000100)) 11:51:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 11:51:59 executing program 0 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:59 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x806000000000000}}}}}, &(0x7f0000000100)) 11:51:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='b\\rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 901.479934][T15290] FAULT_INJECTION: forcing a failure. [ 901.479934][T15290] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 901.493849][T15290] CPU: 1 PID: 15290 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 901.501759][T15290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 901.511921][T15290] Call Trace: [ 901.515213][T15290] dump_stack+0x1d8/0x2f8 [ 901.519897][T15290] should_fail+0x555/0x770 [ 901.519913][T15290] should_fail_alloc_page+0x55/0x60 [ 901.519928][T15290] prepare_alloc_pages+0x283/0x470 [ 901.529710][T15290] __alloc_pages_nodemask+0xb2/0x5d0 [ 901.529724][T15290] ? percpu_counter_add_batch+0x153/0x170 [ 901.529737][T15290] alloc_pages_vma+0x4f7/0xca0 [ 901.529751][T15290] shmem_alloc_and_acct_page+0x42c/0xbc0 [ 901.529774][T15290] shmem_getpage_gfp+0x1270/0x2c00 [ 901.545949][T15290] shmem_write_begin+0xcb/0x1b0 [ 901.545962][T15290] generic_perform_write+0x25d/0x4e0 [ 901.545978][T15290] __generic_file_write_iter+0x24b/0x520 [ 901.545990][T15290] generic_file_write_iter+0x445/0x5d0 [ 901.566592][T15290] __vfs_write+0x5a1/0x740 [ 901.566610][T15290] vfs_write+0x275/0x590 [ 901.566622][T15290] __x64_sys_pwrite64+0x162/0x1d0 [ 901.566636][T15290] do_syscall_64+0xfe/0x140 [ 901.601434][T15290] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 901.607314][T15290] RIP: 0033:0x413777 11:51:59 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61", 0x7e) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:51:59 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xa00000000000000}}}}}, &(0x7f0000000100)) [ 901.611816][T15290] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 901.631433][T15290] RSP: 002b:00007f250541ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 901.639839][T15290] RAX: ffffffffffffffda RBX: 0000000020000010 RCX: 0000000000413777 [ 901.647950][T15290] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 901.655925][T15290] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 901.663882][T15290] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 901.672013][T15290] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:51:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='b`rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:59 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xb00000000000000}}}}}, &(0x7f0000000100)) 11:51:59 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xc00000000000000}}}}}, &(0x7f0000000100)) 11:51:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='bt\nfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:51:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 11:51:59 executing program 0 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:59 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xd00000000000000}}}}}, &(0x7f0000000100)) [ 902.050056][T15333] FAULT_INJECTION: forcing a failure. [ 902.050056][T15333] name failslab, interval 1, probability 0, space 0, times 0 [ 902.062690][T15333] CPU: 0 PID: 15333 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 902.070579][T15333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 902.080641][T15333] Call Trace: [ 902.083934][T15333] dump_stack+0x1d8/0x2f8 [ 902.088254][T15333] should_fail+0x555/0x770 [ 902.092671][T15333] __should_failslab+0x11a/0x160 11:51:59 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xf00000000000000}}}}}, &(0x7f0000000100)) [ 902.097598][T15333] ? xas_create+0x1197/0x1910 [ 902.102281][T15333] should_failslab+0x9/0x20 [ 902.106781][T15333] kmem_cache_alloc+0x56/0x2e0 [ 902.111539][T15333] xas_create+0x1197/0x1910 [ 902.116087][T15333] xas_create_range+0x142/0x700 [ 902.121063][T15333] shmem_add_to_page_cache+0x8e1/0x1230 [ 902.126624][T15333] shmem_getpage_gfp+0x184b/0x2c00 [ 902.131762][T15333] shmem_write_begin+0xcb/0x1b0 [ 902.136710][T15333] generic_perform_write+0x25d/0x4e0 [ 902.142014][T15333] __generic_file_write_iter+0x24b/0x520 [ 902.147647][T15333] generic_file_write_iter+0x445/0x5d0 [ 902.147668][T15333] __vfs_write+0x5a1/0x740 [ 902.147685][T15333] vfs_write+0x275/0x590 [ 902.147698][T15333] __x64_sys_pwrite64+0x162/0x1d0 [ 902.147712][T15333] do_syscall_64+0xfe/0x140 [ 902.147726][T15333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 902.147735][T15333] RIP: 0033:0x413777 [ 902.147743][T15333] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 902.147753][T15333] RSP: 002b:00007f250541ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 902.157872][T15333] RAX: ffffffffffffffda RBX: 0000000020000010 RCX: 0000000000413777 [ 902.157877][T15333] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 902.157886][T15333] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 902.157890][T15333] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 902.157895][T15333] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:51:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='bt\\fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:51:59 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x1100000000000000}}}}}, &(0x7f0000000100)) 11:52:00 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e9", 0x7f) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='bt\"fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:00 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x1400000000000000}}}}}, &(0x7f0000000100)) 11:52:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 11:52:00 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x1f00000000000000}}}}}, &(0x7f0000000100)) 11:52:00 executing program 0 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:00 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2100000000000000}}}}}, &(0x7f0000000100)) [ 902.725171][T15379] FAULT_INJECTION: forcing a failure. [ 902.725171][T15379] name failslab, interval 1, probability 0, space 0, times 0 11:52:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 902.783847][T15379] CPU: 0 PID: 15379 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 902.791788][T15379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 902.801865][T15379] Call Trace: [ 902.805171][T15379] dump_stack+0x1d8/0x2f8 [ 902.809541][T15379] should_fail+0x555/0x770 [ 902.813946][T15379] __should_failslab+0x11a/0x160 [ 902.818884][T15379] ? __alloc_file+0x2c/0x390 [ 902.823484][T15379] should_failslab+0x9/0x20 [ 902.828007][T15379] kmem_cache_alloc+0x56/0x2e0 [ 902.832933][T15379] __alloc_file+0x2c/0x390 [ 902.837341][T15379] alloc_empty_file+0xac/0x1b0 [ 902.842190][T15379] path_openat+0x9e/0x4460 [ 902.846675][T15379] ? __kasan_kmalloc+0x178/0x1b0 [ 902.851775][T15379] ? __kasan_kmalloc+0x11c/0x1b0 [ 902.856689][T15379] ? kasan_slab_alloc+0xf/0x20 [ 902.861432][T15379] ? kmem_cache_alloc+0x1f5/0x2e0 [ 902.866433][T15379] ? getname+0x19/0x20 [ 902.870476][T15379] ? do_sys_open+0x261/0x560 [ 902.875046][T15379] ? do_syscall_64+0xfe/0x140 [ 902.879706][T15379] ? debug_smp_processor_id+0x1c/0x20 [ 902.885052][T15379] ? check_preemption_disabled+0x47/0x2a0 [ 902.890752][T15379] ? perf_trace_lock_acquire+0x97/0x3b0 [ 902.896274][T15379] ? trace_lock_release+0x135/0x1a0 [ 902.901553][T15379] ? trace_lock_release+0x135/0x1a0 [ 902.906731][T15379] ? __alloc_fd+0x58f/0x630 [ 902.911220][T15379] do_filp_open+0x192/0x3d0 [ 902.915709][T15379] ? _raw_spin_unlock+0x2c/0x50 [ 902.920544][T15379] do_sys_open+0x29f/0x560 [ 902.924942][T15379] __x64_sys_open+0x87/0x90 [ 902.929432][T15379] do_syscall_64+0xfe/0x140 [ 902.933918][T15379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 902.939798][T15379] RIP: 0033:0x413711 [ 902.943683][T15379] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 902.963413][T15379] RSP: 002b:00007f250541ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 902.971801][T15379] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000413711 11:52:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btr%s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 902.979831][T15379] RDX: 00007f250541cb0a RSI: 0000000000000002 RDI: 00007f250541cb00 [ 902.987794][T15379] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 902.995753][T15379] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 903.003707][T15379] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:00 executing program 0 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:00 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2900000000000000}}}}}, &(0x7f0000000100)) 11:52:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 903.208839][T15404] FAULT_INJECTION: forcing a failure. [ 903.208839][T15404] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 903.222093][T15404] CPU: 0 PID: 15404 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 903.230000][T15404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 903.240213][T15404] Call Trace: [ 903.243548][T15404] dump_stack+0x1d8/0x2f8 [ 903.247895][T15404] should_fail+0x555/0x770 [ 903.252451][T15404] should_fail_alloc_page+0x55/0x60 [ 903.257838][T15404] prepare_alloc_pages+0x283/0x470 [ 903.263033][T15404] __alloc_pages_nodemask+0xb2/0x5d0 [ 903.268324][T15404] kmem_getpages+0x56/0xa20 [ 903.272903][T15404] ? trace_lock_release+0x135/0x1a0 [ 903.278091][T15404] cache_grow_begin+0x7e/0x2c0 [ 903.282890][T15404] cache_alloc_refill+0x311/0x3f0 [ 903.287901][T15404] ? check_preemption_disabled+0xb7/0x2a0 [ 903.293711][T15404] kmem_cache_alloc+0x2b9/0x2e0 [ 903.298547][T15404] ? getname_flags+0xba/0x640 [ 903.303206][T15404] getname_flags+0xba/0x640 [ 903.307697][T15404] getname+0x19/0x20 [ 903.311585][T15404] do_sys_open+0x261/0x560 [ 903.316000][T15404] __x64_sys_open+0x87/0x90 [ 903.320495][T15404] do_syscall_64+0xfe/0x140 [ 903.325179][T15404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 903.331057][T15404] RIP: 0033:0x413711 [ 903.334936][T15404] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 903.354671][T15404] RSP: 002b:00007f250541ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 903.363186][T15404] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000413711 [ 903.371165][T15404] RDX: 00007f250541cb0a RSI: 0000000000000002 RDI: 00007f250541cb00 [ 903.379153][T15404] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 903.387129][T15404] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 903.395110][T15404] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='bt%fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:01 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2b00000000000000}}}}}, &(0x7f0000000100)) 11:52:01 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e9", 0x7f) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:01 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2c00000000000000}}}}}, &(0x7f0000000100)) 11:52:01 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2f00000000000000}}}}}, &(0x7f0000000100)) 11:52:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 11:52:01 executing program 0 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:01 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3200000000000000}}}}}, &(0x7f0000000100)) 11:52:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 903.841080][T15445] FAULT_INJECTION: forcing a failure. [ 903.841080][T15445] name failslab, interval 1, probability 0, space 0, times 0 [ 903.855940][T15445] CPU: 0 PID: 15445 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 903.863956][T15445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 903.874016][T15445] Call Trace: [ 903.877312][T15445] dump_stack+0x1d8/0x2f8 [ 903.881656][T15445] should_fail+0x555/0x770 [ 903.886083][T15445] __should_failslab+0x11a/0x160 [ 903.891025][T15445] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 903.896757][T15445] should_failslab+0x9/0x20 [ 903.901268][T15445] __kmalloc+0x7a/0x340 [ 903.905435][T15445] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 903.911166][T15445] tomoyo_realpath_from_path+0xdc/0x7c0 [ 903.916850][T15445] tomoyo_check_open_permission+0x1ce/0x9d0 [ 903.922780][T15445] tomoyo_file_open+0x141/0x190 [ 903.927721][T15445] security_file_open+0x65/0x2f0 [ 903.932760][T15445] do_dentry_open+0x34e/0xf90 [ 903.937443][T15445] vfs_open+0x73/0x80 [ 903.941419][T15445] path_openat+0x1397/0x4460 [ 903.946002][T15445] ? getname+0x19/0x20 [ 903.950062][T15445] ? check_preemption_disabled+0x47/0x2a0 [ 903.955778][T15445] ? check_preemption_disabled+0x47/0x2a0 [ 903.961530][T15445] ? __kasan_check_write+0x14/0x20 [ 903.966668][T15445] ? trace_lock_release+0x135/0x1a0 [ 903.971863][T15445] ? __alloc_fd+0x58f/0x630 [ 903.976368][T15445] do_filp_open+0x192/0x3d0 [ 903.980878][T15445] do_sys_open+0x29f/0x560 [ 903.985286][T15445] __x64_sys_open+0x87/0x90 [ 903.989902][T15445] do_syscall_64+0xfe/0x140 [ 903.994498][T15445] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 904.000379][T15445] RIP: 0033:0x413711 [ 904.004260][T15445] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 904.024022][T15445] RSP: 002b:00007f250541ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 904.032592][T15445] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000413711 11:52:01 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3300000000000000}}}}}, &(0x7f0000000100)) [ 904.040893][T15445] RDX: 00007f250541cb0a RSI: 0000000000000002 RDI: 00007f250541cb00 [ 904.048856][T15445] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 904.056823][T15445] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 904.064791][T15445] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 904.074076][T15445] ERROR: Out of memory at tomoyo_realpath_from_path. 11:52:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='bt/fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:01 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3a00000000000000}}}}}, &(0x7f0000000100)) 11:52:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 11:52:01 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3c00000000000000}}}}}, &(0x7f0000000100)) 11:52:01 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e9", 0x7f) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:01 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3f00000000000000}}}}}, &(0x7f0000000100)) 11:52:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:02 executing program 0 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:02 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x4000000000000000}}}}}, &(0x7f0000000100)) [ 904.494053][T15494] FAULT_INJECTION: forcing a failure. [ 904.494053][T15494] name failslab, interval 1, probability 0, space 0, times 0 11:52:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 11:52:02 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x4305000000000000}}}}}, &(0x7f0000000100)) 11:52:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='bt\\fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 904.571233][T15494] CPU: 1 PID: 15494 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 904.579331][T15494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 904.589471][T15494] Call Trace: [ 904.592756][T15494] dump_stack+0x1d8/0x2f8 [ 904.597068][T15494] should_fail+0x555/0x770 [ 904.601465][T15494] __should_failslab+0x11a/0x160 [ 904.606544][T15494] ? security_file_alloc+0x36/0x200 [ 904.611846][T15494] should_failslab+0x9/0x20 [ 904.616437][T15494] kmem_cache_alloc+0x56/0x2e0 [ 904.621188][T15494] security_file_alloc+0x36/0x200 [ 904.626855][T15494] __alloc_file+0xde/0x390 [ 904.631310][T15494] alloc_empty_file+0xac/0x1b0 [ 904.655522][T15494] path_openat+0x9e/0x4460 [ 904.660019][T15494] ? __kasan_kmalloc+0x178/0x1b0 [ 904.664933][T15494] ? __kasan_kmalloc+0x11c/0x1b0 [ 904.669875][T15494] ? kasan_slab_alloc+0xf/0x20 [ 904.674657][T15494] ? kmem_cache_alloc+0x1f5/0x2e0 [ 904.679673][T15494] ? getname+0x19/0x20 [ 904.683718][T15494] ? do_sys_open+0x261/0x560 [ 904.688288][T15494] ? do_syscall_64+0xfe/0x140 [ 904.693074][T15494] ? check_preemption_disabled+0x47/0x2a0 [ 904.698781][T15494] ? trace_mm_page_alloc+0x17a/0x1f0 [ 904.704068][T15494] ? perf_trace_lock_acquire+0x97/0x3b0 [ 904.709598][T15494] ? trace_lock_release+0x135/0x1a0 [ 904.714801][T15494] ? __alloc_fd+0x58f/0x630 [ 904.719299][T15494] do_filp_open+0x192/0x3d0 [ 904.723782][T15494] ? _raw_spin_unlock+0x2c/0x50 [ 904.728629][T15494] do_sys_open+0x29f/0x560 [ 904.733027][T15494] __x64_sys_open+0x87/0x90 [ 904.737783][T15494] do_syscall_64+0xfe/0x140 [ 904.742879][T15494] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 904.748752][T15494] RIP: 0033:0x413711 11:52:02 executing program 0 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 904.752647][T15494] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 904.773373][T15494] RSP: 002b:00007f250541ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 904.781767][T15494] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000413711 [ 904.789717][T15494] RDX: 00007f250541cb0a RSI: 0000000000000002 RDI: 00007f250541cb00 [ 904.797670][T15494] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 904.805622][T15494] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 904.813574][T15494] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:02 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x6000000000000000}}}}}, &(0x7f0000000100)) [ 904.932170][T15518] FAULT_INJECTION: forcing a failure. [ 904.932170][T15518] name failslab, interval 1, probability 0, space 0, times 0 [ 904.948941][T15518] CPU: 0 PID: 15518 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 904.956864][T15518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 904.966916][T15518] Call Trace: [ 904.970198][T15518] dump_stack+0x1d8/0x2f8 [ 904.974514][T15518] should_fail+0x555/0x770 [ 904.978917][T15518] __should_failslab+0x11a/0x160 [ 904.983835][T15518] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 904.989532][T15518] should_failslab+0x9/0x20 [ 904.994013][T15518] __kmalloc+0x7a/0x340 [ 904.998146][T15518] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 905.003841][T15518] tomoyo_realpath_from_path+0xdc/0x7c0 [ 905.009367][T15518] tomoyo_check_open_permission+0x1ce/0x9d0 [ 905.015250][T15518] tomoyo_file_open+0x141/0x190 [ 905.020081][T15518] security_file_open+0x65/0x2f0 [ 905.025005][T15518] do_dentry_open+0x34e/0xf90 [ 905.029729][T15518] vfs_open+0x73/0x80 [ 905.033686][T15518] path_openat+0x1397/0x4460 [ 905.038271][T15518] ? getname+0x19/0x20 [ 905.042336][T15518] ? check_preemption_disabled+0x47/0x2a0 [ 905.048065][T15518] ? trace_lock_release+0x135/0x1a0 [ 905.053241][T15518] ? __alloc_fd+0x58f/0x630 [ 905.057730][T15518] do_filp_open+0x192/0x3d0 [ 905.062221][T15518] do_sys_open+0x29f/0x560 [ 905.066617][T15518] __x64_sys_open+0x87/0x90 [ 905.071101][T15518] do_syscall_64+0xfe/0x140 [ 905.075594][T15518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 905.081464][T15518] RIP: 0033:0x413711 [ 905.085337][T15518] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 905.104923][T15518] RSP: 002b:00007f250541ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 905.113314][T15518] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000413711 [ 905.121265][T15518] RDX: 00007f250541cb0a RSI: 0000000000000002 RDI: 00007f250541cb00 11:52:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btr\\s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:02 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x6c00000000000000}}}}}, &(0x7f0000000100)) [ 905.129227][T15518] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 905.137177][T15518] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 905.145142][T15518] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 905.156628][T15518] ERROR: Out of memory at tomoyo_realpath_from_path. 11:52:03 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 11:52:03 executing program 0 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:03 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8004020000000000}}}}}, &(0x7f0000000100)) 11:52:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btr%s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:03 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x800e000000000000}}}}}, &(0x7f0000000100)) [ 905.474209][T15555] FAULT_INJECTION: forcing a failure. [ 905.474209][T15555] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 905.487652][T15555] CPU: 1 PID: 15555 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 905.495533][T15555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 905.505674][T15555] Call Trace: [ 905.509109][T15555] dump_stack+0x1d8/0x2f8 [ 905.513422][T15555] should_fail+0x555/0x770 [ 905.517918][T15555] should_fail_alloc_page+0x55/0x60 [ 905.523106][T15555] prepare_alloc_pages+0x283/0x470 [ 905.528326][T15555] __alloc_pages_nodemask+0xb2/0x5d0 [ 905.533611][T15555] kmem_getpages+0x56/0xa20 [ 905.538276][T15555] ? check_preemption_disabled+0x47/0x2a0 [ 905.543981][T15555] cache_grow_begin+0x7e/0x2c0 [ 905.548729][T15555] cache_alloc_refill+0x311/0x3f0 [ 905.553735][T15555] ? check_preemption_disabled+0xb7/0x2a0 [ 905.559447][T15555] __kmalloc+0x318/0x340 [ 905.563697][T15555] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 905.569656][T15555] tomoyo_realpath_from_path+0xdc/0x7c0 [ 905.575295][T15555] tomoyo_check_open_permission+0x1ce/0x9d0 [ 905.581180][T15555] tomoyo_file_open+0x141/0x190 [ 905.586017][T15555] security_file_open+0x65/0x2f0 [ 905.591055][T15555] do_dentry_open+0x34e/0xf90 [ 905.595717][T15555] vfs_open+0x73/0x80 [ 905.599685][T15555] path_openat+0x1397/0x4460 [ 905.604254][T15555] ? getname+0x19/0x20 [ 905.608300][T15555] ? check_preemption_disabled+0x47/0x2a0 [ 905.614008][T15555] ? trace_lock_release+0x135/0x1a0 [ 905.619195][T15555] ? __alloc_fd+0x58f/0x630 [ 905.623690][T15555] do_filp_open+0x192/0x3d0 [ 905.628209][T15555] do_sys_open+0x29f/0x560 [ 905.632618][T15555] __x64_sys_open+0x87/0x90 [ 905.637102][T15555] do_syscall_64+0xfe/0x140 [ 905.641586][T15555] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 905.647459][T15555] RIP: 0033:0x413711 [ 905.651337][T15555] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 905.670954][T15555] RSP: 002b:00007f250541ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 905.679379][T15555] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000413711 [ 905.687344][T15555] RDX: 00007f250541cb0a RSI: 0000000000000002 RDI: 00007f250541cb00 [ 905.695309][T15555] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 905.703265][T15555] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 905.711212][T15555] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:03 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8035000000000000}}}}}, &(0x7f0000000100)) 11:52:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 11:52:03 executing program 0 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:03 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8100000000000000}}}}}, &(0x7f0000000100)) 11:52:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) [ 906.031951][T15582] FAULT_INJECTION: forcing a failure. [ 906.031951][T15582] name failslab, interval 1, probability 0, space 0, times 0 [ 906.046380][T15582] CPU: 1 PID: 15582 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 906.054284][T15582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 906.064701][T15582] Call Trace: [ 906.068004][T15582] dump_stack+0x1d8/0x2f8 [ 906.072469][T15582] should_fail+0x555/0x770 [ 906.076886][T15582] __should_failslab+0x11a/0x160 [ 906.081817][T15582] ? tomoyo_encode2+0x273/0x5a0 [ 906.086668][T15582] should_failslab+0x9/0x20 [ 906.091155][T15582] __kmalloc+0x7a/0x340 [ 906.095316][T15582] tomoyo_encode2+0x273/0x5a0 [ 906.099999][T15582] tomoyo_realpath_from_path+0x769/0x7c0 [ 906.105632][T15582] tomoyo_check_open_permission+0x1ce/0x9d0 [ 906.111614][T15582] tomoyo_file_open+0x141/0x190 [ 906.116460][T15582] security_file_open+0x65/0x2f0 [ 906.121378][T15582] do_dentry_open+0x34e/0xf90 [ 906.126044][T15582] vfs_open+0x73/0x80 [ 906.130301][T15582] path_openat+0x1397/0x4460 [ 906.134867][T15582] ? getname+0x19/0x20 [ 906.138924][T15582] ? check_preemption_disabled+0x47/0x2a0 [ 906.144626][T15582] ? trace_lock_release+0x135/0x1a0 [ 906.149816][T15582] ? __alloc_fd+0x58f/0x630 [ 906.154301][T15582] do_filp_open+0x192/0x3d0 [ 906.158800][T15582] do_sys_open+0x29f/0x560 [ 906.163301][T15582] __x64_sys_open+0x87/0x90 [ 906.167795][T15582] do_syscall_64+0xfe/0x140 [ 906.172277][T15582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 906.178140][T15582] RIP: 0033:0x413711 [ 906.182010][T15582] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 906.201594][T15582] RSP: 002b:00007f250541ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 906.209991][T15582] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000413711 [ 906.217956][T15582] RDX: 00007f250541cb0a RSI: 0000000000000002 RDI: 00007f250541cb00 11:52:03 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:03 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x84ffffff00000000}}}}}, &(0x7f0000000100)) [ 906.225910][T15582] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 906.234302][T15582] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 906.242264][T15582] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 906.252924][T15582] ERROR: Out of memory at tomoyo_realpath_from_path. 11:52:04 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x86ddffff00000000}}}}}, &(0x7f0000000100)) 11:52:04 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8847000000000000}}}}}, &(0x7f0000000100)) 11:52:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 11:52:04 executing program 0 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:04 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8848000000000000}}}}}, &(0x7f0000000100)) 11:52:04 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8864000000000000}}}}}, &(0x7f0000000100)) [ 906.764763][T15637] FAULT_INJECTION: forcing a failure. [ 906.764763][T15637] name failslab, interval 1, probability 0, space 0, times 0 11:52:04 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91", 0x76) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) [ 906.854052][T15637] CPU: 1 PID: 15637 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 906.869363][T15637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 906.879495][T15637] Call Trace: [ 906.882780][T15637] dump_stack+0x1d8/0x2f8 [ 906.887092][T15637] should_fail+0x555/0x770 [ 906.891514][T15637] __should_failslab+0x11a/0x160 [ 906.896520][T15637] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 906.902235][T15637] should_failslab+0x9/0x20 [ 906.906713][T15637] __kmalloc+0x7a/0x340 [ 906.910843][T15637] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 906.916627][T15637] tomoyo_realpath_from_path+0xdc/0x7c0 [ 906.922250][T15637] tomoyo_path_number_perm+0x166/0x640 [ 906.927717][T15637] ? smack_file_ioctl+0x226/0x2e0 [ 906.932988][T15637] ? __fget+0x461/0x510 [ 906.937120][T15637] tomoyo_file_ioctl+0x23/0x30 [ 906.941948][T15637] security_file_ioctl+0x6d/0xd0 [ 906.948255][T15637] __x64_sys_ioctl+0xa3/0x120 [ 906.953001][T15637] do_syscall_64+0xfe/0x140 [ 906.957512][T15637] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 906.963394][T15637] RIP: 0033:0x459697 [ 906.967267][T15637] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 906.986858][T15637] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 906.995257][T15637] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 907.003380][T15637] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 907.011332][T15637] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 907.019290][T15637] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 907.027465][T15637] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 907.037027][T15637] ERROR: Out of memory at tomoyo_realpath_from_path. 11:52:04 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btr\\s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:04 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x88a8ffff00000000}}}}}, &(0x7f0000000100)) 11:52:04 executing program 0 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:04 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91", 0x76) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:04 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x88caffff00000000}}}}}, &(0x7f0000000100)) [ 907.384092][T15673] FAULT_INJECTION: forcing a failure. [ 907.384092][T15673] name failslab, interval 1, probability 0, space 0, times 0 [ 907.397201][T15673] CPU: 1 PID: 15673 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 907.405092][T15673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 907.415340][T15673] Call Trace: [ 907.418628][T15673] dump_stack+0x1d8/0x2f8 [ 907.423037][T15673] should_fail+0x555/0x770 [ 907.427450][T15673] __should_failslab+0x11a/0x160 [ 907.432751][T15673] ? __kernfs_new_node+0x97/0x6b0 [ 907.437777][T15673] should_failslab+0x9/0x20 [ 907.442278][T15673] kmem_cache_alloc+0x56/0x2e0 [ 907.447025][T15673] __kernfs_new_node+0x97/0x6b0 [ 907.451853][T15673] ? check_preemption_disabled+0x47/0x2a0 [ 907.457742][T15673] ? debug_smp_processor_id+0x1c/0x20 [ 907.463091][T15673] ? perf_trace_lock_acquire+0x97/0x3b0 [ 907.468613][T15673] kernfs_new_node+0x97/0x180 [ 907.473354][T15673] kernfs_create_dir_ns+0x44/0x130 [ 907.478440][T15673] internal_create_group+0x207/0xd90 [ 907.483705][T15673] sysfs_create_group+0x1f/0x30 [ 907.488623][T15673] loop_set_fd+0xcb2/0x1180 [ 907.493128][T15673] lo_ioctl+0xd5/0x2200 [ 907.497348][T15673] ? __kasan_slab_free+0x12a/0x1e0 [ 907.502435][T15673] ? kasan_slab_free+0xe/0x10 [ 907.507084][T15673] ? kfree+0x115/0x200 [ 907.511130][T15673] ? tomoyo_path_number_perm+0x4e1/0x640 [ 907.516745][T15673] ? tomoyo_file_ioctl+0x23/0x30 [ 907.521666][T15673] ? security_file_ioctl+0x6d/0xd0 [ 907.526764][T15673] ? __x64_sys_ioctl+0xa3/0x120 [ 907.531619][T15673] ? do_syscall_64+0xfe/0x140 [ 907.536380][T15673] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 907.542448][T15673] ? debug_check_no_obj_freed+0x505/0x5b0 [ 907.548762][T15673] ? trace_lock_release+0x135/0x1a0 [ 907.553936][T15673] ? debug_check_no_obj_freed+0x505/0x5b0 [ 907.559637][T15673] ? rcu_lock_release+0x9/0x30 [ 907.564388][T15673] ? trace_lock_release+0x135/0x1a0 [ 907.569571][T15673] ? rcu_lock_release+0x9/0x30 [ 907.574321][T15673] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 907.579948][T15673] ? lo_release+0x1f0/0x1f0 [ 907.584447][T15673] blkdev_ioctl+0x807/0x2990 [ 907.589042][T15673] ? tomoyo_path_number_perm+0x53e/0x640 [ 907.594663][T15673] block_ioctl+0xbd/0x100 [ 907.598966][T15673] ? blkdev_iopoll+0x100/0x100 [ 907.603705][T15673] do_vfs_ioctl+0x744/0x1730 [ 907.608266][T15673] ? __fget+0x461/0x510 [ 907.612417][T15673] ? tomoyo_file_ioctl+0x23/0x30 [ 907.617331][T15673] ? security_file_ioctl+0xa1/0xd0 [ 907.622418][T15673] __x64_sys_ioctl+0xe3/0x120 [ 907.627088][T15673] do_syscall_64+0xfe/0x140 [ 907.631566][T15673] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 907.637441][T15673] RIP: 0033:0x459697 [ 907.641321][T15673] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 907.661008][T15673] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 907.669408][T15673] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 907.677386][T15673] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 907.685348][T15673] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 907.693309][T15673] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 907.701259][T15673] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrf\n\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:05 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:05 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x88ffffff00000000}}}}}, &(0x7f0000000100)) 11:52:05 executing program 0 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:05 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8906000000000000}}}}}, &(0x7f0000000100)) 11:52:05 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91", 0x76) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) [ 907.972633][T15702] FAULT_INJECTION: forcing a failure. [ 907.972633][T15702] name failslab, interval 1, probability 0, space 0, times 0 11:52:05 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x89ffffff00000000}}}}}, &(0x7f0000000100)) [ 908.048925][T15702] CPU: 1 PID: 15702 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 908.056945][T15702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 908.067088][T15702] Call Trace: [ 908.070379][T15702] dump_stack+0x1d8/0x2f8 [ 908.074843][T15702] should_fail+0x555/0x770 [ 908.079265][T15702] __should_failslab+0x11a/0x160 [ 908.084360][T15702] ? tomoyo_encode2+0x273/0x5a0 [ 908.089193][T15702] should_failslab+0x9/0x20 [ 908.093679][T15702] __kmalloc+0x7a/0x340 [ 908.097850][T15702] tomoyo_encode2+0x273/0x5a0 [ 908.102597][T15702] tomoyo_realpath_from_path+0x769/0x7c0 [ 908.108378][T15702] tomoyo_path_number_perm+0x166/0x640 [ 908.113819][T15702] ? smack_file_ioctl+0x226/0x2e0 [ 908.118828][T15702] ? __fget+0x461/0x510 [ 908.123041][T15702] tomoyo_file_ioctl+0x23/0x30 [ 908.127778][T15702] security_file_ioctl+0x6d/0xd0 [ 908.132690][T15702] __x64_sys_ioctl+0xa3/0x120 [ 908.137469][T15702] do_syscall_64+0xfe/0x140 [ 908.141979][T15702] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 908.147950][T15702] RIP: 0033:0x459697 [ 908.152081][T15702] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 908.171790][T15702] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 908.180185][T15702] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 908.188134][T15702] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 11:52:05 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) [ 908.196082][T15702] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 908.204201][T15702] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 908.212150][T15702] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 908.223050][T15702] ERROR: Out of memory at tomoyo_realpath_from_path. 11:52:05 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xe803000000000000}}}}}, &(0x7f0000000100)) 11:52:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:06 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:06 executing program 0 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:06 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xf003000000000000}}}}}, &(0x7f0000000100)) 11:52:06 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) [ 908.484743][T15745] FAULT_INJECTION: forcing a failure. [ 908.484743][T15745] name failslab, interval 1, probability 0, space 0, times 0 [ 908.519631][T15745] CPU: 1 PID: 15745 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 11:52:06 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xf401000000000000}}}}}, &(0x7f0000000100)) [ 908.527557][T15745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 908.527561][T15745] Call Trace: [ 908.527579][T15745] dump_stack+0x1d8/0x2f8 [ 908.527594][T15745] should_fail+0x555/0x770 [ 908.527608][T15745] __should_failslab+0x11a/0x160 [ 908.527621][T15745] ? loop_set_fd+0x1180/0x1180 [ 908.527632][T15745] should_failslab+0x9/0x20 [ 908.527647][T15745] kmem_cache_alloc_trace+0x5d/0x2f0 [ 908.569374][T15745] ? __kthread_create_on_node+0xb2/0x3b0 [ 908.575179][T15745] ? loop_set_fd+0x1180/0x1180 [ 908.579920][T15745] __kthread_create_on_node+0xb2/0x3b0 [ 908.585368][T15745] ? loop_set_fd+0x1180/0x1180 [ 908.590124][T15745] kthread_create_on_node+0x72/0xa0 [ 908.595324][T15745] ? lockdep_init_map+0x2a/0x680 [ 908.600249][T15745] ? __kthread_init_worker+0x5a/0xe0 [ 908.605751][T15745] loop_set_fd+0x6a8/0x1180 [ 908.610244][T15745] ? check_preemption_disabled+0xb7/0x2a0 [ 908.616146][T15745] ? tomoyo_path_number_perm+0x4e1/0x640 [ 908.622016][T15745] lo_ioctl+0xd5/0x2200 [ 908.626327][T15745] ? __kasan_slab_free+0x12a/0x1e0 [ 908.631429][T15745] ? kasan_slab_free+0xe/0x10 [ 908.636086][T15745] ? kfree+0x115/0x200 [ 908.640246][T15745] ? tomoyo_path_number_perm+0x4e1/0x640 [ 908.646052][T15745] ? tomoyo_file_ioctl+0x23/0x30 [ 908.651063][T15745] ? security_file_ioctl+0x6d/0xd0 [ 908.656166][T15745] ? __x64_sys_ioctl+0xa3/0x120 [ 908.660995][T15745] ? do_syscall_64+0xfe/0x140 [ 908.665702][T15745] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 908.671859][T15745] ? debug_check_no_obj_freed+0x505/0x5b0 [ 908.677653][T15745] ? trace_lock_release+0x135/0x1a0 [ 908.683017][T15745] ? debug_check_no_obj_freed+0x505/0x5b0 [ 908.688722][T15745] ? rcu_lock_release+0x9/0x30 [ 908.693475][T15745] ? trace_lock_release+0x135/0x1a0 [ 908.698653][T15745] ? rcu_lock_release+0x9/0x30 [ 908.703494][T15745] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 908.709288][T15745] ? lo_release+0x1f0/0x1f0 [ 908.713774][T15745] blkdev_ioctl+0x807/0x2990 [ 908.718347][T15745] ? tomoyo_path_number_perm+0x53e/0x640 [ 908.723966][T15745] block_ioctl+0xbd/0x100 [ 908.728276][T15745] ? blkdev_iopoll+0x100/0x100 [ 908.733059][T15745] do_vfs_ioctl+0x744/0x1730 [ 908.737729][T15745] ? __fget+0x461/0x510 [ 908.741877][T15745] ? tomoyo_file_ioctl+0x23/0x30 [ 908.746804][T15745] ? security_file_ioctl+0xa1/0xd0 [ 908.752029][T15745] __x64_sys_ioctl+0xe3/0x120 [ 908.756880][T15745] do_syscall_64+0xfe/0x140 [ 908.761404][T15745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 908.767574][T15745] RIP: 0033:0x459697 [ 908.771804][T15745] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 908.791391][T15745] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 908.799875][T15745] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 908.807915][T15745] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 908.815913][T15745] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 908.823950][T15745] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 908.831911][T15745] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:06 executing program 0 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:06 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:06 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xfdffffff00000000}}}}}, &(0x7f0000000100)) 11:52:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:06 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xfe03000000000000}}}}}, &(0x7f0000000100)) 11:52:06 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(0xffffffffffffffff, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) [ 909.054367][T15771] FAULT_INJECTION: forcing a failure. [ 909.054367][T15771] name failslab, interval 1, probability 0, space 0, times 0 [ 909.072036][T15771] CPU: 1 PID: 15771 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 909.080053][T15771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 909.090098][T15771] Call Trace: [ 909.093388][T15771] dump_stack+0x1d8/0x2f8 [ 909.097715][T15771] should_fail+0x555/0x770 [ 909.102337][T15771] __should_failslab+0x11a/0x160 [ 909.107273][T15771] ? __kernfs_new_node+0x97/0x6b0 [ 909.112482][T15771] should_failslab+0x9/0x20 [ 909.116970][T15771] kmem_cache_alloc+0x56/0x2e0 [ 909.121868][T15771] __kernfs_new_node+0x97/0x6b0 [ 909.126830][T15771] ? check_preemption_disabled+0x47/0x2a0 [ 909.132535][T15771] ? debug_smp_processor_id+0x1c/0x20 [ 909.137990][T15771] ? perf_trace_lock_acquire+0x97/0x3b0 [ 909.143526][T15771] kernfs_new_node+0x97/0x180 [ 909.148194][T15771] kernfs_create_dir_ns+0x44/0x130 [ 909.153543][T15771] internal_create_group+0x207/0xd90 [ 909.159012][T15771] sysfs_create_group+0x1f/0x30 [ 909.163945][T15771] loop_set_fd+0xcb2/0x1180 [ 909.168441][T15771] lo_ioctl+0xd5/0x2200 [ 909.172729][T15771] ? __kasan_slab_free+0x12a/0x1e0 [ 909.177864][T15771] ? kasan_slab_free+0xe/0x10 [ 909.182724][T15771] ? kfree+0x115/0x200 [ 909.186901][T15771] ? tomoyo_path_number_perm+0x4e1/0x640 [ 909.192529][T15771] ? tomoyo_file_ioctl+0x23/0x30 [ 909.197537][T15771] ? security_file_ioctl+0x6d/0xd0 [ 909.202854][T15771] ? __x64_sys_ioctl+0xa3/0x120 [ 909.207689][T15771] ? do_syscall_64+0xfe/0x140 [ 909.212430][T15771] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 909.218491][T15771] ? debug_check_no_obj_freed+0x505/0x5b0 [ 909.224514][T15771] ? trace_lock_release+0x135/0x1a0 [ 909.229846][T15771] ? debug_check_no_obj_freed+0x505/0x5b0 [ 909.235558][T15771] ? rcu_lock_release+0x9/0x30 [ 909.240309][T15771] ? trace_lock_release+0x135/0x1a0 [ 909.245607][T15771] ? rcu_lock_release+0x9/0x30 [ 909.250544][T15771] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 909.256171][T15771] ? lo_release+0x1f0/0x1f0 [ 909.260787][T15771] blkdev_ioctl+0x807/0x2990 [ 909.265629][T15771] ? tomoyo_path_number_perm+0x53e/0x640 [ 909.271264][T15771] block_ioctl+0xbd/0x100 [ 909.275669][T15771] ? blkdev_iopoll+0x100/0x100 [ 909.280426][T15771] do_vfs_ioctl+0x744/0x1730 [ 909.285002][T15771] ? __fget+0x461/0x510 [ 909.289165][T15771] ? tomoyo_file_ioctl+0x23/0x30 [ 909.294433][T15771] ? security_file_ioctl+0xa1/0xd0 [ 909.299640][T15771] __x64_sys_ioctl+0xe3/0x120 [ 909.304310][T15771] do_syscall_64+0xfe/0x140 [ 909.308886][T15771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 909.314856][T15771] RIP: 0033:0x459697 [ 909.318738][T15771] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 909.339810][T15771] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 11:52:07 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xfeffffff00000000}}}}}, &(0x7f0000000100)) [ 909.349144][T15771] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 909.357352][T15771] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 909.365445][T15771] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 909.374296][T15771] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 909.382271][T15771] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:07 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:07 executing program 0 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:07 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xffff000000000000}}}}}, &(0x7f0000000100)) 11:52:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:07 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(0xffffffffffffffff, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) [ 909.721767][T15814] FAULT_INJECTION: forcing a failure. [ 909.721767][T15814] name failslab, interval 1, probability 0, space 0, times 0 [ 909.756111][T15814] CPU: 0 PID: 15814 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 11:52:07 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) 11:52:07 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xffffffff00000000}}}}}, &(0x7f0000000100)) [ 909.764240][T15814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 909.774577][T15814] Call Trace: [ 909.778106][T15814] dump_stack+0x1d8/0x2f8 [ 909.782602][T15814] should_fail+0x555/0x770 [ 909.787106][T15814] __should_failslab+0x11a/0x160 [ 909.792307][T15814] ? __kernfs_new_node+0x97/0x6b0 [ 909.797786][T15814] should_failslab+0x9/0x20 [ 909.802385][T15814] kmem_cache_alloc+0x56/0x2e0 [ 909.807472][T15814] __kernfs_new_node+0x97/0x6b0 [ 909.812415][T15814] ? kernfs_add_one+0x49c/0x670 [ 909.817627][T15814] ? __kasan_check_write+0x14/0x20 [ 909.822957][T15814] kernfs_new_node+0x97/0x180 [ 909.827895][T15814] __kernfs_create_file+0x4a/0x2f0 [ 909.833010][T15814] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 909.838626][T15814] internal_create_group+0x4be/0xd90 [ 909.844169][T15814] sysfs_create_group+0x1f/0x30 [ 909.849461][T15814] loop_set_fd+0xcb2/0x1180 [ 909.853973][T15814] lo_ioctl+0xd5/0x2200 [ 909.858388][T15814] ? __kasan_slab_free+0x12a/0x1e0 [ 909.863697][T15814] ? kasan_slab_free+0xe/0x10 [ 909.868678][T15814] ? kfree+0x115/0x200 [ 909.872842][T15814] ? tomoyo_path_number_perm+0x4e1/0x640 [ 909.878574][T15814] ? tomoyo_file_ioctl+0x23/0x30 [ 909.883704][T15814] ? security_file_ioctl+0x6d/0xd0 [ 909.888835][T15814] ? __x64_sys_ioctl+0xa3/0x120 [ 909.893692][T15814] ? do_syscall_64+0xfe/0x140 [ 909.898592][T15814] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 909.904683][T15814] ? debug_check_no_obj_freed+0x505/0x5b0 [ 909.910502][T15814] ? trace_lock_release+0x135/0x1a0 [ 909.915806][T15814] ? debug_check_no_obj_freed+0x505/0x5b0 [ 909.921536][T15814] ? rcu_lock_release+0x9/0x30 [ 909.926383][T15814] ? trace_lock_release+0x135/0x1a0 [ 909.931931][T15814] ? rcu_lock_release+0x9/0x30 [ 909.936789][T15814] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 909.942734][T15814] ? lo_release+0x1f0/0x1f0 [ 909.947353][T15814] blkdev_ioctl+0x807/0x2990 [ 909.952057][T15814] ? tomoyo_path_number_perm+0x53e/0x640 [ 909.958085][T15814] block_ioctl+0xbd/0x100 [ 909.962519][T15814] ? blkdev_iopoll+0x100/0x100 [ 909.967332][T15814] do_vfs_ioctl+0x744/0x1730 [ 909.972096][T15814] ? __fget+0x461/0x510 [ 909.976525][T15814] ? tomoyo_file_ioctl+0x23/0x30 [ 909.981484][T15814] ? security_file_ioctl+0xa1/0xd0 [ 909.986689][T15814] __x64_sys_ioctl+0xe3/0x120 [ 909.991904][T15814] do_syscall_64+0xfe/0x140 [ 909.996725][T15814] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 910.002968][T15814] RIP: 0033:0x459697 [ 910.007399][T15814] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 910.027563][T15814] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 910.036388][T15814] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 910.045462][T15814] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 910.053611][T15814] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 910.061780][T15814] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 910.070095][T15814] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrf/\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:07 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(0xffffffffffffffff, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:07 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2}}}}}, &(0x7f0000000100)) 11:52:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:07 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) 11:52:07 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3}}}}}, &(0x7f0000000100)) 11:52:07 executing program 0 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 910.451602][T15858] FAULT_INJECTION: forcing a failure. [ 910.451602][T15858] name failslab, interval 1, probability 0, space 0, times 0 [ 910.481027][T15858] CPU: 1 PID: 15858 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 910.489342][T15858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 11:52:08 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, 0xffffffffffffffff, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:08 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x4}}}}}, &(0x7f0000000100)) [ 910.499673][T15858] Call Trace: [ 910.503158][T15858] dump_stack+0x1d8/0x2f8 [ 910.507505][T15858] should_fail+0x555/0x770 [ 910.511929][T15858] __should_failslab+0x11a/0x160 [ 910.517309][T15858] ? __kernfs_new_node+0x97/0x6b0 [ 910.522715][T15858] should_failslab+0x9/0x20 [ 910.527792][T15858] kmem_cache_alloc+0x56/0x2e0 [ 910.532873][T15858] __kernfs_new_node+0x97/0x6b0 [ 910.537722][T15858] ? __kasan_check_write+0x14/0x20 [ 910.542822][T15858] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 910.548531][T15858] ? mutex_unlock+0xd/0x10 [ 910.552937][T15858] ? kernfs_activate+0x213/0x230 [ 910.558609][T15858] kernfs_new_node+0x97/0x180 [ 910.563443][T15858] __kernfs_create_file+0x4a/0x2f0 [ 910.568662][T15858] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 910.577357][T15858] internal_create_group+0x4be/0xd90 [ 910.582879][T15858] sysfs_create_group+0x1f/0x30 [ 910.587835][T15858] loop_set_fd+0xcb2/0x1180 [ 910.592427][T15858] lo_ioctl+0xd5/0x2200 [ 910.596997][T15858] ? finish_task_switch+0x251/0x550 [ 910.602241][T15858] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 910.608167][T15858] ? trace_hardirqs_on_caller+0x46/0x80 [ 910.613959][T15858] ? retint_kernel+0x2b/0x2b [ 910.618571][T15858] ? trace_hardirqs_on_caller+0x74/0x80 [ 910.624403][T15858] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 910.630058][T15858] ? preempt_schedule_irq+0x10a/0x140 [ 910.635716][T15858] ? retint_kernel+0x2b/0x2b [ 910.640627][T15858] ? rcu_lock_release+0x9/0x30 [ 910.645474][T15858] ? trace_lock_release+0x117/0x1a0 [ 910.651149][T15858] ? lock_release+0x4c7/0x780 [ 910.655827][T15858] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 910.661904][T15858] ? lo_release+0x1f0/0x1f0 [ 910.666618][T15858] blkdev_ioctl+0x807/0x2990 [ 910.671385][T15858] ? tomoyo_path_number_perm+0x53e/0x640 [ 910.677016][T15858] block_ioctl+0xbd/0x100 [ 910.681555][T15858] ? blkdev_iopoll+0x100/0x100 [ 910.686605][T15858] do_vfs_ioctl+0x744/0x1730 [ 910.691282][T15858] ? __fget+0x461/0x510 [ 910.695434][T15858] ? tomoyo_file_ioctl+0x23/0x30 [ 910.700529][T15858] ? security_file_ioctl+0xa1/0xd0 [ 910.705636][T15858] __x64_sys_ioctl+0xe3/0x120 [ 910.710302][T15858] do_syscall_64+0xfe/0x140 [ 910.715091][T15858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 910.721223][T15858] RIP: 0033:0x459697 [ 910.725104][T15858] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 910.745921][T15858] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 910.754900][T15858] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 910.763502][T15858] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 910.771901][T15858] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 910.779956][T15858] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 910.787913][T15858] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:08 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x5}}}}}, &(0x7f0000000100)) 11:52:08 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) 11:52:08 executing program 0 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:08 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}, &(0x7f0000000100)) 11:52:08 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, 0xffffffffffffffff, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:08 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x7}}}}}, &(0x7f0000000100)) 11:52:08 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) [ 911.110105][T15890] FAULT_INJECTION: forcing a failure. [ 911.110105][T15890] name failslab, interval 1, probability 0, space 0, times 0 [ 911.127001][T15890] CPU: 0 PID: 15890 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 911.136494][T15890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 911.146999][T15890] Call Trace: [ 911.150525][T15890] dump_stack+0x1d8/0x2f8 [ 911.155570][T15890] should_fail+0x555/0x770 [ 911.160206][T15890] __should_failslab+0x11a/0x160 [ 911.165243][T15890] should_failslab+0x9/0x20 [ 911.169972][T15890] kmem_cache_alloc_trace+0x5d/0x2f0 [ 911.175346][T15890] ? kobject_uevent_env+0x2cd/0x1260 [ 911.180998][T15890] ? dev_uevent_filter+0xb0/0xb0 [ 911.186035][T15890] kobject_uevent_env+0x2cd/0x1260 [ 911.191163][T15890] kobject_uevent+0x1f/0x30 [ 911.197226][T15890] loop_set_fd+0xd21/0x1180 [ 911.201833][T15890] lo_ioctl+0xd5/0x2200 [ 911.206386][T15890] ? __kasan_slab_free+0x12a/0x1e0 [ 911.211600][T15890] ? kasan_slab_free+0xe/0x10 [ 911.216603][T15890] ? kfree+0x115/0x200 [ 911.220660][T15890] ? tomoyo_path_number_perm+0x4e1/0x640 [ 911.227141][T15890] ? tomoyo_file_ioctl+0x23/0x30 [ 911.232583][T15890] ? security_file_ioctl+0x6d/0xd0 [ 911.238360][T15890] ? __x64_sys_ioctl+0xa3/0x120 [ 911.244117][T15890] ? do_syscall_64+0xfe/0x140 [ 911.248790][T15890] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 911.255395][T15890] ? debug_check_no_obj_freed+0x505/0x5b0 [ 911.261477][T15890] ? trace_lock_release+0x135/0x1a0 [ 911.267012][T15890] ? debug_check_no_obj_freed+0x505/0x5b0 [ 911.272996][T15890] ? rcu_lock_release+0x9/0x30 [ 911.277929][T15890] ? trace_lock_release+0x135/0x1a0 [ 911.283508][T15890] ? rcu_lock_release+0x9/0x30 [ 911.288468][T15890] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 911.294104][T15890] ? lo_release+0x1f0/0x1f0 [ 911.298781][T15890] blkdev_ioctl+0x807/0x2990 [ 911.303539][T15890] ? tomoyo_path_number_perm+0x53e/0x640 [ 911.309286][T15890] block_ioctl+0xbd/0x100 [ 911.313623][T15890] ? blkdev_iopoll+0x100/0x100 [ 911.318474][T15890] do_vfs_ioctl+0x744/0x1730 [ 911.323331][T15890] ? __fget+0x461/0x510 [ 911.327680][T15890] ? tomoyo_file_ioctl+0x23/0x30 [ 911.332789][T15890] ? security_file_ioctl+0xa1/0xd0 [ 911.338066][T15890] __x64_sys_ioctl+0xe3/0x120 [ 911.342911][T15890] do_syscall_64+0xfe/0x140 [ 911.347573][T15890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 911.353577][T15890] RIP: 0033:0x459697 [ 911.357493][T15890] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 911.378106][T15890] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 911.386656][T15890] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 911.394905][T15890] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 911.403036][T15890] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 11:52:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfL\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 911.411001][T15890] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 911.419174][T15890] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:09 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, 0xffffffffffffffff, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:09 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}, &(0x7f0000000100)) 11:52:09 executing program 0 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:09 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}, &(0x7f0000000100)) [ 911.695949][T15923] FAULT_INJECTION: forcing a failure. [ 911.695949][T15923] name failslab, interval 1, probability 0, space 0, times 0 [ 911.711197][T15923] CPU: 1 PID: 15923 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 911.719382][T15923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 911.731408][T15923] Call Trace: [ 911.735273][T15923] dump_stack+0x1d8/0x2f8 [ 911.739723][T15923] should_fail+0x555/0x770 [ 911.744597][T15923] __should_failslab+0x11a/0x160 [ 911.749902][T15923] ? __kernfs_new_node+0x97/0x6b0 [ 911.755277][T15923] should_failslab+0x9/0x20 [ 911.763515][T15923] kmem_cache_alloc+0x56/0x2e0 [ 911.768542][T15923] __kernfs_new_node+0x97/0x6b0 [ 911.774005][T15923] ? __kasan_check_write+0x14/0x20 [ 911.779284][T15923] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 911.785028][T15923] ? mutex_unlock+0xd/0x10 [ 911.790057][T15923] ? kernfs_activate+0x213/0x230 [ 911.795126][T15923] kernfs_new_node+0x97/0x180 [ 911.799797][T15923] __kernfs_create_file+0x4a/0x2f0 [ 911.805394][T15923] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 911.810884][T15923] internal_create_group+0x4be/0xd90 [ 911.816300][T15923] sysfs_create_group+0x1f/0x30 [ 911.821135][T15923] loop_set_fd+0xcb2/0x1180 [ 911.825651][T15923] lo_ioctl+0xd5/0x2200 [ 911.829880][T15923] ? __kasan_slab_free+0x12a/0x1e0 [ 911.835725][T15923] ? kasan_slab_free+0xe/0x10 [ 911.841145][T15923] ? kfree+0x115/0x200 [ 911.845388][T15923] ? tomoyo_path_number_perm+0x4e1/0x640 [ 911.851013][T15923] ? tomoyo_file_ioctl+0x23/0x30 [ 911.856274][T15923] ? security_file_ioctl+0x6d/0xd0 [ 911.861471][T15923] ? __x64_sys_ioctl+0xa3/0x120 [ 911.866381][T15923] ? do_syscall_64+0xfe/0x140 [ 911.871230][T15923] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 911.877381][T15923] ? debug_check_no_obj_freed+0x505/0x5b0 [ 911.883212][T15923] ? trace_lock_release+0x135/0x1a0 [ 911.888421][T15923] ? debug_check_no_obj_freed+0x505/0x5b0 [ 911.894228][T15923] ? rcu_lock_release+0x9/0x30 [ 911.899081][T15923] ? trace_lock_release+0x135/0x1a0 [ 911.904447][T15923] ? rcu_lock_release+0x9/0x30 [ 911.909226][T15923] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 911.914845][T15923] ? lo_release+0x1f0/0x1f0 [ 911.919430][T15923] blkdev_ioctl+0x807/0x2990 [ 911.924008][T15923] ? tomoyo_path_number_perm+0x53e/0x640 [ 911.929659][T15923] block_ioctl+0xbd/0x100 [ 911.933990][T15923] ? blkdev_iopoll+0x100/0x100 [ 911.938915][T15923] do_vfs_ioctl+0x744/0x1730 [ 911.943802][T15923] ? __fget+0x461/0x510 [ 911.949010][T15923] ? tomoyo_file_ioctl+0x23/0x30 [ 911.954028][T15923] ? security_file_ioctl+0xa1/0xd0 [ 911.959800][T15923] __x64_sys_ioctl+0xe3/0x120 [ 911.965069][T15923] do_syscall_64+0xfe/0x140 [ 911.969560][T15923] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 911.975705][T15923] RIP: 0033:0x459697 [ 911.979730][T15923] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 911.999731][T15923] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 912.008572][T15923] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 912.016708][T15923] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 912.024762][T15923] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 912.032849][T15923] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 11:52:09 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}, &(0x7f0000000100)) 11:52:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 912.040956][T15923] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:09 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xc}}}}}, &(0x7f0000000100)) 11:52:09 executing program 0 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:09 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xd}}}}}, &(0x7f0000000100)) 11:52:09 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrf/\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:10 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:10 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xf}}}}}, &(0x7f0000000100)) [ 912.442779][T15953] FAULT_INJECTION: forcing a failure. [ 912.442779][T15953] name failslab, interval 1, probability 0, space 0, times 0 [ 912.471304][T15953] CPU: 0 PID: 15953 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 912.479317][T15953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 912.490886][T15953] Call Trace: [ 912.494429][T15953] dump_stack+0x1d8/0x2f8 [ 912.499019][T15953] should_fail+0x555/0x770 [ 912.503591][T15953] __should_failslab+0x11a/0x160 [ 912.508624][T15953] ? __kernfs_new_node+0x97/0x6b0 [ 912.514093][T15953] should_failslab+0x9/0x20 [ 912.518762][T15953] kmem_cache_alloc+0x56/0x2e0 [ 912.523696][T15953] __kernfs_new_node+0x97/0x6b0 [ 912.528706][T15953] ? __kasan_check_write+0x14/0x20 [ 912.534175][T15953] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 912.540893][T15953] ? mutex_unlock+0xd/0x10 [ 912.545489][T15953] ? kernfs_activate+0x213/0x230 [ 912.550639][T15953] kernfs_new_node+0x97/0x180 [ 912.555835][T15953] __kernfs_create_file+0x4a/0x2f0 [ 912.560951][T15953] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 912.566757][T15953] internal_create_group+0x4be/0xd90 [ 912.572459][T15953] sysfs_create_group+0x1f/0x30 [ 912.577563][T15953] loop_set_fd+0xcb2/0x1180 [ 912.582085][T15953] lo_ioctl+0xd5/0x2200 [ 912.586235][T15953] ? __kasan_slab_free+0x12a/0x1e0 [ 912.591442][T15953] ? kasan_slab_free+0xe/0x10 [ 912.596552][T15953] ? kfree+0x115/0x200 [ 912.600608][T15953] ? tomoyo_path_number_perm+0x4e1/0x640 [ 912.606232][T15953] ? tomoyo_file_ioctl+0x23/0x30 [ 912.611159][T15953] ? security_file_ioctl+0x6d/0xd0 [ 912.616378][T15953] ? __x64_sys_ioctl+0xa3/0x120 [ 912.621402][T15953] ? do_syscall_64+0xfe/0x140 [ 912.626508][T15953] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 912.632571][T15953] ? debug_check_no_obj_freed+0x505/0x5b0 [ 912.638716][T15953] ? trace_lock_release+0x135/0x1a0 [ 912.644001][T15953] ? debug_check_no_obj_freed+0x505/0x5b0 [ 912.650443][T15953] ? rcu_lock_release+0x9/0x30 [ 912.655305][T15953] ? trace_lock_release+0x135/0x1a0 [ 912.661567][T15953] ? rcu_lock_release+0x9/0x30 [ 912.667207][T15953] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 912.672933][T15953] ? lo_release+0x1f0/0x1f0 [ 912.677622][T15953] blkdev_ioctl+0x807/0x2990 [ 912.682374][T15953] ? tomoyo_path_number_perm+0x53e/0x640 [ 912.688172][T15953] block_ioctl+0xbd/0x100 [ 912.692670][T15953] ? blkdev_iopoll+0x100/0x100 [ 912.697601][T15953] do_vfs_ioctl+0x744/0x1730 [ 912.702479][T15953] ? __fget+0x461/0x510 [ 912.706710][T15953] ? tomoyo_file_ioctl+0x23/0x30 [ 912.711816][T15953] ? security_file_ioctl+0xa1/0xd0 [ 912.717263][T15953] __x64_sys_ioctl+0xe3/0x120 [ 912.722659][T15953] do_syscall_64+0xfe/0x140 [ 912.727336][T15953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 912.733796][T15953] RIP: 0033:0x459697 [ 912.738418][T15953] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 912.759135][T15953] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 912.768386][T15953] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 912.778006][T15953] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 912.786143][T15953] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 912.794358][T15953] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 912.802639][T15953] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:10 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x11}}}}}, &(0x7f0000000100)) 11:52:10 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:10 executing program 0 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:10 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x14}}}}}, &(0x7f0000000100)) 11:52:10 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrf\\\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:10 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) [ 913.177399][T15994] FAULT_INJECTION: forcing a failure. [ 913.177399][T15994] name failslab, interval 1, probability 0, space 0, times 0 [ 913.194750][T15994] CPU: 1 PID: 15994 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 913.202688][T15994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 913.212752][T15994] Call Trace: [ 913.216243][T15994] dump_stack+0x1d8/0x2f8 [ 913.220946][T15994] should_fail+0x555/0x770 [ 913.225903][T15994] __should_failslab+0x11a/0x160 [ 913.231364][T15994] ? __kernfs_new_node+0x97/0x6b0 [ 913.236940][T15994] should_failslab+0x9/0x20 [ 913.241521][T15994] kmem_cache_alloc+0x56/0x2e0 [ 913.246758][T15994] __kernfs_new_node+0x97/0x6b0 [ 913.252142][T15994] ? __kasan_check_write+0x14/0x20 [ 913.257507][T15994] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 913.263643][T15994] ? mutex_unlock+0xd/0x10 [ 913.268622][T15994] ? kernfs_activate+0x213/0x230 [ 913.273723][T15994] kernfs_new_node+0x97/0x180 [ 913.279687][T15994] __kernfs_create_file+0x4a/0x2f0 [ 913.285102][T15994] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 913.290682][T15994] internal_create_group+0x4be/0xd90 [ 913.296924][T15994] sysfs_create_group+0x1f/0x30 [ 913.301900][T15994] loop_set_fd+0xcb2/0x1180 [ 913.306395][T15994] lo_ioctl+0xd5/0x2200 [ 913.310541][T15994] ? __kasan_slab_free+0x12a/0x1e0 [ 913.315769][T15994] ? kasan_slab_free+0xe/0x10 [ 913.320590][T15994] ? kfree+0x115/0x200 [ 913.324821][T15994] ? tomoyo_path_number_perm+0x4e1/0x640 [ 913.330461][T15994] ? tomoyo_file_ioctl+0x23/0x30 [ 913.335476][T15994] ? security_file_ioctl+0x6d/0xd0 [ 913.340769][T15994] ? __x64_sys_ioctl+0xa3/0x120 [ 913.345821][T15994] ? do_syscall_64+0xfe/0x140 [ 913.350487][T15994] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 913.356780][T15994] ? debug_check_no_obj_freed+0x505/0x5b0 [ 913.362719][T15994] ? trace_lock_release+0x135/0x1a0 [ 913.368298][T15994] ? debug_check_no_obj_freed+0x505/0x5b0 [ 913.374244][T15994] ? rcu_lock_release+0x9/0x30 [ 913.379379][T15994] ? trace_lock_release+0x135/0x1a0 [ 913.384645][T15994] ? rcu_lock_release+0x9/0x30 [ 913.389907][T15994] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 913.395553][T15994] ? lo_release+0x1f0/0x1f0 [ 913.400129][T15994] blkdev_ioctl+0x807/0x2990 [ 913.406263][T15994] ? tomoyo_path_number_perm+0x53e/0x640 [ 913.412416][T15994] block_ioctl+0xbd/0x100 [ 913.418681][T15994] ? blkdev_iopoll+0x100/0x100 [ 913.423434][T15994] do_vfs_ioctl+0x744/0x1730 [ 913.428177][T15994] ? __fget+0x461/0x510 [ 913.432445][T15994] ? tomoyo_file_ioctl+0x23/0x30 [ 913.437380][T15994] ? security_file_ioctl+0xa1/0xd0 [ 913.442616][T15994] __x64_sys_ioctl+0xe3/0x120 [ 913.447656][T15994] do_syscall_64+0xfe/0x140 [ 913.452574][T15994] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 913.458466][T15994] RIP: 0033:0x459697 [ 913.462515][T15994] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 913.483612][T15994] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 913.492238][T15994] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 913.500196][T15994] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 913.508289][T15994] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 913.516474][T15994] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 11:52:11 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x21}}}}}, &(0x7f0000000100)) 11:52:11 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) [ 913.524677][T15994] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:11 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:11 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x29}}}}}, &(0x7f0000000100)) 11:52:11 executing program 0 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfL\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:11 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2b}}}}}, &(0x7f0000000100)) 11:52:11 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000002580), 0x7fffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x80b0) [ 913.877464][T16039] FAULT_INJECTION: forcing a failure. [ 913.877464][T16039] name failslab, interval 1, probability 0, space 0, times 0 [ 913.891791][T16039] CPU: 0 PID: 16039 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 913.900058][T16039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 913.910248][T16039] Call Trace: [ 913.913651][T16039] dump_stack+0x1d8/0x2f8 [ 913.918132][T16039] should_fail+0x555/0x770 [ 913.923325][T16039] __should_failslab+0x11a/0x160 [ 913.928494][T16039] ? __kernfs_new_node+0x97/0x6b0 [ 913.933807][T16039] should_failslab+0x9/0x20 [ 913.938325][T16039] kmem_cache_alloc+0x56/0x2e0 [ 913.943431][T16039] __kernfs_new_node+0x97/0x6b0 [ 913.948824][T16039] ? __kasan_check_write+0x14/0x20 [ 913.954389][T16039] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 913.960896][T16039] ? mutex_unlock+0xd/0x10 [ 913.965740][T16039] ? kernfs_activate+0x213/0x230 [ 913.970871][T16039] kernfs_new_node+0x97/0x180 [ 913.975759][T16039] __kernfs_create_file+0x4a/0x2f0 [ 913.981753][T16039] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 913.988113][T16039] internal_create_group+0x4be/0xd90 [ 913.993787][T16039] sysfs_create_group+0x1f/0x30 [ 913.998743][T16039] loop_set_fd+0xcb2/0x1180 [ 914.003559][T16039] lo_ioctl+0xd5/0x2200 [ 914.007894][T16039] ? __kasan_slab_free+0x12a/0x1e0 [ 914.013322][T16039] ? kasan_slab_free+0xe/0x10 [ 914.018110][T16039] ? kfree+0x115/0x200 [ 914.022335][T16039] ? tomoyo_path_number_perm+0x4e1/0x640 [ 914.028329][T16039] ? tomoyo_file_ioctl+0x23/0x30 [ 914.033721][T16039] ? security_file_ioctl+0x6d/0xd0 [ 914.038985][T16039] ? __x64_sys_ioctl+0xa3/0x120 [ 914.044244][T16039] ? do_syscall_64+0xfe/0x140 [ 914.049294][T16039] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 914.055655][T16039] ? debug_check_no_obj_freed+0x505/0x5b0 [ 914.061580][T16039] ? trace_lock_release+0x135/0x1a0 [ 914.067012][T16039] ? debug_check_no_obj_freed+0x505/0x5b0 [ 914.073103][T16039] ? rcu_lock_release+0x9/0x30 [ 914.078156][T16039] ? trace_lock_release+0x135/0x1a0 [ 914.083765][T16039] ? rcu_lock_release+0x9/0x30 [ 914.088744][T16039] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 914.094384][T16039] ? lo_release+0x1f0/0x1f0 [ 914.098885][T16039] blkdev_ioctl+0x807/0x2990 [ 914.103843][T16039] ? tomoyo_path_number_perm+0x53e/0x640 [ 914.109501][T16039] block_ioctl+0xbd/0x100 [ 914.113840][T16039] ? blkdev_iopoll+0x100/0x100 [ 914.118949][T16039] do_vfs_ioctl+0x744/0x1730 [ 914.124173][T16039] ? __fget+0x461/0x510 [ 914.129056][T16039] ? tomoyo_file_ioctl+0x23/0x30 [ 914.134835][T16039] ? security_file_ioctl+0xa1/0xd0 [ 914.140054][T16039] __x64_sys_ioctl+0xe3/0x120 [ 914.144941][T16039] do_syscall_64+0xfe/0x140 [ 914.149470][T16039] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 914.155811][T16039] RIP: 0033:0x459697 [ 914.159891][T16039] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 914.180871][T16039] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 914.189282][T16039] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 914.197253][T16039] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 914.205665][T16039] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 914.213868][T16039] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 914.221982][T16039] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:11 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2c}}}}}, &(0x7f0000000100)) 11:52:11 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x0) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:11 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000002580), 0x7fffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x80b0) 11:52:11 executing program 0 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:12 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x0) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:12 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2f}}}}}, &(0x7f0000000100)) 11:52:12 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000002580), 0x7fffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x80b0) 11:52:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 914.497424][T16068] FAULT_INJECTION: forcing a failure. [ 914.497424][T16068] name failslab, interval 1, probability 0, space 0, times 0 [ 914.510579][T16068] CPU: 0 PID: 16068 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 914.518476][T16068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 914.529051][T16068] Call Trace: [ 914.532569][T16068] dump_stack+0x1d8/0x2f8 [ 914.537131][T16068] should_fail+0x555/0x770 [ 914.541958][T16068] __should_failslab+0x11a/0x160 [ 914.547221][T16068] should_failslab+0x9/0x20 [ 914.551921][T16068] kmem_cache_alloc_trace+0x5d/0x2f0 [ 914.557382][T16068] ? kobject_uevent_env+0x2cd/0x1260 [ 914.562965][T16068] ? dev_uevent_filter+0xb0/0xb0 [ 914.567900][T16068] kobject_uevent_env+0x2cd/0x1260 [ 914.573574][T16068] kobject_uevent+0x1f/0x30 [ 914.578333][T16068] loop_set_fd+0xd21/0x1180 [ 914.583247][T16068] lo_ioctl+0xd5/0x2200 [ 914.587604][T16068] ? __kasan_slab_free+0x12a/0x1e0 [ 914.592842][T16068] ? kasan_slab_free+0xe/0x10 [ 914.597506][T16068] ? kfree+0x115/0x200 [ 914.601632][T16068] ? tomoyo_path_number_perm+0x4e1/0x640 [ 914.607419][T16068] ? tomoyo_file_ioctl+0x23/0x30 [ 914.612371][T16068] ? security_file_ioctl+0x6d/0xd0 [ 914.617472][T16068] ? __x64_sys_ioctl+0xa3/0x120 [ 914.622306][T16068] ? do_syscall_64+0xfe/0x140 [ 914.626976][T16068] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 914.633856][T16068] ? debug_check_no_obj_freed+0x505/0x5b0 [ 914.640153][T16068] ? trace_lock_release+0x135/0x1a0 [ 914.645637][T16068] ? debug_check_no_obj_freed+0x505/0x5b0 [ 914.651532][T16068] ? rcu_lock_release+0x9/0x30 [ 914.656298][T16068] ? trace_lock_release+0x135/0x1a0 [ 914.662075][T16068] ? rcu_lock_release+0x9/0x30 [ 914.667106][T16068] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 914.673347][T16068] ? lo_release+0x1f0/0x1f0 [ 914.678041][T16068] blkdev_ioctl+0x807/0x2990 [ 914.683014][T16068] ? tomoyo_path_number_perm+0x53e/0x640 [ 914.688753][T16068] block_ioctl+0xbd/0x100 [ 914.693167][T16068] ? blkdev_iopoll+0x100/0x100 [ 914.698099][T16068] do_vfs_ioctl+0x744/0x1730 [ 914.702758][T16068] ? __fget+0x461/0x510 [ 914.707087][T16068] ? tomoyo_file_ioctl+0x23/0x30 [ 914.712020][T16068] ? security_file_ioctl+0xa1/0xd0 [ 914.717120][T16068] __x64_sys_ioctl+0xe3/0x120 [ 914.721954][T16068] do_syscall_64+0xfe/0x140 [ 914.726677][T16068] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 914.732562][T16068] RIP: 0033:0x459697 [ 914.736441][T16068] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 914.756471][T16068] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 914.764869][T16068] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 914.772833][T16068] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 914.780937][T16068] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 914.789306][T16068] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 914.797262][T16068] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:12 executing program 3: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:12 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x32}}}}}, &(0x7f0000000100)) 11:52:12 executing program 3: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:12 executing program 0 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:12 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x33}}}}}, &(0x7f0000000100)) 11:52:12 executing program 3: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:12 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfh\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 915.204368][T16115] FAULT_INJECTION: forcing a failure. [ 915.204368][T16115] name failslab, interval 1, probability 0, space 0, times 0 [ 915.217625][T16115] CPU: 0 PID: 16115 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 915.226060][T16115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 915.236311][T16115] Call Trace: [ 915.239706][T16115] dump_stack+0x1d8/0x2f8 [ 915.244225][T16115] should_fail+0x555/0x770 [ 915.249358][T16115] __should_failslab+0x11a/0x160 [ 915.254386][T16115] ? skb_clone+0x1cc/0x380 [ 915.258843][T16115] should_failslab+0x9/0x20 [ 915.263351][T16115] kmem_cache_alloc+0x56/0x2e0 [ 915.268116][T16115] skb_clone+0x1cc/0x380 [ 915.272700][T16115] netlink_broadcast_filtered+0x619/0x1090 [ 915.278663][T16115] netlink_broadcast+0x3a/0x50 [ 915.283428][T16115] kobject_uevent_env+0xcf0/0x1260 [ 915.288625][T16115] kobject_uevent+0x1f/0x30 [ 915.293316][T16115] loop_set_fd+0xd21/0x1180 [ 915.297828][T16115] lo_ioctl+0xd5/0x2200 [ 915.302155][T16115] ? __kasan_slab_free+0x12a/0x1e0 [ 915.307874][T16115] ? kasan_slab_free+0xe/0x10 [ 915.312646][T16115] ? kfree+0x115/0x200 [ 915.316806][T16115] ? tomoyo_path_number_perm+0x4e1/0x640 [ 915.322963][T16115] ? tomoyo_file_ioctl+0x23/0x30 [ 915.327899][T16115] ? security_file_ioctl+0x6d/0xd0 [ 915.333010][T16115] ? __x64_sys_ioctl+0xa3/0x120 [ 915.337903][T16115] ? do_syscall_64+0xfe/0x140 [ 915.343272][T16115] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 915.349342][T16115] ? debug_check_no_obj_freed+0x505/0x5b0 [ 915.355270][T16115] ? trace_lock_release+0x135/0x1a0 [ 915.360476][T16115] ? debug_check_no_obj_freed+0x505/0x5b0 [ 915.366378][T16115] ? rcu_lock_release+0x9/0x30 [ 915.371228][T16115] ? trace_lock_release+0x135/0x1a0 [ 915.377267][T16115] ? rcu_lock_release+0x9/0x30 [ 915.382134][T16115] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 915.388738][T16115] ? lo_release+0x1f0/0x1f0 [ 915.393333][T16115] blkdev_ioctl+0x807/0x2990 [ 915.398011][T16115] ? tomoyo_path_number_perm+0x53e/0x640 [ 915.420217][T16115] block_ioctl+0xbd/0x100 [ 915.425332][T16115] ? blkdev_iopoll+0x100/0x100 [ 915.430192][T16115] do_vfs_ioctl+0x744/0x1730 [ 915.434951][T16115] ? __fget+0x461/0x510 [ 915.439127][T16115] ? tomoyo_file_ioctl+0x23/0x30 [ 915.444220][T16115] ? security_file_ioctl+0xa1/0xd0 [ 915.449336][T16115] __x64_sys_ioctl+0xe3/0x120 [ 915.454015][T16115] do_syscall_64+0xfe/0x140 [ 915.458678][T16115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 915.464736][T16115] RIP: 0033:0x459697 [ 915.468620][T16115] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 915.489090][T16115] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 915.497645][T16115] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 915.506250][T16115] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 915.514570][T16115] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 915.522693][T16115] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 915.530662][T16115] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:13 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x0) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrf\\\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:13 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3a}}}}}, &(0x7f0000000100)) 11:52:13 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:13 executing program 0 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:13 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:13 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3c}}}}}, &(0x7f0000000100)) [ 915.813657][T16137] FAULT_INJECTION: forcing a failure. [ 915.813657][T16137] name failslab, interval 1, probability 0, space 0, times 0 [ 915.836307][T16137] CPU: 0 PID: 16137 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 915.844594][T16137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 915.854874][T16137] Call Trace: [ 915.858244][T16137] dump_stack+0x1d8/0x2f8 11:52:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:13 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x60}}}}}, &(0x7f0000000100)) [ 915.862696][T16137] should_fail+0x555/0x770 [ 915.867142][T16137] __should_failslab+0x11a/0x160 [ 915.872182][T16137] ? getname_flags+0xba/0x640 [ 915.877045][T16137] should_failslab+0x9/0x20 [ 915.881813][T16137] kmem_cache_alloc+0x56/0x2e0 [ 915.886778][T16137] ? __kasan_check_write+0x14/0x20 [ 915.892515][T16137] getname_flags+0xba/0x640 [ 915.897141][T16137] do_mkdirat+0x3c/0x320 [ 915.901384][T16137] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 915.907201][T16137] ? trace_hardirqs_off_caller+0x58/0x80 11:52:13 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) [ 915.907214][T16137] ? do_syscall_64+0x1d/0x140 [ 915.907224][T16137] __x64_sys_mkdir+0x60/0x70 [ 915.907234][T16137] do_syscall_64+0xfe/0x140 [ 915.907247][T16137] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 915.907256][T16137] RIP: 0033:0x458c47 [ 915.907266][T16137] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 915.907271][T16137] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 915.907280][T16137] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 915.907289][T16137] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 915.917857][T16137] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 915.917862][T16137] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 915.917867][T16137] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:13 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x6c}}}}}, &(0x7f0000000100)) 11:52:13 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240), 0x80b0) 11:52:13 executing program 0 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:13 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:13 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x1f4}}}}}, &(0x7f0000000100)) 11:52:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:14 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240), 0x80b0) 11:52:14 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x300}}}}}, &(0x7f0000000100)) [ 916.344485][T16165] FAULT_INJECTION: forcing a failure. [ 916.344485][T16165] name failslab, interval 1, probability 0, space 0, times 0 [ 916.366815][T16165] CPU: 0 PID: 16165 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 916.374829][T16165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 916.385427][T16165] Call Trace: [ 916.388851][T16165] dump_stack+0x1d8/0x2f8 11:52:14 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) [ 916.393279][T16165] should_fail+0x555/0x770 [ 916.397699][T16165] __should_failslab+0x11a/0x160 [ 916.402812][T16165] ? skb_clone+0x1cc/0x380 [ 916.407232][T16165] should_failslab+0x9/0x20 [ 916.411879][T16165] kmem_cache_alloc+0x56/0x2e0 [ 916.417116][T16165] skb_clone+0x1cc/0x380 [ 916.424398][T16165] netlink_broadcast_filtered+0x619/0x1090 [ 916.430210][T16165] netlink_broadcast+0x3a/0x50 [ 916.435229][T16165] kobject_uevent_env+0xcf0/0x1260 [ 916.440534][T16165] kobject_uevent+0x1f/0x30 [ 916.445339][T16165] loop_set_fd+0xd21/0x1180 [ 916.449838][T16165] lo_ioctl+0xd5/0x2200 [ 916.454340][T16165] ? __kasan_slab_free+0x12a/0x1e0 [ 916.459463][T16165] ? kasan_slab_free+0xe/0x10 [ 916.464459][T16165] ? kfree+0x115/0x200 [ 916.468858][T16165] ? tomoyo_path_number_perm+0x4e1/0x640 [ 916.474850][T16165] ? tomoyo_file_ioctl+0x23/0x30 [ 916.479931][T16165] ? security_file_ioctl+0x6d/0xd0 [ 916.485121][T16165] ? __x64_sys_ioctl+0xa3/0x120 [ 916.489958][T16165] ? do_syscall_64+0xfe/0x140 [ 916.494778][T16165] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 916.500833][T16165] ? debug_check_no_obj_freed+0x505/0x5b0 [ 916.506669][T16165] ? trace_lock_release+0x135/0x1a0 [ 916.511943][T16165] ? debug_check_no_obj_freed+0x505/0x5b0 [ 916.518036][T16165] ? rcu_lock_release+0x9/0x30 [ 916.522815][T16165] ? trace_lock_release+0x135/0x1a0 [ 916.528096][T16165] ? rcu_lock_release+0x9/0x30 [ 916.533026][T16165] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 916.538641][T16165] ? lo_release+0x1f0/0x1f0 [ 916.543211][T16165] blkdev_ioctl+0x807/0x2990 [ 916.547905][T16165] ? tomoyo_path_number_perm+0x53e/0x640 [ 916.553752][T16165] block_ioctl+0xbd/0x100 [ 916.558065][T16165] ? blkdev_iopoll+0x100/0x100 [ 916.563077][T16165] do_vfs_ioctl+0x744/0x1730 [ 916.567675][T16165] ? __fget+0x461/0x510 [ 916.571909][T16165] ? tomoyo_file_ioctl+0x23/0x30 [ 916.576840][T16165] ? security_file_ioctl+0xa1/0xd0 [ 916.585414][T16165] __x64_sys_ioctl+0xe3/0x120 [ 916.590352][T16165] do_syscall_64+0xfe/0x140 [ 916.595156][T16165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 916.601042][T16165] RIP: 0033:0x459697 [ 916.605009][T16165] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 916.624884][T16165] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 916.633400][T16165] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 916.641452][T16165] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 916.649508][T16165] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 916.657646][T16165] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 916.665778][T16165] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:14 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:14 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3e8}}}}}, &(0x7f0000000100)) 11:52:14 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:14 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240), 0x80b0) 11:52:14 executing program 0 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:14 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3f0}}}}}, &(0x7f0000000100)) 11:52:14 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:14 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3fe}}}}}, &(0x7f0000000100)) 11:52:14 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240), 0x80b0) 11:52:14 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) [ 917.095657][T16209] FAULT_INJECTION: forcing a failure. [ 917.095657][T16209] name failslab, interval 1, probability 0, space 0, times 0 [ 917.127003][T16209] CPU: 1 PID: 16209 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 917.135122][T16209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 917.145505][T16209] Call Trace: [ 917.148895][T16209] dump_stack+0x1d8/0x2f8 [ 917.153409][T16209] should_fail+0x555/0x770 [ 917.157833][T16209] __should_failslab+0x11a/0x160 [ 917.162948][T16209] ? ext4_alloc_inode+0x1f/0x560 [ 917.168199][T16209] should_failslab+0x9/0x20 [ 917.172707][T16209] kmem_cache_alloc+0x56/0x2e0 [ 917.177476][T16209] ? set_qf_name+0x3c0/0x3c0 [ 917.182072][T16209] ext4_alloc_inode+0x1f/0x560 [ 917.187095][T16209] ? set_qf_name+0x3c0/0x3c0 [ 917.191690][T16209] new_inode_pseudo+0x68/0x240 [ 917.196552][T16209] new_inode+0x28/0x1c0 [ 917.200709][T16209] ? trace_ext4_request_inode+0x28b/0x2d0 [ 917.206627][T16209] __ext4_new_inode+0x43d/0x5650 [ 917.211668][T16209] ? memset+0x31/0x40 [ 917.215657][T16209] ? smk_curacc+0xa3/0xe0 [ 917.219986][T16209] ext4_mkdir+0x3f5/0x1450 [ 917.224621][T16209] ? security_inode_permission+0xdd/0x120 [ 917.230656][T16209] vfs_mkdir+0x43f/0x610 [ 917.234987][T16209] do_mkdirat+0x1d7/0x320 [ 917.239690][T16209] __x64_sys_mkdir+0x60/0x70 [ 917.244394][T16209] do_syscall_64+0xfe/0x140 [ 917.249280][T16209] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 917.255174][T16209] RIP: 0033:0x458c47 [ 917.259173][T16209] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 917.279143][T16209] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 917.287727][T16209] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 917.295973][T16209] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 917.304132][T16209] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 917.312102][T16209] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 917.320071][T16209] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfh\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:15 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:15 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x500}}}}}, &(0x7f0000000100)) 11:52:15 executing program 0 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:15 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240), 0x80b0) 11:52:15 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:15 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x543}}}}}, &(0x7f0000000100)) [ 917.566960][T16232] FAULT_INJECTION: forcing a failure. [ 917.566960][T16232] name failslab, interval 1, probability 0, space 0, times 0 [ 917.581505][T16232] CPU: 1 PID: 16232 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 917.589502][T16232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 917.603126][T16232] Call Trace: [ 917.603147][T16232] dump_stack+0x1d8/0x2f8 [ 917.603162][T16232] should_fail+0x555/0x770 11:52:15 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) [ 917.603179][T16232] __should_failslab+0x11a/0x160 [ 917.610955][T16232] ? skb_clone+0x1cc/0x380 [ 917.610968][T16232] should_failslab+0x9/0x20 [ 917.610983][T16232] kmem_cache_alloc+0x56/0x2e0 [ 917.634689][T16232] skb_clone+0x1cc/0x380 [ 917.639725][T16232] netlink_broadcast_filtered+0x619/0x1090 [ 917.646072][T16232] netlink_broadcast+0x3a/0x50 [ 917.651675][T16232] kobject_uevent_env+0xcf0/0x1260 [ 917.656876][T16232] kobject_uevent+0x1f/0x30 [ 917.662121][T16232] loop_set_fd+0xd21/0x1180 [ 917.667201][T16232] lo_ioctl+0xd5/0x2200 [ 917.672056][T16232] ? __kasan_slab_free+0x12a/0x1e0 [ 917.677189][T16232] ? kasan_slab_free+0xe/0x10 [ 917.682676][T16232] ? kfree+0x115/0x200 [ 917.687110][T16232] ? tomoyo_path_number_perm+0x4e1/0x640 [ 917.692956][T16232] ? tomoyo_file_ioctl+0x23/0x30 [ 917.698054][T16232] ? security_file_ioctl+0x6d/0xd0 [ 917.703516][T16232] ? __x64_sys_ioctl+0xa3/0x120 [ 917.708357][T16232] ? do_syscall_64+0xfe/0x140 [ 917.713204][T16232] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 917.719394][T16232] ? debug_check_no_obj_freed+0x505/0x5b0 [ 917.725640][T16232] ? trace_lock_release+0x135/0x1a0 [ 917.731355][T16232] ? debug_check_no_obj_freed+0x505/0x5b0 [ 917.737173][T16232] ? rcu_lock_release+0x9/0x30 [ 917.742715][T16232] ? trace_lock_release+0x135/0x1a0 [ 917.748131][T16232] ? rcu_lock_release+0x9/0x30 [ 917.752889][T16232] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 917.758508][T16232] ? lo_release+0x1f0/0x1f0 [ 917.763160][T16232] blkdev_ioctl+0x807/0x2990 [ 917.767906][T16232] ? tomoyo_path_number_perm+0x53e/0x640 [ 917.773788][T16232] block_ioctl+0xbd/0x100 [ 917.778419][T16232] ? blkdev_iopoll+0x100/0x100 [ 917.783263][T16232] do_vfs_ioctl+0x744/0x1730 [ 917.788041][T16232] ? __fget+0x461/0x510 [ 917.792189][T16232] ? tomoyo_file_ioctl+0x23/0x30 [ 917.797694][T16232] ? security_file_ioctl+0xa1/0xd0 [ 917.803176][T16232] __x64_sys_ioctl+0xe3/0x120 [ 917.807851][T16232] do_syscall_64+0xfe/0x140 [ 917.812488][T16232] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 917.818375][T16232] RIP: 0033:0x459697 [ 917.822727][T16232] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 917.843277][T16232] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 917.852266][T16232] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 917.860352][T16232] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 917.868487][T16232] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 917.876686][T16232] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 917.884987][T16232] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:15 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240), 0x80b0) 11:52:15 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x600}}}}}, &(0x7f0000000100)) 11:52:15 executing program 0 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 918.107894][T16255] FAULT_INJECTION: forcing a failure. [ 918.107894][T16255] name failslab, interval 1, probability 0, space 0, times 0 [ 918.127673][T16255] CPU: 1 PID: 16255 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 918.135604][T16255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 918.145932][T16255] Call Trace: [ 918.149236][T16255] dump_stack+0x1d8/0x2f8 [ 918.153689][T16255] should_fail+0x555/0x770 [ 918.158121][T16255] __should_failslab+0x11a/0x160 [ 918.163170][T16255] ? tomoyo_encode2+0x273/0x5a0 [ 918.168031][T16255] should_failslab+0x9/0x20 [ 918.172840][T16255] __kmalloc+0x7a/0x340 [ 918.177009][T16255] tomoyo_encode2+0x273/0x5a0 [ 918.181704][T16255] tomoyo_realpath_from_path+0x769/0x7c0 [ 918.188059][T16255] tomoyo_path_number_perm+0x166/0x640 [ 918.193551][T16255] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 918.199294][T16255] ? trace_kmem_cache_free+0xa0/0x110 [ 918.204676][T16255] tomoyo_path_mkdir+0x9c/0xc0 [ 918.210052][T16255] security_path_mkdir+0xed/0x170 [ 918.215259][T16255] do_mkdirat+0x15c/0x320 [ 918.219684][T16255] __x64_sys_mkdir+0x60/0x70 [ 918.224503][T16255] do_syscall_64+0xfe/0x140 [ 918.229097][T16255] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 918.234993][T16255] RIP: 0033:0x458c47 [ 918.238977][T16255] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 918.259145][T16255] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 918.267682][T16255] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 918.275658][T16255] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 918.283825][T16255] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 918.291896][T16255] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 918.300045][T16255] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:15 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x608}}}}}, &(0x7f0000000100)) [ 918.309996][T16255] ERROR: Out of memory at tomoyo_realpath_from_path. 11:52:16 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x689}}}}}, &(0x7f0000000100)) 11:52:16 executing program 0 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrft\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:16 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x700}}}}}, &(0x7f0000000100)) [ 918.546624][T16272] FAULT_INJECTION: forcing a failure. [ 918.546624][T16272] name failslab, interval 1, probability 0, space 0, times 0 [ 918.565853][T16272] CPU: 0 PID: 16272 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 918.574306][T16272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 918.584395][T16272] Call Trace: [ 918.587901][T16272] dump_stack+0x1d8/0x2f8 [ 918.592596][T16272] should_fail+0x555/0x770 [ 918.597122][T16272] __should_failslab+0x11a/0x160 [ 918.602261][T16272] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 918.608141][T16272] should_failslab+0x9/0x20 [ 918.612656][T16272] __kmalloc+0x7a/0x340 [ 918.616822][T16272] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 918.622755][T16272] tomoyo_realpath_from_path+0xdc/0x7c0 [ 918.628754][T16272] tomoyo_path_number_perm+0x166/0x640 [ 918.634246][T16272] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 918.639896][T16272] ? trace_kmem_cache_free+0xa0/0x110 [ 918.645866][T16272] tomoyo_path_mkdir+0x9c/0xc0 [ 918.650641][T16272] security_path_mkdir+0xed/0x170 [ 918.656290][T16272] do_mkdirat+0x15c/0x320 [ 918.660720][T16272] __x64_sys_mkdir+0x60/0x70 [ 918.665455][T16272] do_syscall_64+0xfe/0x140 [ 918.669972][T16272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 918.675872][T16272] RIP: 0033:0x458c47 [ 918.679772][T16272] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 918.699479][T16272] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 918.708095][T16272] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 918.716342][T16272] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 918.724558][T16272] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 918.732827][T16272] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 11:52:16 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x806}}}}}, &(0x7f0000000100)) [ 918.740922][T16272] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 918.754668][T16272] ERROR: Out of memory at tomoyo_realpath_from_path. 11:52:16 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:16 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, 0x0, 0x80b0) 11:52:16 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xa00}}}}}, &(0x7f0000000100)) 11:52:16 executing program 0 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:16 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xb00}}}}}, &(0x7f0000000100)) 11:52:16 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:16 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, 0x0, 0x80b0) 11:52:16 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xc00}}}}}, &(0x7f0000000100)) 11:52:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 919.166058][T16302] FAULT_INJECTION: forcing a failure. [ 919.166058][T16302] name failslab, interval 1, probability 0, space 0, times 0 [ 919.188863][T16302] CPU: 0 PID: 16302 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 919.196883][T16302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 919.207110][T16302] Call Trace: [ 919.210415][T16302] dump_stack+0x1d8/0x2f8 [ 919.214835][T16302] should_fail+0x555/0x770 [ 919.219263][T16302] __should_failslab+0x11a/0x160 [ 919.224496][T16302] ? __d_alloc+0x2d/0x6e0 [ 919.230764][T16302] should_failslab+0x9/0x20 [ 919.235403][T16302] kmem_cache_alloc+0x56/0x2e0 [ 919.240700][T16302] __d_alloc+0x2d/0x6e0 [ 919.245393][T16302] d_alloc+0x4e/0x1d0 [ 919.249393][T16302] __lookup_hash+0xe5/0x290 [ 919.254137][T16302] filename_create+0x14f/0x670 [ 919.258928][T16302] ? getname_flags+0x214/0x640 [ 919.263981][T16302] do_mkdirat+0x5a/0x320 [ 919.268356][T16302] ? trace_hardirqs_off_caller+0x58/0x80 [ 919.274267][T16302] __x64_sys_mkdir+0x60/0x70 [ 919.279157][T16302] do_syscall_64+0xfe/0x140 [ 919.284365][T16302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 919.290282][T16302] RIP: 0033:0x458c47 [ 919.294195][T16302] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:52:16 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000240), 0x80b0) 11:52:16 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xd00}}}}}, &(0x7f0000000100)) [ 919.314273][T16302] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 919.322815][T16302] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 919.330822][T16302] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 919.338892][T16302] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 919.346874][T16302] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 919.355177][T16302] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:17 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xe80}}}}}, &(0x7f0000000100)) 11:52:17 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240), 0x80b0) 11:52:17 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, 0x0, 0x80b0) 11:52:17 executing program 0 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:17 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xf00}}}}}, &(0x7f0000000100)) 11:52:17 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240), 0x80b0) 11:52:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:17 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x1100}}}}}, &(0x7f0000000100)) 11:52:17 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x80b0) 11:52:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 919.720401][T16337] FAULT_INJECTION: forcing a failure. [ 919.720401][T16337] name failslab, interval 1, probability 0, space 0, times 0 [ 919.754147][T16337] CPU: 0 PID: 16337 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 919.762216][T16337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 919.772273][T16337] Call Trace: [ 919.775573][T16337] dump_stack+0x1d8/0x2f8 [ 919.779912][T16337] should_fail+0x555/0x770 [ 919.784430][T16337] __should_failslab+0x11a/0x160 [ 919.789371][T16337] ? smack_inode_init_security+0x3cf/0x490 [ 919.795174][T16337] should_failslab+0x9/0x20 [ 919.799677][T16337] __kmalloc_track_caller+0x79/0x340 [ 919.804962][T16337] kstrdup+0x34/0x70 [ 919.808856][T16337] smack_inode_init_security+0x3cf/0x490 [ 919.814485][T16337] security_inode_init_security+0xfe/0x310 [ 919.820283][T16337] ? ext4_init_security+0x40/0x40 [ 919.825309][T16337] ext4_init_security+0x34/0x40 [ 919.830159][T16337] __ext4_new_inode+0x446c/0x5650 [ 919.835364][T16337] ? smk_curacc+0xa3/0xe0 [ 919.839685][T16337] ext4_mkdir+0x3f5/0x1450 [ 919.844098][T16337] ? security_inode_permission+0xdd/0x120 [ 919.849904][T16337] vfs_mkdir+0x43f/0x610 [ 919.854270][T16337] do_mkdirat+0x1d7/0x320 [ 919.858599][T16337] __x64_sys_mkdir+0x60/0x70 [ 919.863360][T16337] do_syscall_64+0xfe/0x140 11:52:17 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x1400}}}}}, &(0x7f0000000100)) [ 919.867868][T16337] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 919.874619][T16337] RIP: 0033:0x458c47 [ 919.878506][T16337] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 919.898196][T16337] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 919.906605][T16337] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 11:52:17 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x80b0) 11:52:17 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x0) [ 919.914578][T16337] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 919.922639][T16337] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 919.930617][T16337] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 919.938588][T16337] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:17 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x1f00}}}}}, &(0x7f0000000100)) 11:52:17 executing program 0 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:17 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2100}}}}}, &(0x7f0000000100)) 11:52:17 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x80b0) 11:52:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrft\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfz\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 920.214805][T16365] FAULT_INJECTION: forcing a failure. [ 920.214805][T16365] name failslab, interval 1, probability 0, space 0, times 0 [ 920.245121][T16365] CPU: 0 PID: 16365 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 920.264768][T16365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 920.275017][T16365] Call Trace: [ 920.278313][T16365] dump_stack+0x1d8/0x2f8 [ 920.282648][T16365] should_fail+0x555/0x770 [ 920.287107][T16365] __should_failslab+0x11a/0x160 [ 920.292038][T16365] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 920.292051][T16365] should_failslab+0x9/0x20 [ 920.292062][T16365] __kmalloc+0x7a/0x340 [ 920.292071][T16365] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 920.292082][T16365] tomoyo_realpath_from_path+0xdc/0x7c0 [ 920.292097][T16365] tomoyo_path_number_perm+0x166/0x640 [ 920.292127][T16365] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 920.302311][T16365] ? trace_kmem_cache_free+0xa0/0x110 [ 920.302327][T16365] tomoyo_path_mkdir+0x9c/0xc0 [ 920.302339][T16365] security_path_mkdir+0xed/0x170 [ 920.302350][T16365] do_mkdirat+0x15c/0x320 [ 920.302362][T16365] __x64_sys_mkdir+0x60/0x70 [ 920.302375][T16365] do_syscall_64+0xfe/0x140 [ 920.302390][T16365] entry_SYSCALL_64_after_hwframe+0x49/0xbe 11:52:18 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2900}}}}}, &(0x7f0000000100)) 11:52:18 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) 11:52:18 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x0) [ 920.312210][T16365] RIP: 0033:0x458c47 [ 920.312221][T16365] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 920.312226][T16365] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 920.312235][T16365] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 920.312241][T16365] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 920.312250][T16365] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 920.323207][T16365] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 920.323213][T16365] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 920.345875][T16365] ERROR: Out of memory at tomoyo_realpath_from_path. 11:52:18 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2b00}}}}}, &(0x7f0000000100)) 11:52:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x02', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:18 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) 11:52:18 executing program 0 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:18 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969", 0x80) write$cgroup_int(r0, &(0x7f00000002c0), 0x12) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000240), 0x0) 11:52:18 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) 11:52:18 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2c00}}}}}, &(0x7f0000000100)) [ 920.726482][T16400] FAULT_INJECTION: forcing a failure. [ 920.726482][T16400] name failslab, interval 1, probability 0, space 0, times 0 [ 920.754701][T16400] CPU: 1 PID: 16400 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 920.762658][T16400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 920.772813][T16400] Call Trace: [ 920.776182][T16400] dump_stack+0x1d8/0x2f8 [ 920.780613][T16400] should_fail+0x555/0x770 [ 920.785041][T16400] __should_failslab+0x11a/0x160 [ 920.790159][T16400] ? kcalloc+0x2f/0x50 [ 920.795018][T16400] should_failslab+0x9/0x20 [ 920.799530][T16400] __kmalloc+0x7a/0x340 [ 920.803691][T16400] kcalloc+0x2f/0x50 [ 920.807593][T16400] ext4_find_extent+0x216/0xaa0 [ 920.812498][T16400] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 920.819020][T16400] ext4_ext_map_blocks+0x170/0x7180 [ 920.824226][T16400] ? check_preemption_disabled+0x47/0x2a0 [ 920.830124][T16400] ? debug_smp_processor_id+0x1c/0x20 [ 920.835497][T16400] ? perf_trace_lock_acquire+0x97/0x3b0 [ 920.841046][T16400] ? trace_lock_release+0x135/0x1a0 [ 920.846254][T16400] ? __kasan_check_write+0x14/0x20 [ 920.851368][T16400] ? __down_read+0x14b/0x330 [ 920.856038][T16400] ext4_map_blocks+0x422/0x1e50 [ 920.860929][T16400] ? ext4_mark_inode_dirty+0x216/0x700 [ 920.866488][T16400] ? __kasan_check_write+0x14/0x20 [ 920.871625][T16400] ext4_getblk+0xae/0x460 [ 920.875970][T16400] ext4_bread+0x4a/0x240 [ 920.880214][T16400] ext4_append+0x175/0x310 [ 920.884641][T16400] ext4_mkdir+0x7ad/0x1450 [ 920.889077][T16400] vfs_mkdir+0x43f/0x610 [ 920.893411][T16400] do_mkdirat+0x1d7/0x320 [ 920.897751][T16400] __x64_sys_mkdir+0x60/0x70 [ 920.902352][T16400] do_syscall_64+0xfe/0x140 [ 920.906866][T16400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 920.912760][T16400] RIP: 0033:0x458c47 [ 920.916671][T16400] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 920.936451][T16400] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 920.945167][T16400] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 920.953231][T16400] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 920.961422][T16400] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 920.969752][T16400] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 11:52:18 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) 11:52:18 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000900)='/dev/dmmidi#\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r0, r1, 0x0, 0x20000102000007) [ 920.977839][T16400] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x03', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:18 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2f00}}}}}, &(0x7f0000000100)) 11:52:18 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, 0x0, 0x0) 11:52:18 executing program 0 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:18 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3200}}}}}, &(0x7f0000000100)) 11:52:18 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3300}}}}}, &(0x7f0000000100)) 11:52:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000040)=""/20, 0x14}], 0x9, 0x0, 0x7a}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000080)=""/45, 0x2d}, {0x0}, {0x0}], 0x3}, 0x0) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r5, &(0x7f0000000000)=[{&(0x7f0000000140)=""/179, 0xb3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) shutdown(r4, 0x0) shutdown(r1, 0x0) [ 921.274323][T16432] FAULT_INJECTION: forcing a failure. [ 921.274323][T16432] name failslab, interval 1, probability 0, space 0, times 0 [ 921.287462][T16432] CPU: 1 PID: 16432 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 921.295449][T16432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 921.305628][T16432] Call Trace: [ 921.308933][T16432] dump_stack+0x1d8/0x2f8 [ 921.313285][T16432] should_fail+0x555/0x770 [ 921.317729][T16432] __should_failslab+0x11a/0x160 [ 921.322872][T16432] ? __es_insert_extent+0x321/0xd90 [ 921.328266][T16432] should_failslab+0x9/0x20 [ 921.333741][T16432] kmem_cache_alloc+0x56/0x2e0 [ 921.338598][T16432] __es_insert_extent+0x321/0xd90 [ 921.343891][T16432] ext4_es_insert_extent+0x220/0x2fb0 [ 921.349283][T16432] ? trace_ext4_ext_convert_to_initialized_fastpath+0x310/0x310 [ 921.357100][T16432] ext4_ext_map_blocks+0x1806/0x7180 [ 921.362391][T16432] ? check_preemption_disabled+0x47/0x2a0 [ 921.368116][T16432] ? debug_smp_processor_id+0x1c/0x20 [ 921.373597][T16432] ? perf_trace_lock_acquire+0x97/0x3b0 [ 921.379145][T16432] ? trace_lock_release+0x135/0x1a0 [ 921.385295][T16432] ? __down_read+0x14b/0x330 [ 921.390006][T16432] ext4_map_blocks+0x422/0x1e50 [ 921.394898][T16432] ? ext4_mark_inode_dirty+0x216/0x700 [ 921.400514][T16432] ? __kasan_check_write+0x14/0x20 [ 921.405653][T16432] ext4_getblk+0xae/0x460 [ 921.409991][T16432] ext4_bread+0x4a/0x240 [ 921.414234][T16432] ext4_append+0x175/0x310 [ 921.418673][T16432] ext4_mkdir+0x7ad/0x1450 [ 921.423338][T16432] vfs_mkdir+0x43f/0x610 [ 921.427674][T16432] do_mkdirat+0x1d7/0x320 [ 921.432010][T16432] __x64_sys_mkdir+0x60/0x70 [ 921.436710][T16432] do_syscall_64+0xfe/0x140 [ 921.441222][T16432] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 921.449254][T16432] RIP: 0033:0x458c47 [ 921.453152][T16432] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:52:19 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000900)='/dev/dmmidi#\x00', 0x2, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r0, r1, 0x0, 0x20000102000007) [ 921.473261][T16432] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 921.481761][T16432] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 921.489798][T16432] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 921.497893][T16432] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 921.506015][T16432] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 921.513985][T16432] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:19 executing program 0 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:19 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3580}}}}}, &(0x7f0000000100)) [ 921.736416][T16454] FAULT_INJECTION: forcing a failure. [ 921.736416][T16454] name failslab, interval 1, probability 0, space 0, times 0 [ 921.749940][T16454] CPU: 1 PID: 16454 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 921.758015][T16454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 921.758019][T16454] Call Trace: [ 921.758035][T16454] dump_stack+0x1d8/0x2f8 [ 921.758050][T16454] should_fail+0x555/0x770 [ 921.758066][T16454] __should_failslab+0x11a/0x160 [ 921.758076][T16454] ? __es_insert_extent+0x321/0xd90 [ 921.758091][T16454] should_failslab+0x9/0x20 [ 921.795171][T16454] kmem_cache_alloc+0x56/0x2e0 [ 921.799938][T16454] __es_insert_extent+0x321/0xd90 [ 921.804972][T16454] ext4_es_insert_extent+0x220/0x2fb0 [ 921.810661][T16454] ? trace_ext4_ext_convert_to_initialized_fastpath+0x310/0x310 [ 921.818430][T16454] ext4_ext_map_blocks+0x1806/0x7180 [ 921.823752][T16454] ? check_preemption_disabled+0x47/0x2a0 [ 921.829565][T16454] ? debug_smp_processor_id+0x1c/0x20 [ 921.834937][T16454] ? perf_trace_lock_acquire+0x97/0x3b0 [ 921.840482][T16454] ? trace_lock_release+0x135/0x1a0 [ 921.845927][T16454] ? __down_read+0x14b/0x330 [ 921.850520][T16454] ext4_map_blocks+0x422/0x1e50 [ 921.855370][T16454] ? ext4_mark_inode_dirty+0x216/0x700 [ 921.860831][T16454] ? __kasan_check_write+0x14/0x20 [ 921.866121][T16454] ext4_getblk+0xae/0x460 [ 921.870542][T16454] ext4_bread+0x4a/0x240 [ 921.874873][T16454] ext4_append+0x175/0x310 [ 921.879293][T16454] ext4_mkdir+0x7ad/0x1450 [ 921.883724][T16454] vfs_mkdir+0x43f/0x610 [ 921.887970][T16454] do_mkdirat+0x1d7/0x320 [ 921.892302][T16454] __x64_sys_mkdir+0x60/0x70 [ 921.897148][T16454] do_syscall_64+0xfe/0x140 [ 921.901748][T16454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 921.907651][T16454] RIP: 0033:0x458c47 [ 921.911572][T16454] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:52:19 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3a00}}}}}, &(0x7f0000000100)) 11:52:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfz\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 921.931708][T16454] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 921.940311][T16454] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 921.948370][T16454] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 921.956443][T16454] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 921.964783][T16454] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 921.973492][T16454] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:19 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3c00}}}}}, &(0x7f0000000100)) 11:52:19 executing program 0 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000480)=""/142, 0x8e}], 0x1}, 0x2) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000000240)=[{&(0x7f0000000100)=""/82, 0x52}, {0x0}], 0x2) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r4, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r5, 0x0) shutdown(r2, 0x0) 11:52:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:19 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3f00}}}}}, &(0x7f0000000100)) 11:52:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x05', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 922.210715][T16484] FAULT_INJECTION: forcing a failure. [ 922.210715][T16484] name failslab, interval 1, probability 0, space 0, times 0 [ 922.242301][T16484] CPU: 1 PID: 16484 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 922.250390][T16484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 922.260556][T16484] Call Trace: [ 922.264033][T16484] dump_stack+0x1d8/0x2f8 [ 922.268473][T16484] should_fail+0x555/0x770 [ 922.272907][T16484] __should_failslab+0x11a/0x160 [ 922.277869][T16484] ? security_inode_alloc+0x36/0x1e0 [ 922.283570][T16484] should_failslab+0x9/0x20 [ 922.288252][T16484] kmem_cache_alloc+0x56/0x2e0 [ 922.293308][T16484] security_inode_alloc+0x36/0x1e0 [ 922.293320][T16484] inode_init_always+0x3b5/0x8d0 [ 922.293329][T16484] ? set_qf_name+0x3c0/0x3c0 [ 922.293341][T16484] new_inode_pseudo+0x7f/0x240 [ 922.313739][T16484] new_inode+0x28/0x1c0 [ 922.313751][T16484] ? trace_ext4_request_inode+0x28b/0x2d0 [ 922.313763][T16484] __ext4_new_inode+0x43d/0x5650 [ 922.329085][T16484] ? memset+0x31/0x40 [ 922.329104][T16484] ? smk_curacc+0xa3/0xe0 [ 922.337485][T16484] ext4_mkdir+0x3f5/0x1450 [ 922.337502][T16484] ? security_inode_permission+0xdd/0x120 [ 922.347885][T16484] vfs_mkdir+0x43f/0x610 [ 922.347896][T16484] do_mkdirat+0x1d7/0x320 [ 922.347907][T16484] __x64_sys_mkdir+0x60/0x70 11:52:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x02', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:20 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x4000}}}}}, &(0x7f0000000100)) [ 922.347919][T16484] do_syscall_64+0xfe/0x140 [ 922.347933][T16484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 922.356499][T16484] RIP: 0033:0x458c47 [ 922.356509][T16484] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 922.356514][T16484] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 922.356522][T16484] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 922.356528][T16484] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 922.356533][T16484] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 922.356538][T16484] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 922.356547][T16484] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:20 executing program 0 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 922.771578][T16518] FAULT_INJECTION: forcing a failure. [ 922.771578][T16518] name failslab, interval 1, probability 0, space 0, times 0 [ 922.794212][T16518] CPU: 1 PID: 16518 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 922.802278][T16518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 922.812337][T16518] Call Trace: [ 922.815638][T16518] dump_stack+0x1d8/0x2f8 [ 922.819995][T16518] should_fail+0x555/0x770 [ 922.824416][T16518] __should_failslab+0x11a/0x160 [ 922.829357][T16518] ? ext4_mb_new_blocks+0x2ac/0x2cc0 [ 922.834644][T16518] should_failslab+0x9/0x20 [ 922.839154][T16518] kmem_cache_alloc+0x56/0x2e0 [ 922.843929][T16518] ext4_mb_new_blocks+0x2ac/0x2cc0 [ 922.849040][T16518] ? trace_kmalloc+0xbb/0x130 [ 922.853803][T16518] ? kcalloc+0x2f/0x50 [ 922.857877][T16518] ? __kmalloc+0x26c/0x340 [ 922.862551][T16518] ? kcalloc+0x2f/0x50 [ 922.866632][T16518] ? ext4_ext_search_right+0x4cb/0x940 [ 922.872375][T16518] ? ext4_find_extent+0x8e0/0xaa0 [ 922.877592][T16518] ? ext4_inode_to_goal_block+0x27b/0x3b0 [ 922.883315][T16518] ext4_ext_map_blocks+0x4b9a/0x7180 [ 922.888599][T16518] ? debug_smp_processor_id+0x1c/0x20 [ 922.893970][T16518] ? perf_trace_lock_acquire+0x97/0x3b0 [ 922.899890][T16518] ? perf_trace_lock_acquire+0x97/0x3b0 [ 922.905456][T16518] ext4_map_blocks+0x8f2/0x1e50 [ 922.910337][T16518] ? __kasan_check_write+0x14/0x20 [ 922.915452][T16518] ext4_getblk+0xae/0x460 [ 922.919868][T16518] ext4_bread+0x4a/0x240 [ 922.924271][T16518] ext4_append+0x175/0x310 [ 922.928820][T16518] ext4_mkdir+0x7ad/0x1450 [ 922.933271][T16518] vfs_mkdir+0x43f/0x610 [ 922.937521][T16518] do_mkdirat+0x1d7/0x320 [ 922.941858][T16518] __x64_sys_mkdir+0x60/0x70 [ 922.946972][T16518] do_syscall_64+0xfe/0x140 [ 922.951479][T16518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 922.957642][T16518] RIP: 0033:0x458c47 [ 922.961536][T16518] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 922.981844][T16518] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 922.990359][T16518] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 922.998331][T16518] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 923.006301][T16518] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 923.014461][T16518] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 923.022547][T16518] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:20 executing program 3 (fault-call:2 fault-nth:0): openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) 11:52:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:20 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x4305}}}}}, &(0x7f0000000100)) 11:52:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x06', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x03', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:20 executing program 0 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:20 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x4788}}}}}, &(0x7f0000000100)) 11:52:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x0) [ 923.278629][T16530] FAULT_INJECTION: forcing a failure. [ 923.278629][T16530] name failslab, interval 1, probability 0, space 0, times 0 [ 923.295211][T16538] FAULT_INJECTION: forcing a failure. [ 923.295211][T16538] name failslab, interval 1, probability 0, space 0, times 0 [ 923.300588][T16530] CPU: 0 PID: 16530 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 923.316295][T16530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 923.316299][T16530] Call Trace: [ 923.316313][T16530] dump_stack+0x1d8/0x2f8 [ 923.316327][T16530] should_fail+0x555/0x770 [ 923.316345][T16530] __should_failslab+0x11a/0x160 [ 923.329852][T16530] ? ext4_mb_new_blocks+0x2ac/0x2cc0 [ 923.339055][T16530] should_failslab+0x9/0x20 [ 923.339066][T16530] kmem_cache_alloc+0x56/0x2e0 [ 923.339076][T16530] ext4_mb_new_blocks+0x2ac/0x2cc0 [ 923.339083][T16530] ? trace_kmalloc+0xbb/0x130 [ 923.339092][T16530] ? kcalloc+0x2f/0x50 [ 923.339100][T16530] ? __kmalloc+0x26c/0x340 [ 923.339109][T16530] ? kcalloc+0x2f/0x50 [ 923.358993][T16530] ? ext4_ext_search_right+0x4cb/0x940 [ 923.359002][T16530] ? ext4_find_extent+0x8e0/0xaa0 [ 923.359018][T16530] ? ext4_inode_to_goal_block+0x27b/0x3b0 [ 923.369641][T16530] ext4_ext_map_blocks+0x4b9a/0x7180 [ 923.369652][T16530] ? debug_smp_processor_id+0x1c/0x20 [ 923.369660][T16530] ? perf_trace_lock_acquire+0x97/0x3b0 [ 923.369668][T16530] ? perf_trace_lock_acquire+0x97/0x3b0 [ 923.369694][T16530] ext4_map_blocks+0x8f2/0x1e50 [ 923.369711][T16530] ? __kasan_check_write+0x14/0x20 [ 923.369722][T16530] ext4_getblk+0xae/0x460 [ 923.435798][T16530] ext4_bread+0x4a/0x240 [ 923.440219][T16530] ext4_append+0x175/0x310 [ 923.444932][T16530] ext4_mkdir+0x7ad/0x1450 [ 923.449540][T16530] vfs_mkdir+0x43f/0x610 [ 923.453874][T16530] do_mkdirat+0x1d7/0x320 [ 923.458205][T16530] __x64_sys_mkdir+0x60/0x70 [ 923.462969][T16530] do_syscall_64+0xfe/0x140 [ 923.467644][T16530] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 923.473762][T16530] RIP: 0033:0x458c47 [ 923.478011][T16530] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 923.498116][T16530] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 923.506635][T16530] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 923.514867][T16530] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 923.523187][T16530] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 923.531289][T16530] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 923.539280][T16530] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 923.548073][T16538] CPU: 1 PID: 16538 Comm: syz-executor.3 Not tainted 5.3.0-rc4 #73 [ 923.556003][T16538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 923.566065][T16538] Call Trace: [ 923.569477][T16538] dump_stack+0x1d8/0x2f8 [ 923.573817][T16538] should_fail+0x555/0x770 [ 923.578248][T16538] __should_failslab+0x11a/0x160 [ 923.583333][T16538] should_failslab+0x9/0x20 [ 923.588159][T16538] kmem_cache_alloc_trace+0x5d/0x2f0 [ 923.593661][T16538] ? alloc_pipe_info+0xae/0x3f0 [ 923.602295][T16538] alloc_pipe_info+0xae/0x3f0 [ 923.607157][T16538] ? debug_smp_processor_id+0x1c/0x20 [ 923.612535][T16538] splice_direct_to_actor+0x910/0xac0 [ 923.617963][T16538] ? do_splice_direct+0x330/0x330 [ 923.623383][T16538] ? trace_event_raw_event_lock_acquire+0x210/0x210 [ 923.630195][T16538] ? security_file_permission+0x148/0x350 [ 923.635923][T16538] ? rw_verify_area+0x1c2/0x360 [ 923.640779][T16538] do_splice_direct+0x200/0x330 [ 923.645879][T16538] ? security_file_permission+0xb0/0x350 [ 923.651616][T16538] do_sendfile+0x7e4/0xfd0 [ 923.656050][T16538] __x64_sys_sendfile64+0x176/0x1b0 [ 923.661341][T16538] do_syscall_64+0xfe/0x140 [ 923.666121][T16538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 923.672015][T16538] RIP: 0033:0x459829 [ 923.675915][T16538] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 923.695914][T16538] RSP: 002b:00007f7e7bc26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 923.704584][T16538] RAX: ffffffffffffffda RBX: 00007f7e7bc26c90 RCX: 0000000000459829 [ 923.712558][T16538] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 923.720529][T16538] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 11:52:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\a', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:21 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x4888}}}}}, &(0x7f0000000100)) 11:52:21 executing program 3 (fault-call:2 fault-nth:1): openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) 11:52:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x0) [ 923.728601][T16538] R10: 000000007fffffff R11: 0000000000000246 R12: 00007f7e7bc276d4 [ 923.736801][T16538] R13: 00000000004c7005 R14: 00000000004dc610 R15: 0000000000000005 11:52:21 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x6000}}}}}, &(0x7f0000000100)) 11:52:21 executing program 0 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 923.854943][T16552] FAULT_INJECTION: forcing a failure. [ 923.854943][T16552] name failslab, interval 1, probability 0, space 0, times 0 [ 923.888203][T16552] CPU: 1 PID: 16552 Comm: syz-executor.3 Not tainted 5.3.0-rc4 #73 [ 923.896671][T16552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 923.906813][T16552] Call Trace: [ 923.910114][T16552] dump_stack+0x1d8/0x2f8 [ 923.914540][T16552] should_fail+0x555/0x770 [ 923.919093][T16552] __should_failslab+0x11a/0x160 [ 923.924173][T16552] ? kcalloc+0x36/0x60 [ 923.928267][T16552] should_failslab+0x9/0x20 [ 923.932982][T16552] __kmalloc+0x7a/0x340 [ 923.937141][T16552] kcalloc+0x36/0x60 [ 923.941042][T16552] alloc_pipe_info+0x1ce/0x3f0 [ 923.945813][T16552] splice_direct_to_actor+0x910/0xac0 [ 923.951192][T16552] ? do_splice_direct+0x330/0x330 [ 923.956467][T16552] ? trace_event_raw_event_lock_acquire+0x210/0x210 [ 923.963264][T16552] ? security_file_permission+0x148/0x350 [ 923.968984][T16552] ? rw_verify_area+0x1c2/0x360 [ 923.974102][T16552] do_splice_direct+0x200/0x330 [ 923.979143][T16552] ? security_file_permission+0xb0/0x350 [ 923.985042][T16552] do_sendfile+0x7e4/0xfd0 [ 923.989566][T16552] __x64_sys_sendfile64+0x176/0x1b0 [ 923.994858][T16552] do_syscall_64+0xfe/0x140 [ 923.999450][T16552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 924.005357][T16552] RIP: 0033:0x459829 [ 924.009357][T16552] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 924.030366][T16552] RSP: 002b:00007f7e7bc26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 924.038867][T16552] RAX: ffffffffffffffda RBX: 00007f7e7bc26c90 RCX: 0000000000459829 [ 924.047104][T16552] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 11:52:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x0) 11:52:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 924.055169][T16552] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 924.063782][T16552] R10: 000000007fffffff R11: 0000000000000246 R12: 00007f7e7bc276d4 [ 924.072188][T16552] R13: 00000000004c7005 R14: 00000000004dc610 R15: 0000000000000005 11:52:21 executing program 3 (fault-call:2 fault-nth:2): openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) 11:52:21 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x6488}}}}}, &(0x7f0000000100)) 11:52:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x6, 0x0, 0x0) [ 924.157448][T16561] FAULT_INJECTION: forcing a failure. [ 924.157448][T16561] name failslab, interval 1, probability 0, space 0, times 0 [ 924.188101][T16561] CPU: 0 PID: 16561 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 924.196033][T16561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 11:52:21 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x6c00}}}}}, &(0x7f0000000100)) [ 924.206282][T16561] Call Trace: [ 924.209588][T16561] dump_stack+0x1d8/0x2f8 [ 924.214035][T16561] should_fail+0x555/0x770 [ 924.218468][T16561] __should_failslab+0x11a/0x160 [ 924.223656][T16561] ? kcalloc+0x2f/0x50 [ 924.228225][T16568] FAULT_INJECTION: forcing a failure. [ 924.228225][T16568] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 924.241986][T16561] should_failslab+0x9/0x20 [ 924.246675][T16561] __kmalloc+0x7a/0x340 [ 924.250834][T16561] ? debug_check_no_obj_freed+0x505/0x5b0 [ 924.257008][T16561] kcalloc+0x2f/0x50 [ 924.261089][T16561] ext4_find_extent+0x216/0xaa0 [ 924.266155][T16561] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 924.272923][T16561] ext4_ext_map_blocks+0x170/0x7180 [ 924.278223][T16561] ? debug_smp_processor_id+0x1c/0x20 [ 924.283980][T16561] ? perf_trace_lock_acquire+0x97/0x3b0 [ 924.289829][T16561] ? perf_trace_lock_acquire+0x97/0x3b0 [ 924.295476][T16561] ? trace_event_raw_event_lock_acquire+0x210/0x210 [ 924.302366][T16561] ? trace_lock_acquire+0x159/0x1d0 [ 924.307707][T16561] ? __kasan_check_write+0x14/0x20 [ 924.313003][T16561] ext4_map_blocks+0x8f2/0x1e50 [ 924.317866][T16561] ? __kasan_check_write+0x14/0x20 [ 924.323207][T16561] ext4_getblk+0xae/0x460 [ 924.327566][T16561] ext4_bread+0x4a/0x240 [ 924.331897][T16561] ext4_append+0x175/0x310 [ 924.336321][T16561] ext4_mkdir+0x7ad/0x1450 [ 924.340758][T16561] vfs_mkdir+0x43f/0x610 [ 924.345202][T16561] do_mkdirat+0x1d7/0x320 [ 924.349710][T16561] __x64_sys_mkdir+0x60/0x70 [ 924.354479][T16561] do_syscall_64+0xfe/0x140 [ 924.359337][T16561] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 924.365325][T16561] RIP: 0033:0x458c47 [ 924.369221][T16561] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 924.389275][T16561] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 924.397689][T16561] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 924.405747][T16561] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 924.413821][T16561] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 924.421939][T16561] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 924.432456][T16561] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 924.440442][T16568] CPU: 1 PID: 16568 Comm: syz-executor.3 Not tainted 5.3.0-rc4 #73 [ 924.449205][T16568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 924.459516][T16568] Call Trace: [ 924.462903][T16568] dump_stack+0x1d8/0x2f8 [ 924.467595][T16568] should_fail+0x555/0x770 [ 924.472286][T16568] should_fail_alloc_page+0x55/0x60 [ 924.477488][T16568] prepare_alloc_pages+0x283/0x470 [ 924.482800][T16568] __alloc_pages_nodemask+0xb2/0x5d0 [ 924.490064][T16568] ? rcu_lock_release+0x26/0x30 [ 924.495019][T16568] alloc_pages_current+0x2db/0x500 [ 924.500271][T16568] __page_cache_alloc+0x7d/0x1f0 [ 924.505213][T16568] generic_file_read_iter+0x1247/0x21b0 [ 924.510864][T16568] ext4_file_read_iter+0x25b/0x3a0 [ 924.515982][T16568] generic_file_splice_read+0x504/0x820 [ 924.521709][T16568] ? splice_shrink_spd+0xb0/0xb0 [ 924.526843][T16568] splice_direct_to_actor+0x39c/0xac0 [ 924.532476][T16568] ? do_splice_direct+0x330/0x330 [ 924.537690][T16568] do_splice_direct+0x200/0x330 [ 924.542933][T16568] ? security_file_permission+0xb0/0x350 [ 924.548661][T16568] do_sendfile+0x7e4/0xfd0 [ 924.553269][T16568] __x64_sys_sendfile64+0x176/0x1b0 [ 924.558738][T16568] do_syscall_64+0xfe/0x140 [ 924.563781][T16568] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 924.570562][T16568] RIP: 0033:0x459829 [ 924.574897][T16568] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 924.597500][T16568] RSP: 002b:00007f7e7bc26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 924.605916][T16568] RAX: ffffffffffffffda RBX: 00007f7e7bc26c90 RCX: 0000000000459829 [ 924.613999][T16568] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 924.622154][T16568] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 924.630739][T16568] R10: 000000007fffffff R11: 0000000000000246 R12: 00007f7e7bc276d4 [ 924.639695][T16568] R13: 00000000004c7005 R14: 00000000004dc610 R15: 0000000000000005 11:52:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\b', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:22 executing program 3 (fault-call:2 fault-nth:3): openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) 11:52:22 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x800e}}}}}, &(0x7f0000000100)) 11:52:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x6, 0x0, 0x0) 11:52:22 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) 11:52:22 executing program 0 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x6, 0x0, 0x0) 11:52:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x05', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:22 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8035}}}}}, &(0x7f0000000100)) 11:52:22 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7ffff000) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) [ 924.987700][T16594] FAULT_INJECTION: forcing a failure. [ 924.987700][T16594] name failslab, interval 1, probability 0, space 0, times 0 [ 925.000810][T16594] CPU: 1 PID: 16594 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 925.008815][T16594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 925.019218][T16594] Call Trace: [ 925.022755][T16594] dump_stack+0x1d8/0x2f8 [ 925.027279][T16594] should_fail+0x555/0x770 [ 925.031886][T16594] __should_failslab+0x11a/0x160 [ 925.036925][T16594] ? __es_insert_extent+0x321/0xd90 [ 925.042323][T16594] should_failslab+0x9/0x20 [ 925.046934][T16594] kmem_cache_alloc+0x56/0x2e0 [ 925.051795][T16594] __es_insert_extent+0x321/0xd90 [ 925.056913][T16594] ext4_es_insert_extent+0x220/0x2fb0 [ 925.062559][T16594] ext4_map_blocks+0xe18/0x1e50 [ 925.067506][T16594] ? __kasan_check_write+0x14/0x20 [ 925.072621][T16594] ext4_getblk+0xae/0x460 [ 925.077093][T16594] ext4_bread+0x4a/0x240 [ 925.081341][T16594] ext4_append+0x175/0x310 [ 925.086130][T16594] ext4_mkdir+0x7ad/0x1450 [ 925.090559][T16594] vfs_mkdir+0x43f/0x610 [ 925.094892][T16594] do_mkdirat+0x1d7/0x320 [ 925.099226][T16594] __x64_sys_mkdir+0x60/0x70 [ 925.103942][T16594] do_syscall_64+0xfe/0x140 [ 925.108558][T16594] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 925.114450][T16594] RIP: 0033:0x458c47 [ 925.118351][T16594] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 925.138262][T16594] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 925.146831][T16594] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 925.154800][T16594] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 925.162905][T16594] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 925.171320][T16594] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 925.179469][T16594] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:22 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8100}}}}}, &(0x7f0000000100)) 11:52:22 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x6, 0x0, 0x0) 11:52:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000080)={0x79, 0x0, [0x7f, 0x10001, 0x80000001, 0x7]}) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:22 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x6, 0x0, 0x0) 11:52:22 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8847}}}}}, &(0x7f0000000100)) 11:52:22 executing program 0 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:23 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x6, 0x0, 0x0) 11:52:23 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8848}}}}}, &(0x7f0000000100)) [ 925.444042][T16623] FAULT_INJECTION: forcing a failure. [ 925.444042][T16623] name failslab, interval 1, probability 0, space 0, times 0 [ 925.466235][T16623] CPU: 1 PID: 16623 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 925.476168][T16623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 925.486947][T16623] Call Trace: [ 925.490783][T16623] dump_stack+0x1d8/0x2f8 [ 925.495142][T16623] should_fail+0x555/0x770 [ 925.499771][T16623] __should_failslab+0x11a/0x160 [ 925.504805][T16623] should_failslab+0x9/0x20 [ 925.509751][T16623] kmem_cache_alloc_trace+0x5d/0x2f0 [ 925.515452][T16623] ? smack_d_instantiate+0x962/0xd70 [ 925.520920][T16623] smack_d_instantiate+0x962/0xd70 [ 925.526171][T16623] ? lockdep_init_map+0x2a/0x680 [ 925.531635][T16623] security_d_instantiate+0xa5/0x100 [ 925.536985][T16623] d_instantiate_new+0x65/0x130 [ 925.542377][T16623] ext4_mkdir+0xfa9/0x1450 [ 925.546984][T16623] vfs_mkdir+0x43f/0x610 [ 925.551402][T16623] do_mkdirat+0x1d7/0x320 [ 925.556178][T16623] __x64_sys_mkdir+0x60/0x70 [ 925.560792][T16623] do_syscall_64+0xfe/0x140 [ 925.565321][T16623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 925.571562][T16623] RIP: 0033:0x458c47 [ 925.575590][T16623] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 925.599933][T16623] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 925.608435][T16623] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 925.616413][T16623] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 925.624651][T16623] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 925.634045][T16623] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 11:52:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x06', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:23 executing program 3: accept4(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000000)=0xd4, 0x800) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000100)=0x1, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "963f685a091b87a0", "690af303929cc2ae98905169f2377129", "61fda44d", "d1a5b9c6c413c11c"}, 0x28) sendfile(r2, r2, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x9) 11:52:23 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8864}}}}}, &(0x7f0000000100)) 11:52:23 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) [ 925.642754][T16623] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:23 executing program 3: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r0, r1, r2) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) sendfile(r4, r4, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r4, 0x0, 0x80b0) r5 = msgget$private(0x0, 0x7f955dcb900294dc) msgrcv(r5, &(0x7f0000000200)={0x0, ""/22}, 0x1e, 0x1, 0x1000) 11:52:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\n', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:23 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8906}}}}}, &(0x7f0000000100)) 11:52:23 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:23 executing program 0 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:23 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xe803}}}}}, &(0x7f0000000100)) 11:52:23 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x6, 0x0, 0x0) [ 925.972320][T16653] FAULT_INJECTION: forcing a failure. [ 925.972320][T16653] name failslab, interval 1, probability 0, space 0, times 0 [ 926.031416][T16653] CPU: 0 PID: 16653 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 926.040403][T16653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 926.051977][T16653] Call Trace: [ 926.055283][T16653] dump_stack+0x1d8/0x2f8 [ 926.060018][T16653] should_fail+0x555/0x770 [ 926.064831][T16653] __should_failslab+0x11a/0x160 [ 926.069962][T16653] ? kzalloc+0x1f/0x40 [ 926.074918][T16653] should_failslab+0x9/0x20 [ 926.079693][T16653] __kmalloc+0x7a/0x340 [ 926.084101][T16653] kzalloc+0x1f/0x40 [ 926.088249][T16653] smk_parse_smack+0x197/0x230 [ 926.093279][T16653] smk_import_entry+0x27/0x590 [ 926.098143][T16653] smack_d_instantiate+0x78f/0xd70 [ 926.103268][T16653] ? lockdep_init_map+0x2a/0x680 [ 926.109703][T16653] security_d_instantiate+0xa5/0x100 [ 926.114994][T16653] d_instantiate_new+0x65/0x130 [ 926.119850][T16653] ext4_mkdir+0xfa9/0x1450 [ 926.124723][T16653] vfs_mkdir+0x43f/0x610 [ 926.129075][T16653] do_mkdirat+0x1d7/0x320 [ 926.133678][T16653] __x64_sys_mkdir+0x60/0x70 [ 926.138629][T16653] do_syscall_64+0xfe/0x140 [ 926.143500][T16653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 926.149582][T16653] RIP: 0033:0x458c47 [ 926.153659][T16653] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:52:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\a', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:23 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xf003}}}}}, &(0x7f0000000100)) [ 926.173952][T16653] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 926.182571][T16653] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 926.190652][T16653] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 926.198997][T16653] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 926.207263][T16653] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 926.216537][T16653] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x6, 0x0, 0x0) 11:52:23 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xf401}}}}}, &(0x7f0000000100)) 11:52:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) r2 = fcntl$getown(r1, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) sendmsg$nl_netfilter(r0, &(0x7f00000018c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xbe7743230dd98c0}, 0xc, &(0x7f0000001880)={&(0x7f0000000140)={0x1740, 0x2, 0xa, 0x0, 0x70bd2c, 0x25dfdbfe, {0x3, 0x0, 0x1}, [@generic="f047e34997dff8de4fd1cd4b5116ad644bb6d9e28015094c80bbd47cab920b99d1b9c3c37280dc574df23027c03283c8bb5f1dbe5352761f2292cc84788abfe783afedc4e771a30d75da850a9ef4167b739f3c9efa3e3f662f4dbb315f04e5888b5f2a0228f8d4b21ea175a3f80923f49f336ddcb1f66121fcafaee50b2d811a4d6723cfc45b6227fae74946d2e1ab3f7bc1fde951e119e5dc7a427a8ac797fe4a9541661d3d8db94084efdf5697d59da92f", @typed={0x8c, 0x26, @binary="fa88a909ef19de4c7074d9a7c6a2ecb42a638350b83a65a3a03c09668d1337866625e45129a7a8c34927451a6c8214009a24a71a9a59bcd171efcd3c3ea4245b083d6399b8970c12271c8e2c7d620c5ce00faba496fc4d1019069b3ef3c538610dfc0b7b15175dbd724b93076aa53c6f15e1144c8f9a8483b45197fdd0e165238c7c5513b0af8197"}, @nested={0x250, 0x32, [@typed={0x14, 0xf, @ipv6=@remote}, @generic="36b65e274d7d3731e181cd49dca79d336fa12e364ab53b559d8f023d53c4800f35bae8f0f57764e68ef7fd9942a5acfbfec6ded61f9582c25f77962d1f16767c60557b1dd47f016ba400ec88f3e28da1c4c4fde1d5a9c02758145a66bc8149618bd93045f2ceade66a2e73ecac5ae78a9c5b864e563a5fe71d162d9f6bd9630940cee01bd0b646c4ec42ed5ca6c2a6a38c49e30b182085292d4e15dbd88cc3e4e4b3afd8b2fb8080803a37264532406414242b29b09d05e45ecd9d76f714", @typed={0x8, 0x6d, @pid=r2}, @generic="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", @generic="44bbb2f33c4ccde14314bea513d59c28e6b93106b66873e08ced989b18980af6217186f445acd20cfb62c87a67bef6035d2f20a9b6440dd27eefb1ee7451b991e3ba62dd98bf6ecb55ed9b7fdd2efc834f678b048c1068a74702f74f8ae08dea8c7e41e96944e95215cb3883802d04cab530df92"]}, @nested={0x1020, 0x29, [@generic="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", @typed={0x8, 0x6b, @u32=0x93}, @typed={0x14, 0xd, @ipv6=@rand_addr="127d2f76ca0995d68f6701665f175676"}]}, @generic="ab969f6d5f0aa29872924fdcec50b06d64d663b45d17b877030ca028bf38e4e1a92085105ce7b70ba6ef84ec6f970847da79c73688af407a524b2c7433c2ec4badc89a04ea71468ea1cefc7edb833ad175f8a7377db5fb4135a506d8734373f2cfe964d1eeb691f9cd80c560", @typed={0x8, 0x8d, @uid=r3}, @nested={0x18, 0x3b, [@typed={0x14, 0x66, @ipv6=@remote}]}, @nested={0x2f0, 0x51, [@typed={0x8, 0x2e, @pid=r4}, @generic="156170338da2b53f2d484c51b8ddc6dd6b39ff45e9b27fa9bb99730c1003a3a49149cb3c90554faa1498520592ef2add33b5d617d4a87d3b938b0de83c49a7c611134be95b15bb043a52c7e9cf174cb76f7e6e9ed9f8c1dff6cd24c93c18302b2abc221ee38b5943b0a3aaebf4986c0aa8a801d768603893484af13231a8b73630c17d505138342ed08fd85c012d505b6a3b67f3e626b7295174", @typed={0x8, 0x7c, @fd=r1}, @generic="352606eba8e32a079567d0d3751640e867eea3507899f02dc3e4eab9b57245b7b13506b6a6309720dd01782269abd83168fddd52982edb7ab4b86c472f7f1ba6e9e3fa04b6c0a3795cf03f948ee149633d952d9a0b16a5e29c5a682dcaa058b16917aa6a8100964ce440e52be627fc8c2b2497cdb3f99f1b3fdb0e0ac601d3b12b939aab6d782c65", @generic="a3a74beb28f2c21f9a7d29327c061c23b2a3ab77b9a1f3bcc4c2f7a19ae8bc28100ade8c008fe31f52c81c65c4583f81fe6e6a3d4570b110a5b7c997920552114428cfb91e22ed7a326b171d4c49b7ed2e9cdd3c981de54c1265a49b9961105654b8deeb2ebda1558c78f85af040cacef44d85cf7fc760c3e36af4f0b43a516460774f8c8d7586d7744f7f46de64ac1f47d782b769a8a0d285fa981f0089ab9bf55fa4f73227493d4d911ff8cda98c42f375b4d74c652ae9280061c8", @generic="fffae8fe7b9a816c1dcb7aaf67daf612eb80c933e821d780081f69f47b76d152eb62fa4b65b9", @typed={0x8, 0x14, @u32=0x401}, @generic="574bb83976957b64734c4be65845498b31c4a46ff4bf88b70054541b21fc5c096eefa4336e264c59f6c0c140beacb83d0602e3405c0d030b1b4acbc64a0bd54ce19bfd19a5889fc49e29337e1725d6b87cc214495b5be05d42e36694d2e35170277f695d494ad223618b95abd870c7a5062196b92bb5aee54b6b6b0fbc193df6a7706cd83067d85fdfa4c6b62c7b9da3919cdb13951facd65934f0b9ba003038617b6fe05a28eee03b1580806aca025bdad17a3d30c9e07edafdd32a8e74860b844b6b9e", @typed={0xc, 0x5b, @u64=0x7fffffff}]}]}, 0x1740}, 0x1, 0x0, 0x0, 0x4}, 0x40090) socketpair(0x10, 0x3, 0x7ff, &(0x7f0000001900)) 11:52:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x6, 0x0, 0x0) 11:52:24 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xfe03}}}}}, &(0x7f0000000100)) 11:52:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\v', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:24 executing program 0 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\b', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x6, 0x0, 0x0) [ 926.692592][T16689] FAULT_INJECTION: forcing a failure. [ 926.692592][T16689] name failslab, interval 1, probability 0, space 0, times 0 [ 926.706533][T16689] CPU: 1 PID: 16689 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 926.714523][T16689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 926.714527][T16689] Call Trace: [ 926.714543][T16689] dump_stack+0x1d8/0x2f8 [ 926.714558][T16689] should_fail+0x555/0x770 [ 926.714573][T16689] __should_failslab+0x11a/0x160 11:52:24 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x20480}}}}}, &(0x7f0000000100)) 11:52:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x6, 0x0, 0x0) [ 926.741914][T16689] ? ksys_mount+0x38/0x100 [ 926.741926][T16689] should_failslab+0x9/0x20 [ 926.741938][T16689] __kmalloc_track_caller+0x79/0x340 [ 926.741955][T16689] strndup_user+0x76/0x130 [ 926.756274][T16689] ksys_mount+0x38/0x100 [ 926.756287][T16689] __x64_sys_mount+0xbf/0xd0 [ 926.756302][T16689] do_syscall_64+0xfe/0x140 [ 926.756315][T16689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 926.756323][T16689] RIP: 0033:0x45c27a 11:52:24 executing program 3: getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f0000000000), &(0x7f0000000080)=0x4) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) 11:52:24 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x1000000}}}}}, &(0x7f0000000100)) [ 926.756333][T16689] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 926.756341][T16689] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 926.764957][T16689] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 926.764963][T16689] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 926.764968][T16689] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 926.764973][T16689] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 926.764979][T16689] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, 0x3, {0x7, 0x1f, 0x0, 0x0, 0x8000, 0x7fff, 0x1f, 0x6}}, 0x50) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x6) fcntl$getown(r1, 0x9) sendfile(r1, r1, 0x0, 0x80) 11:52:24 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2000000}}}}}, &(0x7f0000000100)) 11:52:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x6, 0x0, 0x0) 11:52:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\f', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:24 executing program 0 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:24 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3000000}}}}}, &(0x7f0000000100)) 11:52:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) migrate_pages(r2, 0x9, &(0x7f0000000240)=0x8, &(0x7f0000000280)=0xf24) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e20, 0x7, @local, 0x6}}, 0x3, 0x9}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={r3, 0xfffffffffffff931, 0xff, 0x10000}, &(0x7f0000000180)=0x10) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) [ 927.082186][T16727] FAULT_INJECTION: forcing a failure. [ 927.082186][T16727] name failslab, interval 1, probability 0, space 0, times 0 [ 927.095553][T16727] CPU: 0 PID: 16727 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 927.103445][T16727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 927.103450][T16727] Call Trace: [ 927.103468][T16727] dump_stack+0x1d8/0x2f8 [ 927.103485][T16727] should_fail+0x555/0x770 [ 927.121276][T16727] __should_failslab+0x11a/0x160 [ 927.121288][T16727] ? ksys_mount+0x38/0x100 [ 927.121298][T16727] should_failslab+0x9/0x20 [ 927.121313][T16727] __kmalloc_track_caller+0x79/0x340 [ 927.135034][T16727] strndup_user+0x76/0x130 [ 927.135047][T16727] ksys_mount+0x38/0x100 [ 927.135057][T16727] __x64_sys_mount+0xbf/0xd0 [ 927.135073][T16727] do_syscall_64+0xfe/0x140 [ 927.144822][T16727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 927.144831][T16727] RIP: 0033:0x45c27a 11:52:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x8001) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:24 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x4000000}}}}}, &(0x7f0000000100)) 11:52:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) [ 927.144841][T16727] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 927.144850][T16727] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 927.158076][T16727] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 927.168417][T16727] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 927.168422][T16727] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 927.168427][T16727] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 11:52:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\n', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 927.168432][T16727] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:24 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x5000000}}}}}, &(0x7f0000000100)) 11:52:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f00000000c0)) r1 = openat$cgroup_int(r0, &(0x7f0000000300), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000280)={0xa, 0x7, 0x961d, 0x100}, 0xa) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000000), 0x2) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x4, 0x1}, {0x0, 0x6}, {0x1000, 0x75e}]}) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000240)) 11:52:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\r', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:25 executing program 0 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:25 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x6000000}}}}}, &(0x7f0000000100)) 11:52:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)='cpuset.mem_hardwall\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fcntl$setownex(r0, 0xf, &(0x7f0000000300)={0x0, r2}) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000340)={0xe7, 0x11, 0x1000, 0x5, "c60e69336e96d68b7c0fcc1175acdd2131f960d9de429dcd00451a0d516fefa5"}) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/91, 0x5b}, {&(0x7f0000000100)=""/207, 0xcf}, {&(0x7f0000000200)=""/69, 0x45}], 0x3, 0x0) 11:52:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\v', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x3, 0xebb15dd8c92a77f1) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400400, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x1, 'teql0\x00', 0x3}, 0x18) sendfile(r2, r0, 0x0, 0x8000000006978) [ 927.592265][T16768] FAULT_INJECTION: forcing a failure. [ 927.592265][T16768] name failslab, interval 1, probability 0, space 0, times 0 [ 927.608384][T16768] CPU: 0 PID: 16768 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 927.616265][T16768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 927.626318][T16768] Call Trace: [ 927.629611][T16768] dump_stack+0x1d8/0x2f8 [ 927.633952][T16768] should_fail+0x555/0x770 [ 927.638455][T16768] __should_failslab+0x11a/0x160 [ 927.643389][T16768] ? __sigqueue_alloc+0x2ce/0x440 [ 927.648448][T16768] should_failslab+0x9/0x20 [ 927.653033][T16768] kmem_cache_alloc+0x56/0x2e0 [ 927.657797][T16768] __sigqueue_alloc+0x2ce/0x440 [ 927.662649][T16768] __send_signal+0x508/0xcd0 [ 927.667237][T16768] send_signal+0x6e0/0x830 [ 927.671651][T16768] force_sig_info_to_task+0x247/0x2e0 [ 927.677020][T16768] force_sig_fault+0xbf/0x130 [ 927.681698][T16768] __bad_area_nosemaphore+0x307/0x470 [ 927.687149][T16768] bad_area+0x6b/0x80 11:52:25 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x7000000}}}}}, &(0x7f0000000100)) [ 927.691122][T16768] do_user_addr_fault+0xacc/0xaf0 [ 927.696142][T16768] __do_page_fault+0xd3/0x1f0 [ 927.700824][T16768] do_page_fault+0x99/0xb0 [ 927.705229][T16768] page_fault+0x39/0x40 [ 927.709459][T16768] RIP: 0033:0x45342f [ 927.713430][T16768] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 927.733198][T16768] RSP: 002b:00007f250541ca88 EFLAGS: 00010283 11:52:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000080)={0x9, 0xb9, "edcd002872f2bcd2d389db307574cad3d25727e88cea1d87b4fa3c5d566675979ebb7d108016ba6df1b7b8372e1112f19b8ddaa8df8a31c1713f4c2b9639778bf77b15c50da9adb69d7ef0b7eb7be0bf6ffd7d145ef0a42de566f79b6d4efd7264ddafedf81fa10f3ffcc664fe31f4029957f6d8fc73923bd1a95eddf75e77d65796e727be5fa48e8d76c5d3033f6f84150a04880b047fc2853796b6b8a9ff08e46e34f50d479bc399bf302ec543142d6ad22a98f896dbe617"}) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) [ 927.733207][T16768] RAX: 00007f250541cb40 RBX: 0000000020000028 RCX: 0000000000000000 [ 927.733213][T16768] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f250541cb40 [ 927.733218][T16768] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 927.733228][T16768] R10: 0000000000000075 R11: 00000000004e5240 R12: 0000000000000004 [ 927.763417][T16768] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:25 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8000000}}}}}, &(0x7f0000000100)) 11:52:25 executing program 0 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 927.959335][T16803] FAULT_INJECTION: forcing a failure. [ 927.959335][T16803] name failslab, interval 1, probability 0, space 0, times 0 [ 927.973594][T16803] CPU: 1 PID: 16803 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 927.981964][T16803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 927.992016][T16803] Call Trace: [ 927.995300][T16803] dump_stack+0x1d8/0x2f8 [ 927.999895][T16803] should_fail+0x555/0x770 [ 928.004309][T16803] __should_failslab+0x11a/0x160 [ 928.009414][T16803] should_failslab+0x9/0x20 [ 928.013912][T16803] kmem_cache_alloc_trace+0x5d/0x2f0 [ 928.019189][T16803] ? smack_d_instantiate+0xabf/0xd70 [ 928.024465][T16803] smack_d_instantiate+0xabf/0xd70 [ 928.029658][T16803] ? lockdep_init_map+0x2a/0x680 [ 928.034588][T16803] security_d_instantiate+0xa5/0x100 [ 928.039873][T16803] d_instantiate_new+0x65/0x130 [ 928.044720][T16803] ext4_mkdir+0xfa9/0x1450 [ 928.049318][T16803] vfs_mkdir+0x43f/0x610 [ 928.053559][T16803] do_mkdirat+0x1d7/0x320 [ 928.057887][T16803] __x64_sys_mkdir+0x60/0x70 [ 928.062650][T16803] do_syscall_64+0xfe/0x140 [ 928.067151][T16803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 928.073032][T16803] RIP: 0033:0x458c47 [ 928.076924][T16803] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 928.096609][T16803] RSP: 002b:00007f250541ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 11:52:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x0e', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:25 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80b0) 11:52:25 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8060000}}}}}, &(0x7f0000000100)) 11:52:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\f', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 928.105017][T16803] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 928.113064][T16803] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 928.121030][T16803] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 928.128993][T16803] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 928.136955][T16803] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:25 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xa000000}}}}}, &(0x7f0000000100)) 11:52:25 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x402040, 0x0) ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f00000001c0)=0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cv\'f\xa1\xf3\xeaFe\x0eN\x1a\xaf\x8e.\xbf\xdc\x0e\x02\x05h[\x15jp\x19=O\x92\x15\xea\xf8\xfdQ\xc4.h_\xfa+\xa7\x95\xf5', 0x2, 0x0) read(r2, &(0x7f0000000080)=""/51, 0x33) sendfile(r2, r2, 0x0, 0x7fffffff) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000100)={0x9, 0x50, "0788bf783d174ebb0995e8f9099f215a7d8278ae2fe2cb5eab72b3bc94d7fa0dd1d48542b6315a4f9c748306ecf5104a436bc514aea863c94f5107936e75d2d00f5ccd9813464d39c6c0c8b49a559e09"}) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000000)={'veth1_to_bond\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) sendfile(0xffffffffffffffff, r2, 0x0, 0x80b0) 11:52:25 executing program 0 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000000)=0x1) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:25 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xb000000}}}}}, &(0x7f0000000100)) 11:52:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) [ 928.392204][T16829] FAULT_INJECTION: forcing a failure. [ 928.392204][T16829] name failslab, interval 1, probability 0, space 0, times 0 [ 928.404837][T16829] CPU: 0 PID: 16829 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 928.412726][T16829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 928.422789][T16829] Call Trace: [ 928.429649][T16829] dump_stack+0x1d8/0x2f8 [ 928.433990][T16829] should_fail+0x555/0x770 [ 928.438502][T16829] __should_failslab+0x11a/0x160 [ 928.443528][T16829] ? __sigqueue_alloc+0x2ce/0x440 [ 928.448557][T16829] should_failslab+0x9/0x20 [ 928.453071][T16829] kmem_cache_alloc+0x56/0x2e0 [ 928.457970][T16829] __sigqueue_alloc+0x2ce/0x440 [ 928.462817][T16829] __send_signal+0x508/0xcd0 [ 928.462832][T16829] send_signal+0x6e0/0x830 [ 928.462847][T16829] force_sig_info_to_task+0x247/0x2e0 [ 928.462863][T16829] force_sig_fault+0xbf/0x130 [ 928.471923][T16829] __bad_area_nosemaphore+0x307/0x470 [ 928.471938][T16829] bad_area+0x6b/0x80 [ 928.471949][T16829] do_user_addr_fault+0xacc/0xaf0 [ 928.471966][T16829] __do_page_fault+0xd3/0x1f0 [ 928.471977][T16829] do_page_fault+0x99/0xb0 [ 928.487600][T16829] page_fault+0x39/0x40 [ 928.487610][T16829] RIP: 0033:0x45342f [ 928.487620][T16829] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 928.487624][T16829] RSP: 002b:00007f250541ca88 EFLAGS: 00010283 11:52:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x10', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\r', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:26 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xc000000}}}}}, &(0x7f0000000100)) 11:52:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) write$cgroup_int(r1, &(0x7f0000000000)=0x86a0000, 0x12) sendfile(r0, r1, 0x0, 0x80ae) [ 928.487632][T16829] RAX: 00007f250541cb40 RBX: 0000000020000028 RCX: 0000000000000000 [ 928.487637][T16829] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f250541cb40 [ 928.487642][T16829] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 928.487647][T16829] R10: 0000000000000075 R11: 00000000004e5240 R12: 0000000000000004 [ 928.487652][T16829] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:26 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xd000000}}}}}, &(0x7f0000000100)) 11:52:26 executing program 0 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x0, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='cpu.weight.nice\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:26 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xf000000}}}}}, &(0x7f0000000100)) [ 928.789910][T16863] FAULT_INJECTION: forcing a failure. [ 928.789910][T16863] name failslab, interval 1, probability 0, space 0, times 0 [ 928.806294][T16863] CPU: 0 PID: 16863 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 928.814311][T16863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 928.824367][T16863] Call Trace: [ 928.827665][T16863] dump_stack+0x1d8/0x2f8 [ 928.831998][T16863] should_fail+0x555/0x770 [ 928.836423][T16863] __should_failslab+0x11a/0x160 [ 928.841359][T16863] ? ksys_mount+0x38/0x100 [ 928.845790][T16863] should_failslab+0x9/0x20 [ 928.850302][T16863] __kmalloc_track_caller+0x79/0x340 [ 928.855592][T16863] strndup_user+0x76/0x130 [ 928.860008][T16863] ksys_mount+0x38/0x100 [ 928.864246][T16863] __x64_sys_mount+0xbf/0xd0 [ 928.868837][T16863] do_syscall_64+0xfe/0x140 [ 928.873436][T16863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 928.879325][T16863] RIP: 0033:0x45c27a 11:52:26 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x11000000}}}}}, &(0x7f0000000100)) [ 928.883208][T16863] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 928.902802][T16863] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 928.911211][T16863] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 928.919258][T16863] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 928.927219][T16863] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 11:52:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x0, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) [ 928.935181][T16863] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 928.943256][T16863] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x11', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:26 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) 11:52:26 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x14000000}}}}}, &(0x7f0000000100)) 11:52:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x0e', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x0, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x1f87e9932f129aa1, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.mem_exclusive\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) bind$x25(r0, &(0x7f0000000140)={0x9, @remote={[], 0x3}}, 0x12) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:26 executing program 0 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:26 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x1f000000}}}}}, &(0x7f0000000100)) 11:52:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x4000007fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) [ 929.240448][T16894] FAULT_INJECTION: forcing a failure. [ 929.240448][T16894] name failslab, interval 1, probability 0, space 0, times 0 [ 929.288553][T16894] CPU: 1 PID: 16894 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 929.296490][T16894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 929.306648][T16894] Call Trace: [ 929.306668][T16894] dump_stack+0x1d8/0x2f8 [ 929.306684][T16894] should_fail+0x555/0x770 [ 929.306697][T16894] __should_failslab+0x11a/0x160 [ 929.306714][T16894] ? tomoyo_encode2+0x273/0x5a0 [ 929.328527][T16894] should_failslab+0x9/0x20 [ 929.328538][T16894] __kmalloc+0x7a/0x340 [ 929.328550][T16894] tomoyo_encode2+0x273/0x5a0 [ 929.328561][T16894] tomoyo_realpath_from_path+0x769/0x7c0 [ 929.328576][T16894] tomoyo_mount_permission+0x294/0xa30 [ 929.352920][T16894] ? path_lookupat+0x474/0xb30 [ 929.357784][T16894] ? kmem_cache_free+0xd8/0xf0 [ 929.362572][T16894] tomoyo_sb_mount+0x35/0x40 [ 929.367159][T16894] security_sb_mount+0x84/0xe0 [ 929.371923][T16894] do_mount+0x107/0x2490 [ 929.376168][T16894] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 929.381704][T16894] ? copy_mount_options+0x5f/0x3c0 [ 929.386812][T16894] ? copy_mount_options+0x308/0x3c0 [ 929.392011][T16894] ksys_mount+0xcc/0x100 [ 929.396247][T16894] __x64_sys_mount+0xbf/0xd0 [ 929.400835][T16894] do_syscall_64+0xfe/0x140 [ 929.405335][T16894] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 929.411216][T16894] RIP: 0033:0x45c27a [ 929.415106][T16894] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 11:52:26 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x21000000}}}}}, &(0x7f0000000100)) 11:52:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) [ 929.434707][T16894] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 929.443199][T16894] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 929.451250][T16894] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 929.459220][T16894] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 929.467189][T16894] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 929.475174][T16894] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 929.486096][T16894] ERROR: Out of memory at tomoyo_realpath_from_path. 11:52:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x12', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x10', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:27 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) 11:52:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:27 executing program 0 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:27 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x29000000}}}}}, &(0x7f0000000100)) 11:52:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x0) 11:52:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000001c0)=""/152) r1 = openat$cgroup_int(r0, &(0x7f0000000000), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) [ 929.726720][T16921] FAULT_INJECTION: forcing a failure. [ 929.726720][T16921] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 929.740172][T16921] CPU: 0 PID: 16921 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 929.748144][T16921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 929.758190][T16921] Call Trace: [ 929.761480][T16921] dump_stack+0x1d8/0x2f8 [ 929.765817][T16921] should_fail+0x555/0x770 [ 929.770329][T16921] should_fail_alloc_page+0x55/0x60 [ 929.775915][T16921] prepare_alloc_pages+0x283/0x470 [ 929.781029][T16921] __alloc_pages_nodemask+0xb2/0x5d0 [ 929.786317][T16921] kmem_getpages+0x56/0xa20 [ 929.790812][T16921] ? trace_lock_release+0x135/0x1a0 [ 929.796006][T16921] cache_grow_begin+0x7e/0x2c0 [ 929.800766][T16921] cache_alloc_refill+0x311/0x3f0 [ 929.806741][T16921] ? check_preemption_disabled+0xb7/0x2a0 [ 929.812558][T16921] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 929.818014][T16921] ? copy_mount_options+0x5f/0x3c0 [ 929.823123][T16921] copy_mount_options+0x5f/0x3c0 [ 929.828058][T16921] ksys_mount+0xa0/0x100 [ 929.832288][T16921] __x64_sys_mount+0xbf/0xd0 [ 929.832302][T16921] do_syscall_64+0xfe/0x140 [ 929.832317][T16921] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 929.841367][T16921] RIP: 0033:0x45c27a [ 929.841378][T16921] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 11:52:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x0) 11:52:27 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2b000000}}}}}, &(0x7f0000000100)) [ 929.841383][T16921] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 929.841391][T16921] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 929.841400][T16921] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 929.895937][T16921] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 929.903903][T16921] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 929.911956][T16921] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:27 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='\xaf\x02roup.stap\x00#!\x17P)\x19\x87I\xad\xfc\xe4\xeeY?\x1b\x933q[\x05\x86`\xfd\xe8\xcf\xd4\x0f]7\x9fC\x87v\xde\x1e~\xfc\xc5\xe9\x130\xa0#\x88\x8d:\xbfZ\x7f\xcf\xcd}$\x98\xb0h[`|KS_;\x8f\xfb;\x86\xdc\x87\xb5', 0x2761, 0x0) pipe(&(0x7f0000000000)) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) 11:52:27 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2c000000}}}}}, &(0x7f0000000100)) 11:52:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x1c', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x0) 11:52:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x11', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:27 executing program 0 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:27 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2f000000}}}}}, &(0x7f0000000100)) 11:52:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x10001, 0x400}) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) ioctl$KDENABIO(r0, 0x4b36) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) [ 930.223993][T16954] FAULT_INJECTION: forcing a failure. [ 930.223993][T16954] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 930.237409][T16954] CPU: 0 PID: 16954 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 930.245381][T16954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 930.255435][T16954] Call Trace: [ 930.258728][T16954] dump_stack+0x1d8/0x2f8 [ 930.263056][T16954] should_fail+0x555/0x770 [ 930.267659][T16954] should_fail_alloc_page+0x55/0x60 [ 930.272850][T16954] prepare_alloc_pages+0x283/0x470 [ 930.277967][T16954] __alloc_pages_nodemask+0xb2/0x5d0 [ 930.283256][T16954] kmem_getpages+0x56/0xa20 [ 930.287757][T16954] ? check_preemption_disabled+0x47/0x2a0 [ 930.294080][T16954] cache_grow_begin+0x7e/0x2c0 [ 930.298843][T16954] cache_alloc_refill+0x311/0x3f0 [ 930.303868][T16954] ? check_preemption_disabled+0xb7/0x2a0 [ 930.309580][T16954] __kmalloc+0x318/0x340 [ 930.314005][T16954] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 930.319723][T16954] tomoyo_realpath_from_path+0xdc/0x7c0 [ 930.325276][T16954] tomoyo_mount_permission+0x294/0xa30 [ 930.330813][T16954] ? path_lookupat+0x474/0xb30 [ 930.335575][T16954] ? kmem_cache_free+0xd8/0xf0 [ 930.340350][T16954] tomoyo_sb_mount+0x35/0x40 [ 930.344937][T16954] security_sb_mount+0x84/0xe0 [ 930.349712][T16954] do_mount+0x107/0x2490 [ 930.353956][T16954] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 930.359490][T16954] ? copy_mount_options+0x5f/0x3c0 [ 930.364595][T16954] ? copy_mount_options+0x308/0x3c0 [ 930.369873][T16954] ksys_mount+0xcc/0x100 [ 930.374115][T16954] __x64_sys_mount+0xbf/0xd0 [ 930.378701][T16954] do_syscall_64+0xfe/0x140 [ 930.383201][T16954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 930.389081][T16954] RIP: 0033:0x45c27a [ 930.392975][T16954] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 930.412832][T16954] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 11:52:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x0, 0x0, 0x0) 11:52:28 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x32000000}}}}}, &(0x7f0000000100)) 11:52:28 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0) recvfrom$rose(r0, &(0x7f0000000040)=""/215, 0xd7, 0x40010022, &(0x7f0000000140)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, 0x1, @default}, 0x1c) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x1000002) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) [ 930.421257][T16954] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 930.431867][T16954] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 930.439839][T16954] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 930.447911][T16954] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 930.456447][T16954] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x0, 0x0, 0x0) 11:52:28 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x33000000}}}}}, &(0x7f0000000100)) 11:52:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) 11:52:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs%', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:28 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3a000000}}}}}, &(0x7f0000000100)) 11:52:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x0, 0x0, 0x0) 11:52:28 executing program 0 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(r0, r1, 0x0, 0x80b0) epoll_create1(0x80000) signalfd4(r0, &(0x7f0000000000)={0x5}, 0x8, 0x800) 11:52:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x12', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 930.876526][T16991] FAULT_INJECTION: forcing a failure. [ 930.876526][T16991] name failslab, interval 1, probability 0, space 0, times 0 [ 930.901549][T16991] CPU: 1 PID: 16991 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 930.909469][T16991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 930.919527][T16991] Call Trace: [ 930.922828][T16991] dump_stack+0x1d8/0x2f8 [ 930.927171][T16991] should_fail+0x555/0x770 [ 930.931595][T16991] __should_failslab+0x11a/0x160 [ 930.936533][T16991] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 930.942249][T16991] should_failslab+0x9/0x20 [ 930.946746][T16991] __kmalloc+0x7a/0x340 [ 930.951634][T16991] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 930.957351][T16991] tomoyo_realpath_from_path+0xdc/0x7c0 [ 930.962985][T16991] tomoyo_mount_permission+0x294/0xa30 [ 930.968447][T16991] ? kmem_cache_free+0xd8/0xf0 [ 930.973237][T16991] tomoyo_sb_mount+0x35/0x40 [ 930.977824][T16991] security_sb_mount+0x84/0xe0 [ 930.982586][T16991] do_mount+0x107/0x2490 [ 930.986820][T16991] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 930.992366][T16991] ? copy_mount_options+0x5f/0x3c0 [ 930.997558][T16991] ? copy_mount_options+0x308/0x3c0 [ 931.002842][T16991] ksys_mount+0xcc/0x100 [ 931.007077][T16991] __x64_sys_mount+0xbf/0xd0 [ 931.011664][T16991] do_syscall_64+0xfe/0x140 [ 931.016340][T16991] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 931.022224][T16991] RIP: 0033:0x45c27a [ 931.026112][T16991] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 931.045729][T16991] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 931.054737][T16991] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 931.062709][T16991] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 11:52:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) getsockname$packet(r0, &(0x7f0000005540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005580)=0x14) sendmmsg(r0, &(0x7f0000005cc0)=[{{&(0x7f0000000080)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)="47fc101f8a246bb7c285b2c7caf6c19148fe1b407bae6842fed4039bd02b76a3030cd1afcf4fda5528b50340e1b5", 0x2e}], 0x1}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @local}, 0x4, 0x0, 0x0, 0x2}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)="e63698b3a9263d6b6d9c5ec6bdc05d2c34f84da5c5f00e9a43539f3f781cfa2c5f0d701e87bad3de44c28099f020d766e16bb894abf53f09ab5149183f6a04241bf839cd513ee4a20c6959", 0x4b}, {&(0x7f0000000280)="ccc28622041b63e6a3654cacaa75e2923b19c527279bc1d9a4fa26ff36e8b4331937c21d06f9b2f7be35a7a38944682429d83d8d281280e1b536c2e4930e69d13af33e3bfcb5aff9dab55b5d85f46255be612910c335f854e17a8de7e90a240f2192c2a6fd1154bcce755659e8c9719fffe86d1c0497ca14d469c10467abe76341183f85429c92ec30f3c61f79f3dc7163ff25cf0e09056f461098ff", 0x9c}, {&(0x7f0000000340)="60a08ee4c622944f1e7e3b57e1c4d72249d7c9bd19d7b6a348641eb2cea5a7425b9076c8318af8ef392178f249231384b631a96fefbb0d9215e392980fd44552238ea61e956cff0f067c4e198c059730a6255a0c043012175b209059894fb40adfaf453b8b70dca6", 0x68}], 0x3, &(0x7f0000000400)=[{0x1010, 0x1, 0x9, "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"}, {0x38, 0x1, 0x8, "f807133a15cccefc748cc36ad541fe1fd00251b994f9711e78ae877ba53abc0a7d1e"}, {0xe8, 0x1, 0x40, "c8333d69969ba8e60bd5e2525565572e8773dc0e680fe636d1bdaf95e5202a4b8a23194636bae4efc8f8ed59a0506b7649e0a8ac7ba52391d10bf585a8c8bab9ba3c05b853135b4e385d8704a277561759981b6227ce706292d12937acedf61bbf37b2fa891276b962a7728dd91343f873266099bd3bf2a7799a2b803768be93124c1cdb7a7b6537be61f8326ab38b41cf45beb5c85d72ce27a3f289b341bc3fe28b124110a0cb114decee5716b6020d5426afd4bec1e636bf20cd58a4b8776cbded5a1b41c2c9ba53805acd5c2f9602f0"}, {0x20, 0xa97dc59562837edb, 0x0, "66083d537f32fd9edcf96b"}, {0xa8, 0x119, 0x5, "399d53d0399d03ad6e7b10168d4209db624e85285ebea0845a9d6dd634c8e00e1e9b984226524558a35ee976fc1d7fed17a2fe142a423adb74979dce50c5ca8f5ea346765f025e6b956ddb59de6e033a762bb7a921f8c8cae762edee45fd55609731a4f3e9662bb87ba9de4aa460c2ccf75290266db50b3cd46899d0589294086e2dae34ebb6ac5a4f9e9832e8b06944ce4960856eba"}, {0x108, 0x109, 0x400, "4b2da6ae7baca7948421be2f70d0334d0902a7dad05fa70c2d87ab9f520d0ff9a6bc1189e07f87df53bfdd190ce592349bf1fe2cae2858dee13169089da5bbae62722f0df8e1c4bcb14fb93133325ea7d99f12068391f3f0e0bde9eb4129144181ef66a6a127343abeeb0bef7a11cbae7a2e913a5f09e98aadac54a225a519078b03606ff039c6e3a75cd9facb0b8e737b9214b92a19e2fa02db1ab91f16860152b8cae326b7c79fdf6ddecd6f96cde0183740e77d7b0df211131616e8eb21878bf9874fc1a65a4f7934b5228266ecfc3f18afc9ccb8801dd3d766be816f2adcde8861e41d4af05dffb424f372d8cbc3521c772dd90f4daa"}, {0x48, 0x110, 0x1f, "91643fc191c930ed7d293f88d5549a660436804f1eeb9b7b564ad3f801be6b947804070b95034847e3524d972170601fb9fb"}, {0x38, 0x105, 0x395, "436a99582f5fc19d7443b525791f37139a3190052b4c7748f21ffeefe8fabc1aa7c7b5f80d45"}], 0x1380}}, {{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001780)="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", 0xfe}, {&(0x7f0000001880)="3604bfc18297149f1973bc58bff2830d7ce0711f1b1dd21bd891aa1ae64b1731836b", 0x22}], 0x2, &(0x7f0000001900)=[{0x18, 0x118, 0x8, "e7b9ef4a4e0053"}, {0x90, 0x115, 0x4900, "bfebffbf6f6c2660a822419c76cbff746fd2c68d32dd71390e430852b206b44b9ac622d0e8d4b6973457cac6fd39cbd9736d23487fb62aa854964a33899104001aa93b691bf11f5eba2103f39ac370d884a5d6da5be6989ff5d99a73808ce24fa64aaff9f69837b6ce9d2bdb3c38535e0929e9bfd0b47da15833"}], 0xa8}}, {{&(0x7f00000019c0)=@generic={0x9, "5185b00bd0d064f3c14b43f3a8d3f3c9f694739edb2853c714b1431d0de147d125e5b401770c1668c44051a966c8613d166572b20806e15cc10974bcc605cbbd7e2d8ccbab6b145c6c63c723f46f5439879f20341dbb033b11401a2eec4190d8178b2cb7fadcdd1e61f2baffaaaeea2d36cc3a2034031622498107f002e4"}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001a40)="05c23a6532ca698c95ba2187a1f8", 0xe}, {&(0x7f0000001a80)="d4814898401eb0800c06ac255b8670c8ae064e75a7a1829449fc887829889676b8b29e98c808e5159c1fca4eee0615ada452a1f5c42c2ab2ddfa5686b59e9bdb58b4156ebab18d43dcf970b07e10d60ad0b8cc7ad67950f7173717299b24e0203adf6ff54b9f89a96012616fd905d1ac3af1c0b1dd89d5471a99112b2076e1901319a4e83130d110ce9b8697e8ef54fb98a92c3d8615e8b127d65dc25c698b6f88", 0xa1}], 0x2, &(0x7f0000001b80)=[{0x1010, 0x367d8b61976b2fc3, 0xfff, "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"}, {0x70, 0x10b, 0x8, "37b3d50ca4c7511274e07ee4feaeaa0dbdc0241deac9ca5bcdb28b3ff86b178895cf54fb8cc64829c2f218ca8537980bea0c498bf3879aee3a96cacf2d2f29b9681f0f6c6443b7413ec7c735f398c4f87dbb7d2e8628656446a451f2a1f140"}, {0xa0, 0x0, 0xffffffff, "5cc8f07f23f29778efe4d150811a977163eb75cad9d6079039d570260c680f71c606f0ab9a1a3f1eae0e895b8299ba7c492376fb0e27f17ee7d6fbfc88e6181a9cff56359c113fecbbe296d36c28e2434b61417abc42e79152b7ec18b6ea1ba8af836f952928a8bb0aa1b57c2d43b90ef9e0acc8cbe1d60a19e35930c0ce4a1fb195288296a4c58f45c462a3c2641495"}, {0x88, 0x1, 0x400, "bbfe07f1a339cb8499f0743004eacef6c4de1122ce7fce843d10fe44acae2837729fbaddb54991f9d87a1f0a8f1760fc5f50a59eefd1352eb81e120fcdfb9b3e41b6a0c9c15fb0dc184cb541ffcdeab03e81645d1c0973e873dc2f64ccbfbc357199994297016cda410c082963a676be202971"}, {0x78, 0x10c, 0x1, "e1c5201000a44ccc8183c0bd4ac1cbb65864a22e8f44e80e3db228afea09d3d36241d24a7f3ae0f6697620eb8597a2a9d9e182c7acd498e66eb5140bfd2572389ddad058af9ce08a85af09642a09acec6a19dc3024b07200123cdeb26ca06e3a36b68c3880d4"}, {0x20, 0x116, 0x1000, "734925d39ba8901c6f5cd032cdb96984"}, {0x48, 0x1, 0x34, "e04e708294255df05c379615757062cf02723a7092ab9bc28af0292f424ca956dd553d2cc5a5d46d06a108d6157e3d759c34ea"}, {0x40, 0x101, 0xfffffffffffffe19, "869ad0d7ba652b2086c81049ede79ddd60778369160c72b10251f545db000821938199ef88e9aa86ffcc674bced7"}], 0x12c8}}, {{&(0x7f0000002e80)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000004100)=[{&(0x7f0000002f00)="a340f6d6262de3b06db8a7aaefdfe39751b0efe60429ebc5c4c8e5e5d182b0d572a6c173e2878f5091c8fab0e38184485c18122c3d5e9b4cd3aa8b22fdd1284337a5932fefbcea2882ab21d9ca3452ee7125d33d00103d253f89023d8cc0e4c7182d8a4d87df8ce9443fe8bb1a8f4bee0c087923aacfdadce66e45aeb9b4c32d1bc6926c430ca5256649aa00f0da2fb2e4a6f3f0233502d54b", 0x99}, {&(0x7f0000002fc0)="46533fc5f8dff7f92a1af67a336017f0cda9372822f87221bf2b4745a9fe052dd4ec2888aba6c00b40f979ee7e0e13a0ad9e0e802ca64e68201c347773d9e71f8db9b483b96b36ced5a78854e403368f1473c3c4a985453291c5469db1211c25baaa1c955fd0d25211d331eede5b928eace8da35cfd2f815e835fadf4babfa5e4ab8a042472ec83c9b4529b9af7507674a2e9eba495a199ea247534f0cc6399349261885b43659", 0xa7}, {&(0x7f0000003080)="c141c391cbb4947eaae30274c1d606559eb04892acc62696b6d5ae2e6f9409b669a2c76e1946269afd97efc81794215a42cebb8fbf229c11f9c20ff88e10c654a9bb5fae1a1946a023784127c3b7df7caa7ff6bff946e07b60dfbb48d0fd9d0fa01bb17c3526", 0x66}, {&(0x7f0000003100)="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", 0x1000}], 0x4, &(0x7f0000004140)=[{0x108, 0x116, 0x8, "316768328c661e8a4fd0858b51c1f2b47a9d036b5d644f8c4c85715e167eef5ad545b4c3bdb946d616ad3269c0002e3b177d65386b42f466b686aad4d3665c725f7c3caad1cfa75c9cfcc17d603673a8e707df64fc06ce066f999a4afe355bf50179484b448dd8a0cc908b8ecad56b4ef4ebe7e4862d404042c671dea0e778d02fd407c30343f9e2f9e309727e699939b084481a12764436436974fe601c4f1bc683c2d3503aa226da05d19aa070221dd29ecf6deea44ba57406955b7eef3aa6ee9a7f14e77d72ac6f1c2598b37f71b12df36fce655778bda78734529ebb9cae1726691124cd0ab733def1bd738c7e5e4873fa754328"}, {0x98, 0x102, 0x0, "20f33565650a6f4ab5a885318131648a0f5a927e7a6e11efa7b48d86c035b639636f752b0b219ce180973c1e0012bbe22b26c4321514f6ef843d9d1a5713901142bddd3844d8aeb12ae4c86d1cb04ae0a71a157cbff72338a05531dfb7f4901574e7ab35ab340555559f26b6b3acc4787fe2eead3ec7be5d355e907e99c5df6a2d3e28a25971"}, {0x40, 0x111, 0xffffffff, "671776635a0e0e4d708c6c88eba882cbd2a5d429fb370b4b0e3161816187e315ec34a7d703c9bf78ce2042d2a6e4"}, {0xf8, 0x101, 0x8001, "8e0a441d14707b06c8416b90bbe3eb209f494142a26e9fee52c559592ed3b0b11206c96070e2733a2da40995cafad5bc3f286fa5b149828d4bc1b00b5e2767ac9d93b0560a951c9aa1678d9ec012a68306b8a547228794f53f61c42e8b2e30ba77f34752852f9e00fefb985582472c6dd3efa0657ce748309c5a63bc7466a4065015fbf9a50b1b95810b17d8c74eb16a1fcec2ccc140110f8248082516ae8771dabc3179e7449012eb1693108491a2db1185cc319b1e4ec497b26bf80d9573e390fa3e99f41b82aba3610d9c66d9c1a8bdc994ac62af81aaa3c14832016aaa4a3209ccbf5f51"}, {0x1010, 0x109, 0x4, "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"}, {0xb0, 0x84, 0x6, "4b43a4538e59d0f63b425ee87a58c3bace06c59573b3b61264402f64745ac64e413280c159eded19788e5daec7ae99d636a6c29e77903d6bf762f9a8a08ef8131bb4960f82f86a18189db3005c364475a18022241b35f49227aa095ce12eaea06f61371d681de8d53edc6e96822ff5a27e92900decf5aa1cb8b17e163d7249b26d30fc0fec057555cd1b7c2275e3779e278a16a75b3541d92fd965e083"}, {0x58, 0x116, 0x3f, "78e8b8ad77a64b9b3623008fefacb7556645459daa4ccb1670c67690702a433a45300ccbad6767ce5faa6c22f81980e29ac26dda0e7cfaeaa25ae975f307a550f7d2"}], 0x13f0}}, {{&(0x7f00000055c0)=@xdp={0x2c, 0x0, r1, 0x1b}, 0x80, &(0x7f00000056c0)=[{&(0x7f0000005640)="8e56a286f11d9e04c26623591f1d16d9a7e8156fbc67c1f96a8eb19d279725ec314060998c3506619755c8e4660cab187f37f94bcba1", 0x36}, {&(0x7f0000005680)="a5da3d323833c97be3b4b9725a370a5c8b79d5a464885471e15ea3389cc2dc8f0ec192e94ecedca550563734f8122a13", 0x30}], 0x2, &(0x7f0000005700)=[{0x108, 0x1, 0xd2, "4b647ba1a92c00f1fd3dc445958d7b964d4ab53d94ba2d984f607dde0df1db1a3cdd7bd6fb3357515b17d08a4d39e92af2df5b20b2e8bd9a54b9a50c2a60088fde735b4e39f803ec4c3ee8267b6585f7866d2733d96ba48306c0cdd9c4dff22b8fbed045e3baf222d1ef2df82bf052c8eb4fe67ecdfc1d201260bb88f15b94354836f3950591ef83e3630752c777b793ff34dfe1ebcb80f388c6ae2e7cafcd7a0b8ec26dc2f9defa82ca5c5db86728b238d1d8bc560e08d612def330ab6326fd64c50e17186c5c8b9a1308893a01a8b63fffa02225868feddf46da722bbf7584d4569f30cc63fe347f90b43f461e91607dab95d45605"}, {0xa0, 0x104, 0x8, "bf606c4511fb9ff9a5f431c524f74aebd3cd810b3e3f21bd3e5cf5a0beed351c73a969fe4b4d17b398b067fd31de69271f90dd5e9efb16694ce382c1d9e62f6797cb6241923d1b05a570939614a3ac90fd325d06ec5b25edad0804f0673db9d8cfa9f49d2342c6701ad9d3db4afc39c26ac9b649e6ec3ef034fc00c992d9aed51a46def13e58d8087e628b48733669"}, {0x50, 0x108, 0x1, "a6d849a94cf071c482aa6ffb55715bf6c32dcdf7bbf92a1734496a382f90ba125fdc1c8dca38c6e4239cda2cc1314916ad2709b009c61f3f179cfe83f3"}, {0xd8, 0x109, 0x1, "587b75c2e7f5c677c57b36e86164495e79463b79f84fea7ad8dc67a624fcaedf8aca0c5d33fbed2b893620a17f0df0b2f056b6352a78074a12242b2b11f098ba8103735c4871785487ba3fa95a31476d27cf35e2d4efb1a0080a92c6a1697b2c04ae9f9ef18749e545f134d8f80edf4192aa5b9c879ff5f5bedc38db1951dda3dc62aefeb0195c17ebebcd4a86f4b84f26195e3232de705fc07b57b2e83bd754ff47458d441a438f4b4bcc8b16ccc2d9c8faa1fea32715735d38089772d43ef8e053"}], 0x2d0}}, {{0x0, 0x0, &(0x7f0000005b00)=[{&(0x7f0000005a00)="8ae4c07024b176684befd1a3d4c116dffc84fba7bb9aec56a6f319af1bea82dde34e0a15b8bb8a8ecf728258f9be4f6a280ee392a2655b55874e909389843637b44bdbd5286e0c95c28d5a56adb375baff8c2a65651031c3690709a83bf12de4fca239c45e8b2560185ca3c8b34204c43d672a514de233ee17b665ce4e96d492e4262db56512984ffa81a49681ce006534cd95b2d419a6cc427d6f65af38eee61f99bed20dbffadbaab04474f4f7244ec586d6b493a59d9ea2fff06d9726999be9f0a25dd2633cb0715e6dec3ed1d69b73e08b8b38bc112bf98f18aa7f4a91090f", 0xe1}], 0x1, &(0x7f0000005b40)=[{0xa0, 0x119, 0xffffffffffffffdd, "73ce0da57145335aa52b3b343cbf2cbbe3f0ce1c3a1f643c2a3e5a1929b8dad5ea8fd527addd8a45123f8df5e59b3231b8d05f45a4f45d56205d3c009c5adab7d9e4189cee6790a5d5ad63c1b1d2c6cecdb45657c80b673b2606a884b77ec2dd10fef527c699328f403288b0c709a939e7cc83e55e8f27650dd43f3938f6048dc1193003fd257048fdf38865fafd58"}, {0x60, 0x109, 0x9, "8b153a58160267bc666786230b67d5f1ca6f438c8b4846c6e16bb6f6161d771f137df667b59ab2c6c2873fe2cebb9e85a6b70d786fe222ad84e62756c184578df558341ae59f70acc015"}, {0x70, 0x10a, 0x81, "b7255e56b389e6bc802938fb2e72ed9a30ea9a13a2ee1af10b7f68a6837a976cd241c981a8a606b35087c60500c7c2d432b5eb981bcce86e17c2419ed93d0a3285cfc5c0b8d95c1c662db05f7071bfd356faf2ac0f8248817b485c9e66"}], 0x170}}], 0x7, 0x800) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r2, r2, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r2, 0x0, 0x80b0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x480, 0x0) 11:52:28 executing program 4 (fault-call:4 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:28 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3c000000}}}}}, &(0x7f0000000100)) 11:52:28 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x8, &(0x7f0000000000)=[{0x5, 0x101, 0x3, 0x2}, {0x4, 0x2, 0x7fffffff, 0x47}, {0x6f, 0x9, 0x5}, {0x3, 0x4, 0x3, 0x4}, {0xff, 0x2, 0x1, 0x1000}, {0x6, 0x0, 0x5, 0xd06e}, {0x2, 0x8, 0x8, 0x80000000}, {0x9, 0x3, 0x2}]}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) open_by_handle_at(r0, &(0x7f00000000c0)={0x74, 0x1, "b56a94212588160a33d174fbd9ece72a18ebf76f8e9021064f585c3aab50ef29c5f56e5fe86dce9fdc3a789e4baac8339f0cc57bdb092143a64c4312182d912640781bf009655f0a1a2597139be4732d38454a74dd9e705df40f4be0749c0ce684daabe9c615832914d5f287"}, 0xa379e52f871d6f93) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) [ 931.070670][T16991] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 931.078635][T16991] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 931.086599][T16991] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 931.098163][T16991] ERROR: Out of memory at tomoyo_realpath_from_path. 11:52:28 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}}}}, &(0x7f0000000100)) 11:52:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfsA', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:29 executing program 0 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:29 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x40000000}}}}}, &(0x7f0000000100)) 11:52:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x11, 0x6, 0x0, 0x0) 11:52:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7, 0x14500) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000080)=""/161) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.sched_load_balance\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs%', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:29 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x43050000}}}}}, &(0x7f0000000100)) 11:52:29 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000080)={0x7, 0x400, 0x1, 0x6, 0x2, [{0x101, 0x4, 0xff, 0x0, 0x0, 0x400}, {0x5, 0x8, 0x3ff, 0x0, 0x0, 0x2000}]}) 11:52:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x88, 0x6, 0x0, 0x0) [ 931.475520][T17025] FAULT_INJECTION: forcing a failure. [ 931.475520][T17025] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 931.488933][T17025] CPU: 0 PID: 17025 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 931.496819][T17025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 931.506869][T17025] Call Trace: [ 931.506888][T17025] dump_stack+0x1d8/0x2f8 [ 931.506902][T17025] should_fail+0x555/0x770 [ 931.506916][T17025] should_fail_alloc_page+0x55/0x60 11:52:29 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x60000000}}}}}, &(0x7f0000000100)) 11:52:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x2, 0x0, 0x0) [ 931.506930][T17025] prepare_alloc_pages+0x283/0x470 [ 931.529477][T17025] __alloc_pages_nodemask+0xb2/0x5d0 [ 931.529495][T17025] kmem_getpages+0x56/0xa20 [ 931.539341][T17025] ? check_preemption_disabled+0x47/0x2a0 [ 931.545150][T17025] cache_grow_begin+0x7e/0x2c0 [ 931.545165][T17025] cache_alloc_refill+0x311/0x3f0 [ 931.555189][T17025] ? check_preemption_disabled+0xb7/0x2a0 [ 931.560912][T17025] __kmalloc+0x318/0x340 [ 931.565149][T17025] ? tomoyo_realpath_from_path+0xdc/0x7c0 11:52:29 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='\x91r\xb4C\xb7wr\x8da&cgQ\xb1>\xa6\xedv\xae\x1e\xbe\x03\xde\xe4\x82\xf9\x10S\xffY\x19\x8e\xb4\xf7\xee\xc6\nyi}\x18Y\xc2\"3\x01gw\xf703\x00\x92Bf\x8dU\xb2f\xb5!', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(r0, r0, 0x0, 0x80b0) [ 931.565162][T17025] tomoyo_realpath_from_path+0xdc/0x7c0 [ 931.565176][T17025] tomoyo_mount_permission+0x294/0xa30 [ 931.581937][T17025] ? path_lookupat+0x474/0xb30 [ 931.586698][T17025] ? kmem_cache_free+0xd8/0xf0 [ 931.586721][T17025] tomoyo_sb_mount+0x35/0x40 [ 931.586731][T17025] security_sb_mount+0x84/0xe0 [ 931.586745][T17025] do_mount+0x107/0x2490 [ 931.586752][T17025] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 931.586764][T17025] ? copy_mount_options+0x5f/0x3c0 [ 931.613966][T17025] ? copy_mount_options+0x308/0x3c0 [ 931.613978][T17025] ksys_mount+0xcc/0x100 [ 931.624247][T17025] __x64_sys_mount+0xbf/0xd0 [ 931.633043][T17025] do_syscall_64+0xfe/0x140 [ 931.637571][T17025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 931.643453][T17025] RIP: 0033:0x45c27a [ 931.643463][T17025] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 931.643468][T17025] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 931.643477][T17025] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 931.643482][T17025] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 931.643487][T17025] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 931.643498][T17025] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 931.666958][T17025] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfsH', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x6) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:29 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x6c000000}}}}}, &(0x7f0000000100)) 11:52:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x3, 0x0, 0x0) 11:52:29 executing program 0 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfsH', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:29 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x80040200}}}}}, &(0x7f0000000100)) [ 932.029756][T17062] FAULT_INJECTION: forcing a failure. [ 932.029756][T17062] name failslab, interval 1, probability 0, space 0, times 0 [ 932.053130][T17062] CPU: 1 PID: 17062 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 932.061058][T17062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 932.071128][T17062] Call Trace: [ 932.074508][T17062] dump_stack+0x1d8/0x2f8 [ 932.078846][T17062] should_fail+0x555/0x770 [ 932.083280][T17062] __should_failslab+0x11a/0x160 [ 932.088215][T17062] ? getname_kernel+0x59/0x2f0 [ 932.092975][T17062] should_failslab+0x9/0x20 [ 932.097502][T17062] kmem_cache_alloc+0x56/0x2e0 [ 932.102262][T17062] getname_kernel+0x59/0x2f0 [ 932.106848][T17062] kern_path+0x1f/0x40 [ 932.110908][T17062] tomoyo_mount_permission+0x7f1/0xa30 [ 932.116370][T17062] ? kmem_cache_free+0xd8/0xf0 [ 932.121147][T17062] tomoyo_sb_mount+0x35/0x40 [ 932.125826][T17062] security_sb_mount+0x84/0xe0 [ 932.130765][T17062] do_mount+0x107/0x2490 [ 932.135004][T17062] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 932.140544][T17062] ? copy_mount_options+0x5f/0x3c0 [ 932.145653][T17062] ? copy_mount_options+0x308/0x3c0 [ 932.150848][T17062] ksys_mount+0xcc/0x100 [ 932.155084][T17062] __x64_sys_mount+0xbf/0xd0 [ 932.159667][T17062] do_syscall_64+0xfe/0x140 [ 932.164253][T17062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 932.170161][T17062] RIP: 0033:0x45c27a [ 932.174048][T17062] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 932.193740][T17062] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 932.202169][T17062] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 932.210131][T17062] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 932.218185][T17062] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 11:52:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x4, 0x0, 0x0) 11:52:29 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x8, 0x218200) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x38b) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000000)) sendfile(r2, r2, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r2, 0x0, 0x80b0) [ 932.226158][T17062] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 932.234340][T17062] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x5, 0x0, 0x0) 11:52:29 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x800e0000}}}}}, &(0x7f0000000100)) 11:52:29 executing program 0 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 932.410590][T17091] FAULT_INJECTION: forcing a failure. [ 932.410590][T17091] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 932.423946][T17091] CPU: 0 PID: 17091 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 932.431833][T17091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 932.442236][T17091] Call Trace: [ 932.445525][T17091] dump_stack+0x1d8/0x2f8 [ 932.449856][T17091] should_fail+0x555/0x770 [ 932.454269][T17091] should_fail_alloc_page+0x55/0x60 [ 932.459643][T17091] prepare_alloc_pages+0x283/0x470 [ 932.464847][T17091] __alloc_pages_nodemask+0xb2/0x5d0 [ 932.470227][T17091] kmem_getpages+0x56/0xa20 [ 932.474722][T17091] ? trace_lock_release+0x135/0x1a0 [ 932.479922][T17091] cache_grow_begin+0x7e/0x2c0 [ 932.484684][T17091] cache_alloc_refill+0x311/0x3f0 [ 932.489699][T17091] ? check_preemption_disabled+0xb7/0x2a0 [ 932.495421][T17091] kmem_cache_alloc+0x2b9/0x2e0 [ 932.500274][T17091] ? getname_flags+0xba/0x640 [ 932.504944][T17091] getname_flags+0xba/0x640 [ 932.509796][T17091] user_path_at_empty+0x2d/0x50 [ 932.514651][T17091] do_mount+0xd4/0x2490 [ 932.514664][T17091] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 932.514672][T17091] ? copy_mount_options+0x5f/0x3c0 [ 932.514684][T17091] ? __kasan_check_read+0x11/0x20 [ 932.524347][T17091] ? copy_mount_options+0x308/0x3c0 [ 932.524359][T17091] ksys_mount+0xcc/0x100 [ 932.524370][T17091] __x64_sys_mount+0xbf/0xd0 [ 932.524385][T17091] do_syscall_64+0xfe/0x140 [ 932.534490][T17091] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 932.534500][T17091] RIP: 0033:0x45c27a [ 932.534509][T17091] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 932.534518][T17091] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 932.543908][T17091] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 932.552955][T17091] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 932.552961][T17091] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 932.552966][T17091] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 932.552971][T17091] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfsL', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:30 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r1, 0x0, 0x9a98) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:30 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x80350000}}}}}, &(0x7f0000000100)) 11:52:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x8, 0x0, 0x0) 11:52:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfsL', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:30 executing program 0 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:30 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x81000000}}}}}, &(0x7f0000000100)) 11:52:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0xb, 0x0, 0x0) 11:52:30 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) r1 = open(&(0x7f0000000000)='./file0\x00', 0xc100, 0x4) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000080)={{0x100000000, 0x8, 0xffffffffdffffffc, 0x100}, 'syz0\x00', 0x22}) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x1000, 0x48880) 11:52:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x10, 0x0, 0x0) 11:52:30 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x84ffffff}}}}}, &(0x7f0000000100)) [ 932.841605][T17114] FAULT_INJECTION: forcing a failure. [ 932.841605][T17114] name failslab, interval 1, probability 0, space 0, times 0 [ 932.855096][T17114] CPU: 0 PID: 17114 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 932.862993][T17114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 932.873310][T17114] Call Trace: [ 932.873327][T17114] dump_stack+0x1d8/0x2f8 [ 932.873343][T17114] should_fail+0x555/0x770 [ 932.873357][T17114] __should_failslab+0x11a/0x160 [ 932.890376][T17114] ? vfs_parse_fs_string+0xed/0x1a0 [ 932.895556][T17114] should_failslab+0x9/0x20 [ 932.895567][T17114] __kmalloc_track_caller+0x79/0x340 [ 932.895582][T17114] kmemdup_nul+0x2a/0xa0 [ 932.895590][T17114] vfs_parse_fs_string+0xed/0x1a0 [ 932.895605][T17114] do_mount+0x11a6/0x2490 [ 932.918895][T17114] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 932.924442][T17114] ? copy_mount_options+0x5f/0x3c0 [ 932.929553][T17114] ? copy_mount_options+0x308/0x3c0 [ 932.929566][T17114] ksys_mount+0xcc/0x100 11:52:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) socket$tipc(0x1e, 0x2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='vegas\x00', 0x6) perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x70, 0x7fffffff, 0x80, 0x6, 0xfffffffffffffc01, 0x0, 0x100000000, 0x14, 0x8, 0x2, 0x8, 0xc8, 0x9, 0x7e, 0x15, 0x2, 0x400, 0x7, 0x7b50, 0x9, 0x3, 0x101, 0xff, 0x5, 0x40000000000000, 0x4, 0x0, 0x91, 0x1000, 0x3, 0x843, 0x401, 0xe6a, 0x3f, 0x6, 0x81, 0x400000000000000, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x8, 0x1, 0x1, 0x8, 0x8, 0xff, 0x6}, r0, 0xe, r0, 0x1) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000)=0x9, 0x2) r1 = openat$cgroup_int(r0, &(0x7f0000000440)='hugetlR.\xff\xa42M\x1f.failcnt\x00\b\x02\xb1]\xa8w\xb3\xd0\x03\x01\x00F\x024ql\xef\xff\x01\x00\x00\x00\x00\x00\x00.\xfd4mQ\x8077\xff{\x9e2\xc5\x88[\x04@\xb3\x80]\x19\x9a\x01\xfdMcG\xe7d\xb6\xc9\x00\xa7?\f\xba\xd9\xca\xf9eM\xe0\xdc\xcc{\xc5\xb2\xc65\x97\xcc\xd1$\x1d\xa0%\xd7\x91\x89@\x9a\xa9\xb9u\x9e\xc5\xc8GT\x9e<;\xa8do>:\x14xbK\xd4K\x89\x03\xce\xeb\x89I\xd1\x92\xf7J\x1fm\x84\xd0\xaaX\x9d\xcd\xc5\xea\xf0:k\xb3\xa8\xa7\xf4b\xca\xebB\xe6m\xb5\x1c\x9a\x8f\xbf=k\x86t\x85\xedl/\xd9d7\x18\xde\x94\xc58RCP\x9f\xdb\xb5\xdc\x8d\xf3\xf4ON\xf81N\xf5\x1e\xba\x8c_\xf9r\xc2-\xa4~[w)\xaa9\xfd\xc5\x99\x8c\xdcM', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000001c0)=""/114, &(0x7f0000000240)=0x72) [ 932.929578][T17114] __x64_sys_mount+0xbf/0xd0 [ 932.938992][T17114] do_syscall_64+0xfe/0x140 [ 932.939006][T17114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 932.939017][T17114] RIP: 0033:0x45c27a [ 932.948232][T17114] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 932.948237][T17114] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 932.948247][T17114] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 932.948253][T17114] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 932.948258][T17114] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 932.948262][T17114] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 932.948267][T17114] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\\', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x11, 0x0, 0x0) 11:52:30 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x86ddffff}}}}}, &(0x7f0000000100)) 11:52:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='\xb5\xc3\xdc\xe4p\xab+.D\x03\x9d\xed\xeebV\xab\xbf\xb9v\x94\xdbm\xb5\b+\xc7\x10\xe6$9|\x9f1\x04\xfa\xa9\xeb\xce\xf9$\xb2\xc2\xdb\xa4R0G\xae\xbeY\xd2=\x14', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, r2, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x24008014) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080)=0x9, 0x4) 11:52:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs[', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:30 executing program 0 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000340)={0xc0000000, 0x8c27834131bac2e1, 'client1\x00', 0x457b5cd1b748390b, "126d09672cebc0a9", "f74980cc6812dcdcf2acdf81ec7e2b264881a8f2867fee541da3216c705a280d", 0x1ff, 0x8001}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000440)={0x3c6, 0xd299, 0x80000001, 0x80, 0x7, 0x3}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000004c0)={0x1, 0x4, 0x4, 0x20, {0x77359400}, {0x5, 0x8, 0x1, 0x1, 0x8b, 0xd3, '\"k\"k'}, 0x5, 0x2, @fd, 0x4}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="04010000", @ANYRES16=r2, @ANYBLOB="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"], 0x104}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) sendfile(r1, r1, 0x0, 0x7ffffffe) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000400)={0x7, 0xfffd}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000300)=0x28, 0x4) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000480)=0x1, 0x8) fcntl$setown(r1, 0x8, r3) sendfile(0xffffffffffffffff, r1, 0x0, 0xb0) 11:52:30 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x88470000}}}}}, &(0x7f0000000100)) [ 933.318344][T17140] FAULT_INJECTION: forcing a failure. [ 933.318344][T17140] name failslab, interval 1, probability 0, space 0, times 0 [ 933.385922][T17140] CPU: 0 PID: 17140 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 933.393851][T17140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 933.397186][T17156] EXT4-fs warning (device sda1): verify_group_input:105: Cannot add at group 966 (only 16 groups) [ 933.419035][T17140] Call Trace: 11:52:31 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x88480000}}}}}, &(0x7f0000000100)) 11:52:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x12, 0x0, 0x0) 11:52:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x1) r2 = shmget(0x0, 0x2000, 0x400, &(0x7f0000ffb000/0x2000)=nil) shmat(r2, &(0x7f0000ff1000/0x2000)=nil, 0x2000) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000000)={0x3, 0x7f}) [ 933.419056][T17140] dump_stack+0x1d8/0x2f8 [ 933.419069][T17140] should_fail+0x555/0x770 [ 933.419083][T17140] __should_failslab+0x11a/0x160 [ 933.419096][T17140] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 933.419107][T17140] should_failslab+0x9/0x20 [ 933.419117][T17140] __kmalloc+0x7a/0x340 [ 933.419130][T17140] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 933.419142][T17140] tomoyo_realpath_from_path+0xdc/0x7c0 [ 933.419157][T17140] tomoyo_mount_permission+0x923/0xa30 [ 933.419176][T17140] ? kmem_cache_free+0xd8/0xf0 [ 933.419196][T17140] tomoyo_sb_mount+0x35/0x40 [ 933.419205][T17140] security_sb_mount+0x84/0xe0 [ 933.419219][T17140] do_mount+0x107/0x2490 [ 933.496688][T17140] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 933.502229][T17140] ? copy_mount_options+0x5f/0x3c0 [ 933.507337][T17140] ? copy_mount_options+0x308/0x3c0 [ 933.512526][T17140] ksys_mount+0xcc/0x100 [ 933.516764][T17140] __x64_sys_mount+0xbf/0xd0 [ 933.521347][T17140] do_syscall_64+0xfe/0x140 [ 933.525840][T17140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 933.531724][T17140] RIP: 0033:0x45c27a [ 933.535611][T17140] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 933.555317][T17140] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 933.563811][T17140] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 933.571776][T17140] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 933.579740][T17140] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 933.587700][T17140] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 933.598497][T17140] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 933.606870][T17140] ERROR: Out of memory at tomoyo_realpath_from_path. 11:52:31 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x88640000}}}}}, &(0x7f0000000100)) 11:52:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfsh', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:31 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) 11:52:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x13, 0x0, 0x0) 11:52:31 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff}}}}}, &(0x7f0000000100)) 11:52:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\\', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:31 executing program 0 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685, &(0x7f0000000180)={0x1, 0x3f, 0x1000, 0x6b, &(0x7f0000000000)="d8d96e64718d3a008e62b84f3797f59621124d5f5879e42b9a55888c106b6a4646cb0c26359e1782057715e33da68ec069829f91ce2a32ed0ec9817d357ed1daa58188424df699f9fcd785a59f33929d60ec0585154cb631c23f62875a21e14e1928d8be2109e4e8faba50", 0xa1, 0x0, &(0x7f00000000c0)="6507601e4c16d91634d4abffb0a6d1224349924a624964d5da2bc6c1391f1883acbec15df37af8bb8251d94c9178caed95c61cdde71a613faf75610565142163ba1da9d00b732c5bd9401320b6d4ad1a88f59d5fe5d1caa55f3bcf950275e8222fc55f8949e886914465d50e60905ed25ce2a7086d53ef311139f6806b5e3bbf6b32b5094c901f05d38c86ff32435f2311e964f7754b13654b178b77cffd8cfd37"}) 11:52:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x14, 0x0, 0x0) 11:52:31 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000100)) 11:52:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000001c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000080), r2, 0x421}}, 0x18) ioctl(r1, 0x7e4, &(0x7f0000000000)="1c4560666349045ae9bba0c9e156538f71a5171faed45cd459f47c1457ee9133d358f074f3555f9c870a") [ 933.963111][T17186] FAULT_INJECTION: forcing a failure. [ 933.963111][T17186] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 933.976438][T17186] CPU: 1 PID: 17186 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 933.984336][T17186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 933.994394][T17186] Call Trace: [ 933.997690][T17186] dump_stack+0x1d8/0x2f8 [ 934.002018][T17186] should_fail+0x555/0x770 [ 934.006426][T17186] should_fail_alloc_page+0x55/0x60 [ 934.011711][T17186] prepare_alloc_pages+0x283/0x470 [ 934.016820][T17186] __alloc_pages_nodemask+0xb2/0x5d0 [ 934.023137][T17186] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 934.029026][T17186] kmem_getpages+0x56/0xa20 [ 934.033533][T17186] cache_grow_begin+0x7e/0x2c0 [ 934.038288][T17186] cache_alloc_refill+0x311/0x3f0 [ 934.043301][T17186] ? check_preemption_disabled+0xb7/0x2a0 [ 934.049015][T17186] __kmalloc+0x318/0x340 [ 934.053336][T17186] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 934.059312][T17186] tomoyo_realpath_from_path+0xdc/0x7c0 [ 934.064852][T17186] tomoyo_mount_permission+0x923/0xa30 [ 934.070586][T17186] ? kmem_cache_free+0xd8/0xf0 [ 934.075353][T17186] tomoyo_sb_mount+0x35/0x40 [ 934.079934][T17186] security_sb_mount+0x84/0xe0 [ 934.084692][T17186] do_mount+0x107/0x2490 [ 934.088925][T17186] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 934.094542][T17186] ? copy_mount_options+0x5f/0x3c0 [ 934.099646][T17186] ? copy_mount_options+0x308/0x3c0 [ 934.104924][T17186] ksys_mount+0xcc/0x100 [ 934.109158][T17186] __x64_sys_mount+0xbf/0xd0 [ 934.113741][T17186] do_syscall_64+0xfe/0x140 [ 934.118242][T17186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 934.124121][T17186] RIP: 0033:0x45c27a [ 934.128008][T17186] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 934.147775][T17186] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 934.156230][T17186] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a 11:52:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x15, 0x0, 0x0) [ 934.164190][T17186] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 934.172147][T17186] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 934.180133][T17186] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 934.188092][T17186] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfsl', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:31 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x88ffffff}}}}}, &(0x7f0000000100)) 11:52:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x16, 0x0, 0x0) 11:52:31 executing program 0 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(r0, r1, 0x0, 0x80b4) 11:52:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs]', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x17, 0x0, 0x0) 11:52:32 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x89060000}}}}}, &(0x7f0000000100)) 11:52:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x5, 0x1, 0x8207, 0x7, 0xffffffffffff0001, 0xffffffffffffffe0, 0x7, 0x0, 0x0}, &(0x7f0000000080)=0x20) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000100)={0x7, 0xa, 0xf, 0x1c, 0x2, 0x5, 0x4, 0x5f, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000000c0)={r2, 0x5, 0x4, 0xfffffffffffffc00}, 0x10) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x18, 0x0, 0x0) 11:52:32 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x89ffffff}}}}}, &(0x7f0000000100)) 11:52:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x1f) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000000)={0x4, 0x2, 0x401, 0xffff, 0x3, 0x5}) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080)=0x4, 0x4) 11:52:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfst', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 934.613631][T17225] FAULT_INJECTION: forcing a failure. [ 934.613631][T17225] name failslab, interval 1, probability 0, space 0, times 0 [ 934.644107][T17225] CPU: 0 PID: 17225 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 934.652050][T17225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 934.662103][T17225] Call Trace: [ 934.665387][T17225] dump_stack+0x1d8/0x2f8 [ 934.670079][T17225] should_fail+0x555/0x770 [ 934.674496][T17225] __should_failslab+0x11a/0x160 [ 934.679431][T17225] ? getname_kernel+0x59/0x2f0 [ 934.684277][T17225] should_failslab+0x9/0x20 [ 934.688774][T17225] kmem_cache_alloc+0x56/0x2e0 [ 934.693628][T17225] getname_kernel+0x59/0x2f0 [ 934.698310][T17225] kern_path+0x1f/0x40 [ 934.702372][T17225] tomoyo_mount_permission+0x7f1/0xa30 [ 934.707831][T17225] ? kmem_cache_free+0xd8/0xf0 [ 934.712603][T17225] tomoyo_sb_mount+0x35/0x40 [ 934.717181][T17225] security_sb_mount+0x84/0xe0 [ 934.721942][T17225] do_mount+0x107/0x2490 [ 934.726181][T17225] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 934.731801][T17225] ? copy_mount_options+0x5f/0x3c0 [ 934.736999][T17225] ? copy_mount_options+0x308/0x3c0 [ 934.742203][T17225] ksys_mount+0xcc/0x100 [ 934.747316][T17225] __x64_sys_mount+0xbf/0xd0 [ 934.751909][T17225] do_syscall_64+0xfe/0x140 [ 934.756411][T17225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 934.762290][T17225] RIP: 0033:0x45c27a [ 934.766177][T17225] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 934.785782][T17225] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 934.794184][T17225] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 934.802353][T17225] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 11:52:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x19, 0x0, 0x0) [ 934.810325][T17225] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 934.818288][T17225] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 934.826248][T17225] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:32 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xe8030000}}}}}, &(0x7f0000000100)) 11:52:32 executing program 0 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000100)=0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000080)={'ah\x00'}, &(0x7f00000000c0)=0x1e) sendfile(0xffffffffffffffff, r1, 0x0, 0x2) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x400080, 0x0) 11:52:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs^', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:32 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xf0030000}}}}}, &(0x7f0000000100)) 11:52:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x1a, 0x0, 0x0) 11:52:32 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0xa, &(0x7f0000000080)=[{0x1, 0x7fffffff, 0x8, 0x7}, {0x6e67, 0x7fff, 0x7, 0x6}, {0x5d9a, 0xffffffffffffff81, 0x9, 0x7}, {0x80000001, 0xfffffffffffffbff, 0x6, 0xffff}, {0x62, 0xa53, 0x1, 0x1}, {0x100000001, 0x6, 0x1, 0x224}, {0x2, 0x5, 0x6, 0xff0d}, {0x0, 0x3ff, 0x7, 0x4}, {0x8, 0x1000, 0x1, 0xe323}, {0x10001, 0x7, 0x4, 0x4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) 11:52:32 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xf4010000}}}}}, &(0x7f0000000100)) 11:52:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x1b, 0x0, 0x0) 11:52:32 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xfdffffff}}}}}, &(0x7f0000000100)) 11:52:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfsz', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 935.122657][T17268] FAULT_INJECTION: forcing a failure. [ 935.122657][T17268] name failslab, interval 1, probability 0, space 0, times 0 [ 935.192926][T17268] CPU: 1 PID: 17268 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 935.200943][T17268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 935.210994][T17268] Call Trace: [ 935.214285][T17268] dump_stack+0x1d8/0x2f8 [ 935.218617][T17268] should_fail+0x555/0x770 [ 935.223211][T17268] __should_failslab+0x11a/0x160 [ 935.228152][T17268] ? tomoyo_encode2+0x273/0x5a0 [ 935.233521][T17268] should_failslab+0x9/0x20 [ 935.238020][T17268] __kmalloc+0x7a/0x340 [ 935.242274][T17268] tomoyo_encode2+0x273/0x5a0 [ 935.247039][T17268] tomoyo_realpath_from_path+0x769/0x7c0 [ 935.252668][T17268] tomoyo_mount_permission+0x923/0xa30 [ 935.258126][T17268] ? kmem_cache_free+0xd8/0xf0 [ 935.262897][T17268] tomoyo_sb_mount+0x35/0x40 [ 935.267483][T17268] security_sb_mount+0x84/0xe0 [ 935.272242][T17268] do_mount+0x107/0x2490 [ 935.276481][T17268] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 935.282014][T17268] ? copy_mount_options+0x5f/0x3c0 [ 935.287122][T17268] ? copy_mount_options+0x308/0x3c0 [ 935.292314][T17268] ksys_mount+0xcc/0x100 [ 935.296549][T17268] __x64_sys_mount+0xbf/0xd0 [ 935.301133][T17268] do_syscall_64+0xfe/0x140 [ 935.305630][T17268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.311528][T17268] RIP: 0033:0x45c27a [ 935.315411][T17268] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 935.335179][T17268] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 11:52:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x1c, 0x0, 0x0) 11:52:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={0x0, 0x200000000000000}, &(0x7f0000000140)=0x38e) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e21, 0xbb5, @dev={0xfe, 0x80, [], 0x28}, 0xa3c}}}, &(0x7f0000000240)=0x84) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000280)=""/64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r3}}, 0xc) [ 935.343760][T17268] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 935.351725][T17268] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 935.359961][T17268] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 935.367962][T17268] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 935.375924][T17268] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 935.483058][T17268] ERROR: Out of memory at tomoyo_realpath_from_path. 11:52:33 executing program 0 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:33 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x5) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) 11:52:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x1d, 0x0, 0x0) 11:52:33 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xfe030000}}}}}, &(0x7f0000000100)) 11:52:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs_', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:33 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}}}}}, &(0x7f0000000100)) 11:52:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x1e, 0x0, 0x0) 11:52:33 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r1 = semget(0x1, 0x0, 0x0) semctl$GETPID(r1, 0x1, 0xb, &(0x7f0000000000)=""/51) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) [ 935.734655][T17311] FAULT_INJECTION: forcing a failure. [ 935.734655][T17311] name failslab, interval 1, probability 0, space 0, times 0 [ 935.757927][T17311] CPU: 0 PID: 17311 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 935.766014][T17311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 935.766018][T17311] Call Trace: [ 935.766036][T17311] dump_stack+0x1d8/0x2f8 [ 935.766050][T17311] should_fail+0x555/0x770 [ 935.766065][T17311] __should_failslab+0x11a/0x160 [ 935.766078][T17311] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 935.766090][T17311] should_failslab+0x9/0x20 [ 935.766100][T17311] __kmalloc+0x7a/0x340 [ 935.766113][T17311] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 935.779525][T17311] tomoyo_realpath_from_path+0xdc/0x7c0 [ 935.788219][T17311] tomoyo_mount_permission+0x923/0xa30 [ 935.788240][T17311] ? kmem_cache_free+0xd8/0xf0 [ 935.788265][T17311] tomoyo_sb_mount+0x35/0x40 [ 935.788276][T17311] security_sb_mount+0x84/0xe0 [ 935.788291][T17311] do_mount+0x107/0x2490 [ 935.842945][T17311] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 935.848672][T17311] ? copy_mount_options+0x5f/0x3c0 [ 935.853956][T17311] ? copy_mount_options+0x308/0x3c0 [ 935.859153][T17311] ksys_mount+0xcc/0x100 [ 935.863500][T17311] __x64_sys_mount+0xbf/0xd0 [ 935.868092][T17311] do_syscall_64+0xfe/0x140 [ 935.872594][T17311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.878479][T17311] RIP: 0033:0x45c27a [ 935.882369][T17311] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 935.902153][T17311] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 935.910554][T17311] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 935.918514][T17311] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 935.926475][T17311] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 11:52:33 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xffff0000}}}}}, &(0x7f0000000100)) 11:52:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x21, 0x0, 0x0) 11:52:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) [ 935.934441][T17311] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 935.942411][T17311] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 935.964752][T17311] ERROR: Out of memory at tomoyo_realpath_from_path. 11:52:33 executing program 0 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs`', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x22, 0x0, 0x0) 11:52:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0xbf, 0xb5, 0x8004, 0x7, 0x2, 0x2, 0x6, 0x1, 0x0}, &(0x7f0000000080)=0x20) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000100)={0x1, 0x7, 0x1, 0x2, 'syz1\x00', 0xffffffff}) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x6, 0x6f, 0x820c, 0x1, 0x9, 0x80000001, 0x81, 0x2, r2}, 0x20) 11:52:33 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xffffa888}}}}}, &(0x7f0000000100)) 11:52:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x23, 0x0, 0x0) 11:52:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:33 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xffffca88}}}}}, &(0x7f0000000100)) [ 936.267802][T17347] FAULT_INJECTION: forcing a failure. [ 936.267802][T17347] name failslab, interval 1, probability 0, space 0, times 0 [ 936.281152][T17347] CPU: 0 PID: 17347 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 936.289051][T17347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 936.299103][T17347] Call Trace: [ 936.302397][T17347] dump_stack+0x1d8/0x2f8 [ 936.306732][T17347] should_fail+0x555/0x770 [ 936.311163][T17347] __should_failslab+0x11a/0x160 [ 936.316107][T17347] should_failslab+0x9/0x20 [ 936.320608][T17347] kmem_cache_alloc_trace+0x5d/0x2f0 [ 936.325893][T17347] ? btrfs_mount_root+0x12c/0x1050 [ 936.331007][T17347] btrfs_mount_root+0x12c/0x1050 [ 936.336059][T17347] ? vfs_parse_fs_string+0x13b/0x1a0 [ 936.341515][T17347] ? trace_kfree+0xa0/0x110 [ 936.346016][T17347] legacy_get_tree+0xf9/0x1a0 [ 936.350770][T17347] ? btrfs_control_open+0x40/0x40 [ 936.355874][T17347] vfs_get_tree+0x8f/0x380 [ 936.360284][T17347] vfs_kern_mount+0xc2/0x160 11:52:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(r0, r1, 0x0, 0x80b0) 11:52:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x2a, 0x0, 0x0) [ 936.364877][T17347] btrfs_mount+0x34f/0x18f0 [ 936.369474][T17347] ? legacy_parse_param+0x37b/0x880 [ 936.374668][T17347] ? cap_capable+0x250/0x290 [ 936.379349][T17347] legacy_get_tree+0xf9/0x1a0 [ 936.384024][T17347] ? btrfs_resize_thread_pool+0x290/0x290 [ 936.389731][T17347] vfs_get_tree+0x8f/0x380 [ 936.394233][T17347] do_mount+0x169d/0x2490 [ 936.398558][T17347] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 936.404206][T17347] ? copy_mount_options+0x5f/0x3c0 [ 936.409321][T17347] ? copy_mount_options+0x308/0x3c0 [ 936.414516][T17347] ksys_mount+0xcc/0x100 [ 936.418750][T17347] __x64_sys_mount+0xbf/0xd0 [ 936.423342][T17347] do_syscall_64+0xfe/0x140 [ 936.430379][T17347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 936.436269][T17347] RIP: 0033:0x45c27a [ 936.440157][T17347] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 936.459842][T17347] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 936.468380][T17347] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 936.476340][T17347] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 936.484303][T17347] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 936.492356][T17347] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 936.500408][T17347] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:34 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xffffdd86}}}}}, &(0x7f0000000100)) 11:52:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000080)=0x4) 11:52:34 executing program 0 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfsa', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x2b, 0x0, 0x0) 11:52:34 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xffffff84}}}}}, &(0x7f0000000100)) 11:52:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x4e21, @empty}, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e24, @multicast2}, 0x22d, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)='vxcan1\x00', 0x0, 0x9, 0x4}) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100)=0x3, 0x4) 11:52:34 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xffffff88}}}}}, &(0x7f0000000100)) [ 936.821064][T17378] FAULT_INJECTION: forcing a failure. [ 936.821064][T17378] name failslab, interval 1, probability 0, space 0, times 0 [ 936.847387][T17378] CPU: 1 PID: 17378 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 936.855445][T17378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 936.865597][T17378] Call Trace: [ 936.868922][T17378] dump_stack+0x1d8/0x2f8 [ 936.873340][T17378] should_fail+0x555/0x770 [ 936.877843][T17378] __should_failslab+0x11a/0x160 [ 936.882779][T17378] should_failslab+0x9/0x20 [ 936.887282][T17378] kmem_cache_alloc_trace+0x5d/0x2f0 [ 936.892566][T17378] ? btrfs_mount_root+0x1b2/0x1050 [ 936.897672][T17378] btrfs_mount_root+0x1b2/0x1050 [ 936.902611][T17378] ? vfs_parse_fs_string+0x13b/0x1a0 [ 936.907885][T17378] ? trace_kfree+0xa0/0x110 [ 936.912382][T17378] legacy_get_tree+0xf9/0x1a0 [ 936.917049][T17378] ? btrfs_control_open+0x40/0x40 [ 936.922070][T17378] vfs_get_tree+0x8f/0x380 [ 936.926478][T17378] vfs_kern_mount+0xc2/0x160 [ 936.931062][T17378] btrfs_mount+0x34f/0x18f0 [ 936.935654][T17378] ? legacy_parse_param+0x37b/0x880 [ 936.940845][T17378] ? cap_capable+0x250/0x290 [ 936.945435][T17378] legacy_get_tree+0xf9/0x1a0 [ 936.950102][T17378] ? btrfs_resize_thread_pool+0x290/0x290 [ 936.955818][T17378] vfs_get_tree+0x8f/0x380 [ 936.960320][T17378] do_mount+0x169d/0x2490 [ 936.964641][T17378] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 936.970173][T17378] ? copy_mount_options+0x5f/0x3c0 [ 936.975287][T17378] ? copy_mount_options+0x308/0x3c0 [ 936.980480][T17378] ksys_mount+0xcc/0x100 [ 936.984716][T17378] __x64_sys_mount+0xbf/0xd0 [ 936.989299][T17378] do_syscall_64+0xfe/0x140 [ 936.993801][T17378] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 936.999684][T17378] RIP: 0033:0x45c27a [ 937.003572][T17378] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 937.023254][T17378] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 937.031657][T17378] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 937.039618][T17378] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 937.047582][T17378] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 937.055545][T17378] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 937.063509][T17378] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x02', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x2c, 0x0, 0x0) 11:52:34 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt(r0, 0x10e, 0xb, 0x0, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:34 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xffffff89}}}}}, &(0x7f0000000100)) 11:52:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) 11:52:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x2d, 0x0, 0x0) 11:52:34 executing program 0 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfsb', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:34 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}}}}}, &(0x7f0000000100)) 11:52:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0xff, 0x6, 0x2, 0x40}, {0x6, 0x8, 0x2271, 0x6}]}) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='\xf1p\xea\xbb\xc0DD\xda\xd43H\xb2\xb2z=;P\xcd<5\xe84\xf1e\x9c\xde\x15\x03\x00\xa4\xd1\xf3\x01\xe1\x1f\x96v\xf5\xce<.\xee\xba\xddA\x9dJ\x93wy\xdc\x19\a\x02\xfe\xd0\x0e\xbbA^\x1c\x8b\a\x8c\x91\xe5p\xc8 \x14\x94\x82\x15\xd1\xa3\xf3*3\xe1\x8bu\x9f\xee]\xaa\x8b\x9c\xd23\x81\xe6\xb1Up\rZPDEr\xf8\xbf\x06\xa2\xe4\xb2j\xb8\x8e-\xa0]\xbe\x04\xa1\x00\xf5\\\xb9_\xb7\xd4~\xb0:\x02*\xa0\x8epo\x8c\x0eZ\xd9\xac\xe1\xfe\x9e9\x0e0N\xd2\xa1\xdbw\x18)&;\x86\x90\x10\x180\xcc\xa6\xaa\x12+\xc2\xbb\x0f\x1dn\xf0\\!0x0, 0x0, 0x7}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb6, 0x4) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000140)={0x7f, r2}) 11:52:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x2e, 0x0, 0x0) [ 937.410427][T17422] FAULT_INJECTION: forcing a failure. [ 937.410427][T17422] name failslab, interval 1, probability 0, space 0, times 0 [ 937.432899][T17422] CPU: 1 PID: 17422 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 937.440852][T17422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.450982][T17422] Call Trace: [ 937.451002][T17422] dump_stack+0x1d8/0x2f8 [ 937.451016][T17422] should_fail+0x555/0x770 [ 937.451030][T17422] __should_failslab+0x11a/0x160 [ 937.451045][T17422] should_failslab+0x9/0x20 [ 937.458809][T17422] kmem_cache_alloc_trace+0x5d/0x2f0 [ 937.458821][T17422] ? alloc_fs_context+0x65/0x5f0 [ 937.458832][T17422] alloc_fs_context+0x65/0x5f0 [ 937.458841][T17422] ? trace_kmalloc+0xbb/0x130 [ 937.458855][T17422] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 937.468284][T17422] fs_context_for_mount+0x24/0x30 [ 937.468295][T17422] vfs_kern_mount+0x2c/0x160 [ 937.468307][T17422] btrfs_mount+0x34f/0x18f0 [ 937.468322][T17422] ? legacy_parse_param+0x37b/0x880 [ 937.479888][T17422] ? cap_capable+0x250/0x290 [ 937.479903][T17422] legacy_get_tree+0xf9/0x1a0 [ 937.479912][T17422] ? btrfs_resize_thread_pool+0x290/0x290 [ 937.479922][T17422] vfs_get_tree+0x8f/0x380 [ 937.479936][T17422] do_mount+0x169d/0x2490 [ 937.542966][T17422] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 937.548503][T17422] ? copy_mount_options+0x5f/0x3c0 [ 937.553612][T17422] ? copy_mount_options+0x308/0x3c0 [ 937.558803][T17422] ksys_mount+0xcc/0x100 [ 937.563039][T17422] __x64_sys_mount+0xbf/0xd0 [ 937.567629][T17422] do_syscall_64+0xfe/0x140 [ 937.572134][T17422] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 937.578017][T17422] RIP: 0033:0x45c27a [ 937.581905][T17422] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 11:52:35 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}}}}}, &(0x7f0000000100)) 11:52:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x2f, 0x0, 0x0) 11:52:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendmsg$nfc_llcp(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x27, 0x0, 0x2, 0x0, 0x4, 0x8, "e6af94dd6d6ffbcf90b4b355a80181d59b8235c3bcf1e4fe0a013d152f0cd1ad46bef98a76ff676ad3f2b299757d609378f8c8ad7db8b6db169857c0779437", 0x30}, 0x60, &(0x7f0000000100)=[{&(0x7f0000000000)="7873b08b7d3dc196af0b67f70c7093b767eb7ad983752fb19a48080e44a39fad4302319ab8d0f2759a8014a75e6bbbfa311179b0777beb", 0x37}], 0x1, &(0x7f0000000140)={0x60, 0x1, 0xd91, "4543eeceb779da9156b3e866dcde4adf6df3be23d2ab54e374df17773d0799af9beb4b965c991a1f4aeaf37cc574f55a26e0511bff7b681857d34cc29735585921f89513def5d12a4bfbd3cc6f"}, 0x60, 0x1}, 0x40) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x06', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:35 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x4000000000}}}}}, &(0x7f0000000100)) [ 937.605033][T17422] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 937.613434][T17422] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 937.621398][T17422] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 937.629447][T17422] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 937.637408][T17422] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 937.645373][T17422] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x30, 0x0, 0x0) 11:52:35 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x40, 0x0) r1 = syz_open_dev$mice(&(0x7f0000001200)='/dev/input/mice\x00', 0x0, 0x8000) r2 = syz_open_dev$adsp(&(0x7f0000001440)='/dev/adsp#\x00', 0x1, 0xeac5b5e5bfd5662d) fstat(r1, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000001340)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r3}) r4 = openat$cgroup_int(r2, &(0x7f0000001280)='memory.max\x00', 0x2, 0x0) sendfile(r4, r4, 0x0, 0x7fffffff) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000001180)={0x1, 0x4, 0x1000, 0xaf, &(0x7f00000000c0)="474a9e5ed7e4d07e228b6d29a3e9ec718c28436f4d16f534d834b468563c356698480ef1ea48372483f62db5787992367c5ee3616814a2bb3f8356461b7d585b649543b9748c6f7b51c1f71edce894d06dd0a005e4da365f29ab5f0f8ded33f29946ee71b976e26474ab0cc286f4494f76dd544742bfdc72ba38aee1ba75f8c24f120082874038a34e470da8c1a3ecddf6f65927871ecadd80cb74baf84ecd09ba6752e5e6f4ffb2e520a68574aa81", 0x1000, 0x0, &(0x7f0000000180)="4f7eb2f4cbb27381654e25735ae0bab75d783a4db908cee0d85956b859e25d8b80449c7ab20b74f2580c4a906f77b7d0f50d88c13a64153f475f349aa3d2a4d1ab3144c74060d8cfa8841db4b1f2c58311462ca5c983e69736ba7ed3d745f48befa3c272057be1b1e1a566f312d6f87c73acbf44fa1fb7be5c5212415b7dd5412fbe85c8b6a71f5386e269cd2294b751fa66972bd193a03d8e588330ad642c12dc02b3fe026ee2bb94e9d0765d1131004999ce9258ef1604c1f7664d65c72a32af456a3bf3acd907de443bf9a4d4ccb49feaf74e26d47f2bcb6549a6efd245c442b11ccf4947e7f2e6bbebc3d58696c7e9cec10832713ceb876eec09c77d8036538c995caecd7d0a5b0856494445e91c9b3e4c696da543ca344db40252a5c028ab1b9b0cf90eeb42bfefd094bff391f976ccdbf813cd2abedd4c890f0464d1ddb04628883da37d6d139322ccd0fb2cc6ca414523bd128b23cb7b518dffdc41e3e4b21e36d5704c0fa01b7385b94a9c12ece3c6bdcec80747515ee91beed3ae9714d8c6e8e4b40d07fc8847f3d8668941ac1d93de25a82776364ae1fe0a695ffdb9442bd5b8d520f4cde789d5dff4afca71b3e6837d24fa50e438d3bde7ea39747096afc3c63024ca6d18339cb4fe0f38239a8ea25f76a207bd57bdcd2f2133b01607ff9a096557d671e7e3a1025467897eb73e8b4b9a08de11c3a37f94425736cccda9f8685b1c9bfb145c1ffb60c46fa70d037bc022798acce2fc9f99ba223d63defd29dc28def2acefc2acc5a1b7c0aa335cd4af4855f9eb8093bd72b6e9eb20fdeaa5d593999e79d59a5718becb24c3973a283a22c324f2873ea468a6537b447d3510d53193f171f0efac6dba949e5c1fffd73ea3512468f7d3cd6817d51d57895e78c842ba5f549bee5893a5a4a3a59d9a014cfaf454663122eac67d383572f1e5d43ffd77cffb54fe92f1d0ec7143e5eaf4599e6d56af4bbb601bd4809f6e3325ecfe5ed6dbf64b2be593e067ac2130daaae37def801d7f598f19893f3ff7a862454a7fca29ea2625df61e7732d16ad33d02ea9a3e52ef51890062e66438b31b641fa2e559dc8e1390191c543a0d09a6001e87e60dd936262c2e6259374b51248f6279a2a58ce07dba174656fc1285b2c24fd5b53aa57f595b27f0a66fa71c702a51b973a3cb4d6446844087dd3bae2051d17117f200d65de62d499f41fb15cf3e9f6b82c1f2c49d182e951c3efb990e6a3b619fbc83e26f341512de33fb9f82bf8e52ae61014398c93c0f9104be933817245f30198abdeabf3bd648354eace25d8a4ca6707e889fdf3e5f2430376b814a2e6ca21424b4de1fe6f32b3d123621cc065a5ad0d7222d175aab8e76d8234f1f4b405a62739df661ab941787c85e718bf5ff084ec08647232f5a3caec5d8b8787ed71f50173cb242f48c1e42c724183eba64e9e70cdb7cbf885b5f9d7f672b53366f47f3ad59b9e21eccb3ab336805e26320c49cdf6c7fe16c0f65eb60e43b5a76dcaa1e7af8cd50bc2a71686c927f5368a5532c5923b979706e694e4b1b0534e3f24764c005856d9ab9b3f4aa063db6d7933ad7a346a85dac399099c2cb4d8b40b7042f90129e96a3d0c8f26cdb6bac2cc950ba8b801d3b8e209ed8d7215ccdb413b23d191a8f6fe4aa9e53048d4d95606de927a6d4635c4b2898946eb25f660fa68ee5a8e262d669a396d8780acc9ead379bb92333af94fb903d010f023395a64b6ca160446ef398c80d53ef6e0adb9376f65fac22838fabf5de51d1920e864ba5444eb1d2b4f38af2ed83dde425fc6856541f155725e15ff353228125c36dc8913a54dbc8817e6cc0554680b1c5eb3913cd075860081320253785be4112b41a3218c664d5056179fff36565f7088ff2637f48b0dd46b37f236d42c33fcf824df2d3b60baaacb9dc66c2a201667f14e7d94c13e2d3a5ae89fee3b10e40165c3ecd91140dc962c6c00560dbeaf75ab004e36c81101ddca5dd0acceb782fadbb71e1f3f639d4db452c348035f5575bae8727c78d8a8d6103a07c77c9f134ef1f06885ff9fe04ca90a5da6a83ba3df0eec1827881aa35fa816b75d292618664f8004cf42fab8277c4a7d9c438a081c1c1f854ac7df4f90daaf339ccbbf727752f2ad380711d96e1bf65e43b1d0ec3ff88c2e215b2d741b1e342bf3314ef5f3e44591a6a88d3f3771cd48b307568a2e1c9b823721186f8dfdc29eb372d79dfd1113b937630a55ed1a3a737bd0fe42fcd08b31280d95cbbf824cbb6aec93e1e6f876711c3968573204b4f8d762466db6e79e727e9e081785a25153c0442192cb9a5743fccf96dacc5c46b3d9a27290422798cf36a60807daaced625e0d1b01641c19caf01d789dd6e88d04e63298df7830650d50e5d19e35e5ba38582db510a8c4f90ce8c87930ffb0bbd647111d03eebc6a241500340a66266ca36643d5ef7b931a5d5b208a448ccae5234784f7ddd2291b150f77fafc8be05e536a2ab5a0d5f75d5ba91c5987468f245918cd14944bce58d13fb375580e32cd7fe8899df5e29ff3f51c7ce953a181b86e987ab1fabeddb8bf4d38dcc838862bd119c4f879c48980524d4d255e5fc7894373f268b74ab648821f3226328ee7da975999e91e2b608adf76132bc11af8317a93a7cad540ac7ddbb20e8edbb54804ea2bff75a3a49371b218cb5a902f6b6e56a829503df17f2c94137255975bff5e9a2b358683bb83cbba5c9cf3585ef24ced99b46c8c8a634350bf7b2b4d090edbc4d8126694d79c109348b09f7c6ad2ac276379431c01f6418ece27f5b38ae74faa1257f61e68b1a8443656dcca37d226c3b025f24a9b7be150256c22670ee99a92f2ff06f1b88a473b55731548b0dea4a757ca7f2b5bbe6ad9d381c52f988197ebd6b7e063853c37ded0de94c10118907427232c7c04cfb71a7d372049fcb8391698be93184a3ee1870147f103448303c714a3cd1595e40ecb192c9db6380efa260e3364e00a3d64818a300b944e84461e4929852817b88fac3aa38846e04f2324ace19dbdba853e23833f4dc54c8390b7f2818aa3c04015a8d3303be88df20922c87fc64d4f043964f71dc843b29573da6a2978835446b5f3c8f268b3daaaadb6d92c96538500d4608a27d25d51be06b2271f801d7c760e8e3150c8241ebb256d6c840c0fb7593a3e5e6501c20fd09a294d84e839460181dfeb3e5db777243585d0cc265666b446d16e9e0af9509cee81c58ade7e211d98982127124a2e6a16fcd40cdb28ef55cb52a14cb1c4e05357defdf4bbcf1ff0614cde04e9fae76dbbf7b8fc13a8101f2c133b077bac14e2dc809a8f9b65426654f1fffc447de3a2d76ef2ca43a20cf33fb7e872b4e3465c6812f323c7b0ae630ea335ff8919c71c032ea7e61f67c80aadac2924f629c899bebc9f5edc5c9b72458b5c5f07864b7755a97bebfb4f2c419263f6f98e9aaf17357d1431371104978759961e50562a8d2ccc735348a3e3de262b07f3b382ac0c25415ea401d60002db876e180288a656a932b29cc225b0ed2827598ce1f8908d12ce96bcc2fd8fe3ed4db0b4fc5cc16e6ac65fd407a4bd11bbde7cdf96bbaac411ce3a3d59b1baaa05054d9aeb13072b60c6942b1eb61a31b1e048c0a37c1cda927a751829dd1f30e3997997003bac30fe6936f4122480c83597a2bbcf20cc0e316c1caa46ae23f26f52805e6e8a96af75ce7fa08153f08aa2a9651444f45b874a2e3971f59f6176cc1238ada24c64dd483ecad4864dece541df82c9c08a3257912b52d463233780252ae4496ef3e201af567a3277269b7dfa47d34e634b094f3f694d480091333b0cab9093afc6a9a93d44b17912424e6818118aa2b39fdb70ab75f5f87c5f5b738b60ce903a93d2d031d122fb62bc5c3e265fc7bcde4f0c360e9bb33c3f8265c695fb5795746fea9ab0da4e5d0a1102c947e56b78f7aef23449d4efd7575beb720583d0e4927166587bebfad090deb18f0a8f2d20f73dd20edd87e514489b2c29c0e33111e5c2384247fefe8127e036596e42fe7b59100c47594cee1e2d592502a720d600724744019401394301ad6269c4def08a57bf2684303a585e1fa3718822c3d0775e725f72841e3b149ae4f42cc96e5fea7182a0bcbb463285a3a63e4d321fe36bc4a8f8ed4e4927657d7342639361315ff682d5be8249e61698b98cef6ff94317cc46eee1bd313491eb0d8472f3f41e4477f52311bb31677829c0a55d0b4d1013bc7abcde9e525c1560446a091fb484c5b9022c908cd12fff57fd2ea1c983bece432ac761e08a87af8b6cc3f7298cf4e53023862017c40c856e0ea88922de03bccf213b1e01bc28387b3b3a119d0c7783673f7d8b99d98ffca690e18d1679a730a99e937b408f23a83af98854501a6f1309754f4a11debbc07fb7c424a71ff6fbd71b7f760db920f6c2ea6ae0e023ff6cbc1d0b55cfce3e92f4bb58676f1178dc9e5fea874bc46577143ad423696a8374f47b4df1ecfa3664f1ba15d8c6430560251eb39f26f23a45a9246f73e5d5dbb38b90b6295a6bf46e13a066b2b614bfa0ea8c314a8d01e9676a89432e98d40e880b28ce3810f6a329304d8451852ba2c191dbd36c508605eec615a6e73c8e17d19deed24d09f027bf3898c4903303fef2b89c04dbe70704a625f27b29e99dd1211a4d7906ca2ed38740bfa7cfa3ba1fa4acd9ccc364c93d1ec8bd77c19aac81b75baa92e794f7b5a598d7aec6716c9cb1173910af5dbcd5f1b803cf07ecdd36867fb5d5a117f4cc632a9fc01e4fa8afe382f40fff255f3bc5d181800c091297eea9ca50c84bfd907852ae5c7064b00892de22758741ca9fcf71a64a63f79c327019706dc80e31d9ae12406395069b7b68362cbe95efeb7b5e452813831ac4be5f7031650deb1410679ecf261793bbd54dfad0924a2b93aef51b760a2a91a69e165f11116185e55f090adc1265f1694b6cfb6a9a52574b0a3d0d247a4dbfe515134432988eb2820ba9950463d9071ff9db7995dc21973156a5337bfb58f16463f4758e5a8625cd1e9c60b2e2ea222cb49e68092e3638fec0be94c4319ac4c2fe979ad0eb88f5cc4266df6e1a830fabbf3d321889303af00c16ea02e0cd7bf63156b444ca9d808cbb2defe6a4998babac79b04716b62c9ea358cfed97e9aa448ddf07091427c431e5aad47a0ba2eb0dce670fe5e8518574350cb38dbffa7cdb346fd15cae0e61d0c6465f523461dc9fccdb0eadecae5832d913a89b94b4af75ae85de8576cf73aaacfb160a4cbaa311bf967af0a872c60c0ad35109b0063b9228926b062662196926a3b073de793c0a823d754a985d26eb5d7443dfff7cd075dd40e8495b874c8eb0fcf822fc4091c4453b32f7d1be80ecc8b5ce047748afe2d3856c30bf368c8b9f6a459a2eb26cb1054d80a6d9e8880f348826a3e07bbe30b5c0c636423e2cdb28f00c1915b7c6668390736d3c3b0efbba087c86555611267c5c2c0466932161b045aeaf9313d179e9eaf3b820b1a48433e1206a108d365dcdc7c6294ee1e4ff25e31776bd3ba4cae93ab9d4cd78f00250ad674b3ba54f6cc42a11a1cd7d483b19cee362533166198c4ba9e20b0bcb36c27e492f5a213e13254c90e44f03a2249504b368b9e45c5e593179ed859c2eaf707d7c961656cd3bff6960cab8f37057845c81ae7914b7432406b4e08d672cb8399749fbd7d5166f7a9caee312a78e009a70b4a77405174cde136ca6de4b73c8ecf5240ba617054f23b66d9704bcd291536784"}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000001380)={0x0, 0x0, [], @raw_data=[0x101, 0x2400000000, 0x625, 0x2, 0x10000, 0x8001, 0xffffffff, 0x5, 0xfffffffffffffffc, 0x1, 0xfc2, 0x9, 0x6, 0xca3, 0xfffffffffffffffc, 0x3, 0x421f475a, 0x8a, 0xffffffff, 0x3, 0x7, 0x5, 0x5, 0x5, 0x85d, 0x3, 0x30000000000000, 0x1, 0x2, 0x3, 0x7f4, 0x7fff]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x80b0) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000040)=0x100000004) fallocate(r4, 0x20, 0x9, 0x6) 11:52:35 executing program 0 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x31, 0x0, 0x0) 11:52:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfsc', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:35 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x10000000000}}}}}, &(0x7f0000000100)) 11:52:35 executing program 3: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) vmsplice(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="757cfe429ab253ffe1887e7ac72994dbaf85f62e1225f734070605", 0x1b}, {&(0x7f0000000040)="c090342d896e28c7b4b01cc664798174479a3d720e107c375dd86e6dba25f97148c8449e9bc79a2edb6d989d348f6f6cc6abc52eb882d4f74aaa1f7fa501679d409a16c79385272e46685f097a214d3ae653ea48b29ac132cb7c62e28d4d8d87272d0694e0704577f721c19e7e2ee49c10039369cc2527d6b72dd8d25b9e1430581dff29cb47bd998544c2519c0f2fee53676f8f2b947017e66da29c0aed0a20c29d43b0b57fffe2e0810db204af6cf2af803f47631e0121d522f6acbdc47c3eaa", 0xc1}, {&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000001140)="252eb6777a4f92b08c328679d84eb18dcb2b18c0cbe050e3e8cba3318394", 0x1e}, {&(0x7f0000001180)="40c51507da29a74c42ea5997b3f8123f4d247df134ba521145b410ac833a5d3b600bbb58365c14701d1fa4a7", 0x2c}, {&(0x7f00000011c0)="c9c348d8916696f8269bdea97072643662260776e4dc218a7979d07cf63ff6e02969acb12ad2a70fbdd013a02f4b444fc7c1cec1cb29e855aeb9b4bc4fa24fc9a9b2f742f57eda8034e0282a5c70d9a209b131d8f9935d0d1eb25cc2a4debca04b7e1b00fb4eee17a5310342679307746dff347003914480a53cdc15b3ff663b3c0ba0e1ab5ab05d33457ddd027ea94721283e26836a5ec0ae8b6fd632c7f31727193dc88b7dc1baa555d463cea84f841ab291f9a803ba0e06d464d43f80de63463264e0eeb31d79101fe328ad248b14d0f3ede99f5679b90761a75326755b707a9b56962f8c1d36287abb5d2ad24ab225a44b6898", 0xf5}], 0x6, 0x2) 11:52:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x32, 0x0, 0x0) 11:52:35 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}}}}, &(0x7f0000000100)) [ 937.990784][T17458] FAULT_INJECTION: forcing a failure. [ 937.990784][T17458] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 938.049478][T17458] CPU: 1 PID: 17458 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 938.057405][T17458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 938.067560][T17458] Call Trace: [ 938.070937][T17458] dump_stack+0x1d8/0x2f8 [ 938.075271][T17458] should_fail+0x555/0x770 [ 938.079683][T17458] should_fail_alloc_page+0x55/0x60 [ 938.084873][T17458] prepare_alloc_pages+0x283/0x470 [ 938.090069][T17458] __alloc_pages_nodemask+0xb2/0x5d0 [ 938.095350][T17458] ? rcu_lock_release+0x26/0x30 [ 938.100205][T17458] alloc_pages_current+0x2db/0x500 [ 938.105331][T17458] __page_cache_alloc+0x7d/0x1f0 [ 938.110295][T17458] do_read_cache_page+0x1f8/0xcb0 [ 938.115313][T17458] read_cache_page_gfp+0x29/0x30 [ 938.120251][T17458] btrfs_scan_one_device+0x16a/0x450 [ 938.125532][T17458] ? trace_hardirqs_on+0x74/0x80 [ 938.130465][T17458] btrfs_mount_root+0x4af/0x1050 [ 938.135408][T17458] ? vfs_parse_fs_string+0x13b/0x1a0 [ 938.140689][T17458] ? trace_kfree+0xa0/0x110 [ 938.145276][T17458] legacy_get_tree+0xf9/0x1a0 [ 938.149944][T17458] ? btrfs_control_open+0x40/0x40 [ 938.154962][T17458] vfs_get_tree+0x8f/0x380 [ 938.159379][T17458] vfs_kern_mount+0xc2/0x160 [ 938.163972][T17458] btrfs_mount+0x34f/0x18f0 [ 938.168477][T17458] ? legacy_parse_param+0x37b/0x880 [ 938.173670][T17458] ? cap_capable+0x250/0x290 [ 938.178259][T17458] legacy_get_tree+0xf9/0x1a0 [ 938.182944][T17458] ? btrfs_resize_thread_pool+0x290/0x290 [ 938.188657][T17458] vfs_get_tree+0x8f/0x380 [ 938.193074][T17458] do_mount+0x169d/0x2490 [ 938.197656][T17458] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 938.203279][T17458] ? copy_mount_options+0x5f/0x3c0 [ 938.208388][T17458] ? copy_mount_options+0x308/0x3c0 [ 938.213582][T17458] ksys_mount+0xcc/0x100 [ 938.217820][T17458] __x64_sys_mount+0xbf/0xd0 [ 938.222494][T17458] do_syscall_64+0xfe/0x140 [ 938.226996][T17458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 938.232878][T17458] RIP: 0033:0x45c27a [ 938.236760][T17458] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 938.256529][T17458] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 938.264934][T17458] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 938.272898][T17458] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 938.281033][T17458] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 938.288996][T17458] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 11:52:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x8c, r3, 0x3dd03be941c4d7e3, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe9a9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x22d0}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x8c}, 0x1, 0x0, 0x0, 0x1}, 0x4000880) [ 938.296956][T17458] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:36 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}}}}}, &(0x7f0000000100)) 11:52:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x33, 0x0, 0x0) 11:52:36 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) 11:52:36 executing program 0 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:36 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}}}}}, &(0x7f0000000100)) 11:52:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x35, 0x0, 0x0) 11:52:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfsd', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000180)={0x1, 0x6, 0x1}) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x80000, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x7fff, 0x1, 0x100}) 11:52:36 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}}}}}, &(0x7f0000000100)) 11:52:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x36, 0x0, 0x0) 11:52:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f0000000080)={0x1, 0x0, 0x2080, {0xf000, 0x10000, 0x3}, [], "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", "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"}) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) openat$cgroup(r0, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) sendfile(r0, r0, 0x0, 0x20cf036d6) [ 938.608460][T17497] FAULT_INJECTION: forcing a failure. [ 938.608460][T17497] name failslab, interval 1, probability 0, space 0, times 0 [ 938.643469][T17497] CPU: 1 PID: 17497 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 938.651403][T17497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 938.651408][T17497] Call Trace: [ 938.651427][T17497] dump_stack+0x1d8/0x2f8 [ 938.651442][T17497] should_fail+0x555/0x770 [ 938.651457][T17497] __should_failslab+0x11a/0x160 [ 938.678613][T17497] should_failslab+0x9/0x20 [ 938.683104][T17497] kmem_cache_alloc_trace+0x5d/0x2f0 [ 938.688388][T17497] ? legacy_init_fs_context+0x51/0xc0 [ 938.693925][T17497] legacy_init_fs_context+0x51/0xc0 [ 938.699117][T17497] alloc_fs_context+0x4e3/0x5f0 [ 938.704141][T17497] fs_context_for_mount+0x24/0x30 [ 938.709246][T17497] vfs_kern_mount+0x2c/0x160 [ 938.713858][T17497] btrfs_mount+0x34f/0x18f0 [ 938.718361][T17497] ? legacy_parse_param+0x37b/0x880 [ 938.723558][T17497] ? cap_capable+0x250/0x290 [ 938.728148][T17497] legacy_get_tree+0xf9/0x1a0 [ 938.732821][T17497] ? btrfs_resize_thread_pool+0x290/0x290 [ 938.738646][T17497] vfs_get_tree+0x8f/0x380 [ 938.743146][T17497] do_mount+0x169d/0x2490 [ 938.747556][T17497] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 938.753099][T17497] ? copy_mount_options+0x5f/0x3c0 [ 938.758200][T17497] ? copy_mount_options+0x308/0x3c0 [ 938.763390][T17497] ksys_mount+0xcc/0x100 [ 938.767923][T17497] __x64_sys_mount+0xbf/0xd0 [ 938.772505][T17497] do_syscall_64+0xfe/0x140 [ 938.777106][T17497] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 938.783074][T17497] RIP: 0033:0x45c27a [ 938.787043][T17497] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 938.806986][T17497] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 938.815384][T17497] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 938.823352][T17497] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 938.831406][T17497] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 938.839370][T17497] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 938.847423][T17497] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:36 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}}}}}, &(0x7f0000000100)) 11:52:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x37, 0x0, 0x0) 11:52:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@broadcast, @remote, 0x0}, &(0x7f0000000080)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@empty, 0x54, r2}) 11:52:36 executing program 0 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:36 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}}}}}, &(0x7f0000000100)) 11:52:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfse', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0xffffffffffffffda, 0x7}, 0x10) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x38, 0x0, 0x0) 11:52:36 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}}}}}, &(0x7f0000000100)) 11:52:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x39, 0x0, 0x0) 11:52:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x3) 11:52:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:36 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}}}}, &(0x7f0000000100)) [ 939.188805][T17540] FAULT_INJECTION: forcing a failure. [ 939.188805][T17540] name failslab, interval 1, probability 0, space 0, times 0 [ 939.210526][T17540] CPU: 1 PID: 17540 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 939.218583][T17540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 939.228720][T17540] Call Trace: [ 939.228739][T17540] dump_stack+0x1d8/0x2f8 [ 939.228759][T17540] should_fail+0x555/0x770 [ 939.241004][T17540] __should_failslab+0x11a/0x160 [ 939.245952][T17540] ? btrfs_mount+0x83/0x18f0 [ 939.245966][T17540] should_failslab+0x9/0x20 [ 939.245977][T17540] __kmalloc_track_caller+0x79/0x340 [ 939.245990][T17540] kstrdup+0x34/0x70 [ 939.246003][T17540] btrfs_mount+0x83/0x18f0 [ 939.264311][T17540] ? legacy_parse_param+0x37b/0x880 [ 939.264325][T17540] ? cap_capable+0x250/0x290 [ 939.278478][T17540] legacy_get_tree+0xf9/0x1a0 [ 939.278497][T17540] ? btrfs_resize_thread_pool+0x290/0x290 [ 939.288883][T17540] vfs_get_tree+0x8f/0x380 [ 939.293307][T17540] do_mount+0x169d/0x2490 [ 939.293320][T17540] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 939.293332][T17540] ? copy_mount_options+0x5f/0x3c0 [ 939.308349][T17540] ? copy_mount_options+0x308/0x3c0 [ 939.308360][T17540] ksys_mount+0xcc/0x100 [ 939.308376][T17540] __x64_sys_mount+0xbf/0xd0 [ 939.308390][T17540] do_syscall_64+0xfe/0x140 [ 939.308406][T17540] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 939.322404][T17540] RIP: 0033:0x45c27a 11:52:36 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x806000000000000}}}}}, &(0x7f0000000100)) 11:52:36 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000}}}}}, &(0x7f0000000100)) [ 939.322415][T17540] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 939.322419][T17540] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 939.356437][T17540] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 939.356443][T17540] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 939.356447][T17540] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 939.356451][T17540] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 939.356455][T17540] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:37 executing program 0 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x3a, 0x0, 0x0) 11:52:37 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}}}}}, &(0x7f0000000100)) 11:52:37 executing program 3: openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x3c2524b8322ac8c1, 0x0) r0 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0x40100) openat$cgroup_ro(r0, &(0x7f0000000080)='/\xe9z\xc7ap\x00\fJg>:\'\\o\xdc\xd7T,A\x87!N\xdc5\xfe\r\x97j\xc5\xe9\x1a\xf1\xdd\xdbQ\'\f\xc8\x89\x00\xac{\x9e~\xe4\xe1\x15\xe1\xad.WN\x1e\xdb\xf1\xa5(J\x8f\xf9\xe1 mX(\x9b\xe7\x05\x80\x8c=T\x1f\x1f4]\xd0\x03\nB*\a\xa0\xc4\xfak\xb46\x18\xfd\xf2\x1c\xf8{\xc5\xf5\xb5{\xfb*\b\x00\x00\x00J,\x18\x9e\x19I\xf9\xb8\x9a\xcc\xe4j\x1a\xc42@\xbc\x99\x03R\xd6\x88\t\x95:5\xe7]\x06\xca\xf9\xc5m\xa6\xc2\xf2\xf1\xfc\xbd}\xd3\x03?\xa2j:\x1d\xe9_\xdd*%-\xdd?\x05\xdc/T\x95\xee\x00\x87\xaa\xbdv8Qn\xf5\xd0\x8a\x18\xd4\x92r\xe8.\xf7K\x84\xeb=6\xa1 \xcf\x0f^\x81D\xbc<\xec\\\x8e\xe5\xf5K(\xe1y2\xd4\xd3{v\x97R\x1f\xfc~\x83\xa9\xef1\xaeD%;9\xf7\x80\xb1N<\xb1\x12c\xf0\xe8\r\x98\xa3\x84\t\v&\xe5\x14\xcc=4\xa5\xba\x97\x92\xfe\xd2\xfa\xf4(\xb3}m_\xccu\xa2\xf0\t\x87\x84\xda\xc4\x88\xc7\x972Op\xc2\xa0D\xf6Z\x9c\xc5\xaa6\xc3|\xbc\'', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfsh', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, 0x0) 11:52:37 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000}}}}}, &(0x7f0000000100)) 11:52:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) getsockopt$inet6_dccp_int(r0, 0x21, 0x10, &(0x7f0000000000), &(0x7f0000000080)=0x4) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x2a, "6d244512eb426088382284600dbca8b5f0cdd7105c2014a9bde041d042696ec56d6c35e3574885d24bea"}, &(0x7f0000000100)=0x32) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x1ff}, 0x8) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 939.610213][T17574] FAULT_INJECTION: forcing a failure. [ 939.610213][T17574] name failslab, interval 1, probability 0, space 0, times 0 [ 939.657920][T17574] CPU: 1 PID: 17574 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 939.665867][T17574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 939.676276][T17574] Call Trace: [ 939.679578][T17574] dump_stack+0x1d8/0x2f8 [ 939.684010][T17574] should_fail+0x555/0x770 [ 939.688526][T17574] __should_failslab+0x11a/0x160 [ 939.693471][T17574] should_failslab+0x9/0x20 [ 939.697975][T17574] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 939.703692][T17574] ? __kmalloc_node+0x3c/0x60 [ 939.708369][T17574] ? smack_sb_eat_lsm_opts+0x867/0xa20 [ 939.713824][T17574] __kmalloc_node+0x3c/0x60 [ 939.718329][T17574] kvmalloc_node+0xcc/0x130 [ 939.722836][T17574] btrfs_mount_root+0xe3/0x1050 [ 939.727689][T17574] ? vfs_parse_fs_string+0x13b/0x1a0 [ 939.732962][T17574] ? trace_kfree+0xa0/0x110 [ 939.737462][T17574] legacy_get_tree+0xf9/0x1a0 [ 939.742129][T17574] ? btrfs_control_open+0x40/0x40 [ 939.747145][T17574] vfs_get_tree+0x8f/0x380 [ 939.751560][T17574] vfs_kern_mount+0xc2/0x160 [ 939.756153][T17574] btrfs_mount+0x34f/0x18f0 [ 939.760662][T17574] ? legacy_parse_param+0x37b/0x880 [ 939.765982][T17574] ? cap_capable+0x250/0x290 [ 939.770658][T17574] legacy_get_tree+0xf9/0x1a0 [ 939.775327][T17574] ? btrfs_resize_thread_pool+0x290/0x290 [ 939.781045][T17574] vfs_get_tree+0x8f/0x380 [ 939.785456][T17574] do_mount+0x169d/0x2490 [ 939.789780][T17574] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 939.795319][T17574] ? copy_mount_options+0x5f/0x3c0 [ 939.800441][T17574] ? copy_mount_options+0x308/0x3c0 [ 939.805634][T17574] ksys_mount+0xcc/0x100 [ 939.809883][T17574] __x64_sys_mount+0xbf/0xd0 [ 939.814471][T17574] do_syscall_64+0xfe/0x140 [ 939.818969][T17574] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 939.824941][T17574] RIP: 0033:0x45c27a [ 939.828826][T17574] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 939.848424][T17574] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 11:52:37 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000}}}}}, &(0x7f0000000100)) 11:52:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/L\v\x00\x00Q\x84\xff\xb4\x16C_', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={@null=' \x00', 0xe, 'ip6gretap0\x00'}) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x121000, 0x0) write$P9_RMKNOD(r2, &(0x7f0000000080)={0x14, 0x13, 0x2, {0x2, 0x2, 0x4}}, 0x14) [ 939.856924][T17574] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 939.865425][T17574] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 939.873388][T17574] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 939.881350][T17574] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 939.889433][T17574] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x3c, 0x0, 0x0) 11:52:37 executing program 0 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:37 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}}}}}, &(0x7f0000000100)) 11:52:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfsl', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x3e, 0x0, 0x0) 11:52:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x401, 0x5, 0x81, 0x5, 0x4}) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0x1}) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x4) 11:52:37 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000}}}}}, &(0x7f0000000100)) [ 940.116835][T17605] FAULT_INJECTION: forcing a failure. [ 940.116835][T17605] name failslab, interval 1, probability 0, space 0, times 0 [ 940.133239][T17605] CPU: 1 PID: 17605 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 940.141249][T17605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.141254][T17605] Call Trace: [ 940.141277][T17605] dump_stack+0x1d8/0x2f8 [ 940.141297][T17605] should_fail+0x555/0x770 [ 940.141315][T17605] __should_failslab+0x11a/0x160 [ 940.141328][T17605] ? vfs_parse_fs_string+0xed/0x1a0 [ 940.141340][T17605] should_failslab+0x9/0x20 [ 940.141352][T17605] __kmalloc_track_caller+0x79/0x340 [ 940.141368][T17605] kmemdup_nul+0x2a/0xa0 [ 940.141377][T17605] vfs_parse_fs_string+0xed/0x1a0 [ 940.141391][T17605] vfs_kern_mount+0x77/0x160 [ 940.141403][T17605] btrfs_mount+0x34f/0x18f0 [ 940.141421][T17605] ? legacy_parse_param+0x37b/0x880 [ 940.141439][T17605] ? cap_capable+0x250/0x290 [ 940.154969][T17605] legacy_get_tree+0xf9/0x1a0 [ 940.178534][T17605] ? btrfs_resize_thread_pool+0x290/0x290 [ 940.178546][T17605] vfs_get_tree+0x8f/0x380 [ 940.178562][T17605] do_mount+0x169d/0x2490 [ 940.178577][T17605] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 940.216869][T17605] ? copy_mount_options+0x5f/0x3c0 [ 940.216881][T17605] ? copy_mount_options+0x308/0x3c0 [ 940.216890][T17605] ksys_mount+0xcc/0x100 11:52:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080)=0x7a, 0x608) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:37 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000}}}}}, &(0x7f0000000100)) [ 940.216902][T17605] __x64_sys_mount+0xbf/0xd0 [ 940.254798][T17605] do_syscall_64+0xfe/0x140 [ 940.254814][T17605] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 940.254829][T17605] RIP: 0033:0x45c27a [ 940.269086][T17605] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 940.269092][T17605] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 940.269104][T17605] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 940.279462][T17605] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 940.279468][T17605] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 940.279473][T17605] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 940.279478][T17605] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x42, 0x0, 0x0) 11:52:38 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000}}}}}, &(0x7f0000000100)) 11:52:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x6) 11:52:38 executing program 0 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfsp', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x43, 0x0, 0x0) 11:52:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) flistxattr(r0, &(0x7f0000000080)=""/24, 0x18) sendfile(r1, r1, 0x0, 0x7fffffff) clock_getres(0x6dbb283acb9eeff2, &(0x7f00000000c0)) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast2}, 0x10) 11:52:38 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2100000000000000}}}}}, &(0x7f0000000100)) 11:52:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x46, 0x0, 0x0) [ 940.648925][T17643] FAULT_INJECTION: forcing a failure. [ 940.648925][T17643] name failslab, interval 1, probability 0, space 0, times 0 [ 940.680133][T17643] CPU: 1 PID: 17643 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 940.688249][T17643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.698487][T17643] Call Trace: [ 940.698510][T17643] dump_stack+0x1d8/0x2f8 [ 940.698527][T17643] should_fail+0x555/0x770 [ 940.698542][T17643] __should_failslab+0x11a/0x160 [ 940.698561][T17643] should_failslab+0x9/0x20 [ 940.720290][T17643] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 940.720304][T17643] ? __kmalloc_node+0x3c/0x60 [ 940.731038][T17643] ? smack_sb_eat_lsm_opts+0x867/0xa20 [ 940.736499][T17643] __kmalloc_node+0x3c/0x60 [ 940.741094][T17643] kvmalloc_node+0xcc/0x130 [ 940.745684][T17643] btrfs_mount_root+0xe3/0x1050 [ 940.750622][T17643] ? vfs_parse_fs_string+0x13b/0x1a0 [ 940.757381][T17643] ? trace_kfree+0xa0/0x110 [ 940.761998][T17643] legacy_get_tree+0xf9/0x1a0 [ 940.766671][T17643] ? btrfs_control_open+0x40/0x40 [ 940.771690][T17643] vfs_get_tree+0x8f/0x380 [ 940.776103][T17643] vfs_kern_mount+0xc2/0x160 [ 940.780687][T17643] btrfs_mount+0x34f/0x18f0 [ 940.785197][T17643] ? legacy_parse_param+0x37b/0x880 [ 940.790407][T17643] ? cap_capable+0x250/0x290 [ 940.795001][T17643] legacy_get_tree+0xf9/0x1a0 [ 940.799671][T17643] ? btrfs_resize_thread_pool+0x290/0x290 [ 940.805386][T17643] vfs_get_tree+0x8f/0x380 [ 940.809798][T17643] do_mount+0x169d/0x2490 [ 940.814118][T17643] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 940.819655][T17643] ? copy_mount_options+0x5f/0x3c0 [ 940.824769][T17643] ? copy_mount_options+0x308/0x3c0 [ 940.829968][T17643] ksys_mount+0xcc/0x100 [ 940.834215][T17643] __x64_sys_mount+0xbf/0xd0 [ 940.838805][T17643] do_syscall_64+0xfe/0x140 [ 940.843310][T17643] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 940.849197][T17643] RIP: 0033:0x45c27a [ 940.853086][T17643] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 940.872684][T17643] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 940.881091][T17643] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 940.889059][T17643] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 11:52:38 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2900000000000000}}}}}, &(0x7f0000000100)) 11:52:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x48, 0x0, 0x0) [ 940.897027][T17643] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 940.904988][T17643] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 940.912951][T17643] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000000)) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x80b0) 11:52:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x49, 0x0, 0x0) 11:52:38 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2b00000000000000}}}}}, &(0x7f0000000100)) 11:52:38 executing program 0 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfst', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @dev, @empty}, &(0x7f0000000080)=0xc) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x4a, 0x0, 0x0) [ 941.120369][T17672] FAULT_INJECTION: forcing a failure. [ 941.120369][T17672] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 941.133605][T17672] CPU: 1 PID: 17672 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 941.141506][T17672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.151790][T17672] Call Trace: [ 941.155084][T17672] dump_stack+0x1d8/0x2f8 [ 941.159412][T17672] should_fail+0x555/0x770 [ 941.163830][T17672] should_fail_alloc_page+0x55/0x60 [ 941.169022][T17672] prepare_alloc_pages+0x283/0x470 [ 941.174131][T17672] __alloc_pages_nodemask+0xb2/0x5d0 [ 941.179425][T17672] kmem_getpages+0x56/0xa20 [ 941.183924][T17672] ? trace_lock_release+0x135/0x1a0 [ 941.189128][T17672] cache_grow_begin+0x7e/0x2c0 [ 941.193886][T17672] cache_alloc_refill+0x311/0x3f0 [ 941.198901][T17672] ? check_preemption_disabled+0xb7/0x2a0 [ 941.204615][T17672] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 941.209986][T17672] ? btrfs_mount_root+0x12c/0x1050 [ 941.215092][T17672] btrfs_mount_root+0x12c/0x1050 [ 941.220041][T17672] ? vfs_parse_fs_string+0x13b/0x1a0 [ 941.225320][T17672] ? trace_kfree+0xa0/0x110 [ 941.229931][T17672] legacy_get_tree+0xf9/0x1a0 [ 941.234871][T17672] ? btrfs_control_open+0x40/0x40 [ 941.239891][T17672] vfs_get_tree+0x8f/0x380 [ 941.244307][T17672] vfs_kern_mount+0xc2/0x160 [ 941.248894][T17672] btrfs_mount+0x34f/0x18f0 [ 941.253401][T17672] ? legacy_parse_param+0x37b/0x880 [ 941.258600][T17672] ? cap_capable+0x250/0x290 [ 941.263194][T17672] legacy_get_tree+0xf9/0x1a0 [ 941.267863][T17672] ? btrfs_resize_thread_pool+0x290/0x290 [ 941.273576][T17672] vfs_get_tree+0x8f/0x380 [ 941.277988][T17672] do_mount+0x169d/0x2490 [ 941.282314][T17672] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 941.287853][T17672] ? copy_mount_options+0x5f/0x3c0 [ 941.292961][T17672] ? copy_mount_options+0x308/0x3c0 [ 941.298154][T17672] ksys_mount+0xcc/0x100 [ 941.302394][T17672] __x64_sys_mount+0xbf/0xd0 [ 941.306983][T17672] do_syscall_64+0xfe/0x140 [ 941.311484][T17672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.317366][T17672] RIP: 0033:0x45c27a [ 941.321254][T17672] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 941.340856][T17672] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 941.349259][T17672] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 941.357225][T17672] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 11:52:39 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2c00000000000000}}}}}, &(0x7f0000000100)) 11:52:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000080)={{0x0, 0x0, 0x9, 0x2, 0x5}, 0x6}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000000)=""/53) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x4b, 0x0, 0x0) [ 941.365449][T17672] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 941.373418][T17672] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 941.381381][T17672] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:39 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2f00000000000000}}}}}, &(0x7f0000000100)) 11:52:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x4c, 0x0, 0x0) 11:52:39 executing program 0 (fault-call:0 fault-nth:80): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:39 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3200000000000000}}}}}, &(0x7f0000000100)) 11:52:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x80000000000001) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfsz', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:39 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3300000000000000}}}}}, &(0x7f0000000100)) 11:52:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)=0x0) wait4(r2, &(0x7f0000000100), 0x2, &(0x7f0000000140)) write$P9_RFSYNC(r0, &(0x7f0000000000)={0x7, 0x33, 0x1}, 0x7) sendfile(r1, r1, 0x0, 0x7fffffff) bind$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e21, @remote}}, 0x24) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) fadvise64(r1, 0x0, 0x2, 0x0) 11:52:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x4d, 0x0, 0x0) [ 941.695584][T17705] FAULT_INJECTION: forcing a failure. [ 941.695584][T17705] name failslab, interval 1, probability 0, space 0, times 0 [ 941.725866][T17705] CPU: 0 PID: 17705 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 941.733890][T17705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.743944][T17705] Call Trace: [ 941.747235][T17705] dump_stack+0x1d8/0x2f8 [ 941.751576][T17705] should_fail+0x555/0x770 [ 941.755994][T17705] __should_failslab+0x11a/0x160 [ 941.760928][T17705] should_failslab+0x9/0x20 [ 941.765431][T17705] kmem_cache_alloc_trace+0x5d/0x2f0 [ 941.770714][T17705] ? btrfs_mount_root+0x1b2/0x1050 [ 941.775833][T17705] btrfs_mount_root+0x1b2/0x1050 [ 941.780784][T17705] ? vfs_parse_fs_string+0x13b/0x1a0 [ 941.786070][T17705] ? trace_kfree+0xa0/0x110 [ 941.790571][T17705] legacy_get_tree+0xf9/0x1a0 [ 941.795241][T17705] ? btrfs_control_open+0x40/0x40 [ 941.800266][T17705] vfs_get_tree+0x8f/0x380 [ 941.804681][T17705] vfs_kern_mount+0xc2/0x160 [ 941.809266][T17705] btrfs_mount+0x34f/0x18f0 [ 941.813768][T17705] ? legacy_parse_param+0x37b/0x880 [ 941.819152][T17705] ? cap_capable+0x250/0x290 [ 941.823754][T17705] legacy_get_tree+0xf9/0x1a0 [ 941.828425][T17705] ? btrfs_resize_thread_pool+0x290/0x290 [ 941.834140][T17705] vfs_get_tree+0x8f/0x380 [ 941.838551][T17705] do_mount+0x169d/0x2490 [ 941.842875][T17705] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 941.848499][T17705] ? copy_mount_options+0x5f/0x3c0 [ 941.853608][T17705] ? copy_mount_options+0x308/0x3c0 [ 941.858806][T17705] ksys_mount+0xcc/0x100 [ 941.863043][T17705] __x64_sys_mount+0xbf/0xd0 [ 941.867634][T17705] do_syscall_64+0xfe/0x140 [ 941.872137][T17705] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.878025][T17705] RIP: 0033:0x45c27a [ 941.882026][T17705] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 941.901625][T17705] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 941.910031][T17705] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 941.918097][T17705] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 941.926072][T17705] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 941.934041][T17705] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 11:52:39 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3a00000000000000}}}}}, &(0x7f0000000100)) [ 941.942008][T17705] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x4e, 0x0, 0x0) 11:52:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) bind(r0, &(0x7f0000000080)=@llc={0x1a, 0x324, 0x7f, 0x5, 0x4, 0x1ff}, 0x80) 11:52:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:39 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3c00000000000000}}}}}, &(0x7f0000000100)) 11:52:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x3) 11:52:39 executing program 0 (fault-call:0 fault-nth:81): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000000)=0x4d) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={r2, 0x5}, &(0x7f0000000140)=0x8) sendfile(r1, r1, 0x0, 0x7fffffff) 11:52:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\xec', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 942.332298][T17744] FAULT_INJECTION: forcing a failure. [ 942.332298][T17744] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 942.345641][T17744] CPU: 1 PID: 17744 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 942.353528][T17744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.363758][T17744] Call Trace: [ 942.367049][T17744] dump_stack+0x1d8/0x2f8 [ 942.371390][T17744] should_fail+0x555/0x770 [ 942.375811][T17744] should_fail_alloc_page+0x55/0x60 [ 942.381006][T17744] prepare_alloc_pages+0x283/0x470 [ 942.386117][T17744] __alloc_pages_nodemask+0xb2/0x5d0 [ 942.391517][T17744] ? cache_grow_end+0x143/0x170 [ 942.396366][T17744] kmem_getpages+0x56/0xa20 [ 942.400867][T17744] ? trace_lock_release+0x135/0x1a0 [ 942.406061][T17744] cache_grow_begin+0x7e/0x2c0 [ 942.410818][T17744] cache_alloc_refill+0x311/0x3f0 [ 942.415842][T17744] ? check_preemption_disabled+0xb7/0x2a0 [ 942.421556][T17744] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 942.426933][T17744] ? btrfs_mount_root+0x1b2/0x1050 [ 942.432041][T17744] btrfs_mount_root+0x1b2/0x1050 [ 942.436978][T17744] ? vfs_parse_fs_string+0x13b/0x1a0 [ 942.442256][T17744] ? trace_kfree+0xa0/0x110 [ 942.446753][T17744] legacy_get_tree+0xf9/0x1a0 [ 942.451447][T17744] ? btrfs_control_open+0x40/0x40 [ 942.456555][T17744] vfs_get_tree+0x8f/0x380 [ 942.460967][T17744] vfs_kern_mount+0xc2/0x160 [ 942.465565][T17744] btrfs_mount+0x34f/0x18f0 [ 942.470071][T17744] ? legacy_parse_param+0x37b/0x880 [ 942.475264][T17744] ? cap_capable+0x250/0x290 [ 942.479856][T17744] legacy_get_tree+0xf9/0x1a0 [ 942.484527][T17744] ? btrfs_resize_thread_pool+0x290/0x290 [ 942.490241][T17744] vfs_get_tree+0x8f/0x380 [ 942.494655][T17744] do_mount+0x169d/0x2490 [ 942.498976][T17744] ? copy_mount_options+0x25e/0x3c0 [ 942.504172][T17744] ? copy_mount_options+0x308/0x3c0 [ 942.509364][T17744] ksys_mount+0xcc/0x100 [ 942.513602][T17744] __x64_sys_mount+0xbf/0xd0 [ 942.518188][T17744] do_syscall_64+0xfe/0x140 [ 942.522702][T17744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.528586][T17744] RIP: 0033:0x45c27a [ 942.532476][T17744] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 942.552075][T17744] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 942.560475][T17744] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 942.568442][T17744] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 11:52:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x63) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000001680)=[{&(0x7f00000011c0)="6564bbd1c4fb7ca7a5f5fb625e75415c9868fec18fc6c394a3bdd111719234f66562713234a8f123", 0x28}, {&(0x7f0000001200)="f37a58acca9cf2258c62eebb0068be6c2320b790ff93a67f558a727351dcf259e069cb06fd8227c442d14b44817918e9d53b", 0x32}, {&(0x7f0000001240)="7c9c482dda12825192ce1a111fb584c84661e3395f41", 0x16}], 0x3) io_setup(0x20000000001005, &(0x7f0000000880)=0x0) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x5000600, 0x0, 0x700000000000000, 0x0, 0x0, r1, &(0x7f0000000340), 0xa96}]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r4, r4, 0x0, 0x7fffffff) sendmmsg$nfc_llcp(r3, &(0x7f0000003700)=[{&(0x7f0000000080)={0x27, 0x0, 0x2, 0x5, 0xe7, 0x7ba0, "0678f6cbe47ec1ed52d91b59d069550d6ee81ddd71c9d214346f12f5b326ef9cff811194390fdc86ed6f0ca2a6d2d9c2d06259f5772f4259cda57fbbe02b67", 0x2}, 0x60, &(0x7f0000000340)=[{&(0x7f0000000000)="cc553bc82b4c90d6a4358330f847ae35223fc594442a6c58419d8e5845e6762855df509fd48a33842daf9a3646fe", 0x2e}, {&(0x7f0000000100)="009afc4fd0b1447b80210a2c9ca4c21e3c06f9c13227ad6003c28232e66c012e31dba668482c83a80cff7c8919ac55e337ac30cfcf4126c3a4c46bb8a9fc4f6c0bd7ee741b6ee0328afb69ba0afa4c8e8e74a20f0d1a3c1bdb01c99323fffcfc547641420d619164434c89bad7aeae0e575780525638080cf2ed4a21e58756764b521294a7dc60c8e0157adca11225328a682c6b2dc5b89e43b5e6b2bfa9f26ac42bf0fcc234029ae33b24a37540474b3f64d9a2a99bd8e633", 0xb9}, {&(0x7f00000001c0)="df23231dfeab4ddb789d3ee161065614be27eac9a61d6e7e16b5ae6b47f12acbd5c7b49c14b944e1e79e0735174f837080c1f548fbc804dae0c709e58728169e59291b9ca8d2f268bf409962e47297256b68c1166d8116be58b0264c4f4a9e03c7cd1a6d4f16b89c9e15eb7c4e755e5f71fdb1e39726147b4abf104121652032a13a11fa5275dc7d277c4d98b224e9a0806ab9608565b8cb95f7065ba4cfbfa520273e7763ff4f954a79ac3d48dcefe306655aaa937b550b2405ae3f11f6960a093ff1f2531430e120bfb8ea32dce79136df8389da", 0xd5}, {&(0x7f00000002c0)="35d96ee87f35f3e092446af9334e4f51a988def0a654a10f055c44f23887514e8b3f998872e985d19bc930afde7c51acd6db48f3ad7adc1e4d5abd0208e4ef7a79d15fc2390c4fcb062da6db0cc78dc6848eab794fc6b3181daee30d6d7e0f5250cf", 0x62}], 0x4, 0x0, 0x0, 0x80}, {&(0x7f0000000380)={0x27, 0x1, 0x0, 0x4, 0x0, 0x9, "8fda14b4f1f211e87cf798e9394f42574c957a0c9c19f59a70a91742042d74b920007f6da60da61ff0a92c6b3fe7a301adcf7aaa07a9ca8ff04af14a66b1ac", 0x31}, 0x60, &(0x7f0000000940)=[{&(0x7f0000000400)="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", 0xfb}, {&(0x7f0000000500)="38c23d590aa74a0e8e70cb0ed6512bf7913b11400c39a426c1d21bb2c2296551959136f95e97a87428245e2a80d301eb2cb39bb42f5d48e8cf205fbf21ebc859759e7b010b7c70df3481983e16fb47e6d1f31994d06cd771afc8a38e1124195736f8bd6ba8d718", 0x67}, {&(0x7f0000000580)="e153ed2a69acec14be85ee645e5cb5d26b06ad9c703c2b9c373fef679dc91a17c788d2a1292dabcfaf7dad70c4c21875cb957b344825937e948add43692ed443d0467ecf060251308bac061120dbdc89a49b2061099c1990a1819b3c85a5f5870d9cb93e7fb2ef18580ad0f5b13a3d08e4fb2f9fc0b8e757272b9b8e9b76fd65f1d9639047dbff2d3a404af95f1850b2931b94dd3bee", 0x96}, {&(0x7f0000000640)="50e0addf8fa81fdb84a5cd6682aab36df2932c41d9e8a224bd01e83aa7ee2a244b8f4f91f1bc3bdeb7cbb8c3d5faadd33a26d351c875a792053827f2f194581eda9cd25ff6b849cb6668ec7bb9a466e9e2b2b7276e121eec81a8f72001e153a8a212aade5eed5ec4ffd8f46a94d593b8", 0x70}, {&(0x7f00000006c0)="b1c824b7a6b7a2f5bff63226f85cbd96121a9b43521cbe0cbf99dcaf81376236e9fb77b8ac581658edb88e730a244ec37bbea60165c8705a07419369dcf2f7c4e72421432a96557f299f6bcafaea5c23b5fcafd82d011b693991a2785f49667924c086ed23cf425d0f89070a91ef60aa8ff113f1f0d5da5bfff0fd208be2b7d9bb8aa534de649a73aaef145da70cc79e63ff381b372af481184f3dc102d18d92", 0xa0}, {&(0x7f0000000780)="268abf4555b49bea3b0a91450b2f3d6e18cb97d6dec2c9415441243a8dfd302f7d81c11b984a7200e9a7fdde5b7d2239f997806c3b170daa425f69e18e5ce8cc9f62cf972d53b37be1c0f38afcc5b5dede2cc2d2d3efb13df393b5dcb6d1a031081186283d45ff260c8c17d6d015daed82e2268aa3e1eba9cddb27ba057ee23bfb0373078766343858b08cb4d3161e7d10f6c2545d3ebeaba808da9125342b874a8f76ed89b23e3950d585c90fe8d3bb029618c0be2b15b32a4fe94fba806bcf1b", 0xc1}, {&(0x7f0000000880)="8ca6652ddab74eb004423fd74d75f6716b8bbb58b6873f5f256da766de866c0a2381936f91ab682621088fcd767a5c34a175fc1fa00aad1de8793f88ddb7578cfd1d32dfdf439d0d1238ec73cfc244fdc507a3b44345db87f6466d455314fa379696aa206880dcb2d604fb962156e45262744aa03a29f2f63d73ced5cc142c5ea829034a1a933f17c11d0507a723089dfdaffe67e9d3531fccd6ae58039b", 0x9e}], 0x7, &(0x7f00000009c0)={0x80, 0x104, 0x7, "a78edc0fc0dc3fec1340adf947b3eb27998a8280871a4e7d957544c8a877fa1afc372c06616c5f82400a9b223a6344db41293c69929eba745e2012544b1a857084228a4b4a676b571e87d1f28ffe257ad80c8b61ba390e7fb55e3cac870d7f61d41baf21379de75d268314ae11"}, 0x80, 0x20000000}, {&(0x7f0000000a40)={0x27, 0x1, 0x2, 0x2, 0x800, 0xff, "0e4529d3f80cd0dc5d40e1c61a8a66d0d3e42918b6ded3c1c58ec0aa3e28a91632d2bed9969f04a10d4e0fad4532a68616e7595e3628ee55368793caab4b37", 0x1e}, 0x60, &(0x7f0000000b40)=[{&(0x7f0000000ac0)="88a74746f1905a3cace90cf709ad76f767c44ceb20d20daddf2b9266695e51999a39727b185f4f0a45c6239a710c6dd6bb321d8679b1029ed70c5dd1db75895f142954f7250f6949d3841900f456658b3fb8", 0x52}], 0x1, &(0x7f0000000b80)={0xc8, 0x100, 0x10001, "36bceb5b16c55f0a901f07692c6472a9269b13a50928d15710b52a9bd173a5b05744945e0a65cf3b54c68f6d8845ddef6b5f2c17d44213fe430f17b3953f244e925fdbc53bc5ed9cb87ccbee46fbe98c1dcfc2373d6cfb37076b5e38429480794f9e65d2d14cb215e1002c6a11cd8e0873f40c1603d921503fb444f7907d5f682abc9a628dd8ad5971aa0c4f8c106f2dc8a7c5358592ccf4be4e37e5a23212d6c9f62576147259befd2e20abd0ba92cdf87129"}, 0xc8, 0x4000}, {&(0x7f0000000c80)={0x27, 0x0, 0x0, 0x2, 0xc8, 0xffffffff, "bc5098db1dd108a318f724b2f9384fb5fe34f96242233de9d3ff4f5346ed6282371ea099465f9c7f68d55a4be34a4a245c0a70f99774f649b29ea5bfaf3591", 0x11}, 0x60, &(0x7f0000000e40)=[{&(0x7f0000000d00)="fd52", 0x2}, {&(0x7f0000000d40)="79e6edc5eb78115fb9f0043edb12f58d69c6d6461788d6c37265af27d48fcf5c0f357016791ff4c165582d8116287fa02fc5f5e65d8d017047ad2f230e52c3dd805992b6a8a0adeb9e002191f5d0f7c78a226c61e6a41f4d4466afa19323833bf66ceed67c9578da86eb3e6aac7c1372ad13692eb3dbdb6e9347f70aa10b886eb1076719dedc694477ebc642a91841809ee7d1272d", 0x95}, {&(0x7f0000000e00)="d3aebf8cb418c537be33b27b67742549958c53166eb0002b", 0x18}], 0x3, &(0x7f0000000e80)={0x20, 0xdf024df1b246e135, 0x0, "26d519f7ff1b86c1c973088f37e3a370"}, 0x20, 0x4008000}, {&(0x7f0000000ec0)={0x27, 0x1, 0x2, 0x0, 0x100, 0x81, "62f5c58fe4eb1021d80f859c7b7f0cbd14a44448a8b91f83cc7a113450f24b96c6ee9bbfce1a583500215fd63c4af0470cde3b4eb21e535a5e95265fd70bff", 0x23}, 0x60, &(0x7f0000002140)=[{&(0x7f0000000f40)="314ecc5f12c1ffaa97e3c0d52d36231aee35842d881b465e42e3957f9c5b9f321b51b2dae92c810fb9a393c775d636817f0683a16bbbbac66de5c604a67269af2b2ade5874aec4678c620a2f480e06bf751c669f5c725ce29415519814f6ca57619e143b38fb0ab48cc7bad5908e3a16777377aa0ce5d48d735126b5a4475e599cb0d622445e61a53a24", 0x8a}, {&(0x7f0000001000)="a3f3c9d745370129f3dc4ad2865c59b7e2436ea4de80da79", 0x18}, {&(0x7f0000001040)="18019c2d3cfa1ee0e265b8c28f1ba8bf7f6c2e340b3f9fc15118b274733a905bbbddc26b5f24e8b542ec135a2a8f1c485d3fcd6c19bc1b3010684a548db904d86fbe1d6d9f2363a496f5dce336a6a95da4230c6a37a4a8b9826a4804966168035a96c70439cd6dbe421a716ff7e933ec329ae0139f3ccc9c01dbfb6fa6997aff4f4721709192e808f9f297ca62c0eff47469cb6756453246b7ef1cfcc1607d1f1f9b66dc2c2512997421103be6761f0b15bb8618810beb861908d30e3f095efbe3b5a746690bbd557ace00fadf58484e1b3c684ef913c930826549f44085bf5a78b2bcd331b7ba0c6c06de89fd1fccf4ed322edce3a011a4d13e5f16dd9338533698c90671f963e2567605ae552553b916d78d50460132dc1394e02037b4643d4bd2839de50c6ba58b24d00066ecac0dd05e70d291343ddfb45e73d4249d97ac7f40e23d57ca63cb8f3f11c9a828d9934bea06b3b1766b03d3b72174852a7c3e45d14553d6edfba0bc0a071e678c27f8e845a7e8dc48530939c1272f839c2e7b95ebba64df194e00edf326913695343ace69a05671b3f1bf4543e2dfd640fc3da793bc25c5eb6b921ec2ef096e7b0876416324feb8b4af44e7418123fde620b6eed591b34fa426d9bc9e365b298568a1de793543a1093ed9a62da8ea27616801f2ae03de24309549360607b4b0fa4c2d3f3fb662459b67e6364b5e5337c2875957f86177eaea6087c137debb883a76cc698731ddfd3c51c5806ab13ea960dadf81d1ad1dde8118a9508b3fed050b41d78f728727e4436507566147155ec892e7320b36897584fd1525ec5f9cc800e86932dc999a209b3908aa101a8a048e8ff195e71842aed0574d688b7ab08f2ee9fbaa7305519275af4db96f7f7b59f8e8e2d5aab1060cc4fd95f54d1c51bea0e48bba6258d421fb495f693747b44b3a6da4f8ebd63f79d45787b5222718857f9ea060b4fdf3c96ea4eefd66c7856bd77f620c08675dcb2572f25f59b0790c30d25350cfe930f01b4127b5b70ddcf5a485b7e8ffe9c7d58a1237cb3ef70aaa1656dd6abd16592357764c385303c8142d1a6bc8a61ce2885834dc07478645c956ce9c14dd11e382d671798f94461dc5e7365a8210ce9be9ba92cc9381659197f2aef61be91fa631a7b19a0f99807f72c465ba8a4b45b9df9f50d20e34ea45352bbc7f1960e81a2a8729cf5484023c3001531e02fbe20b94837d907eb0be70b05747a6c822375f44e0ad6be249abb265f46c35ce2d10ea5dfd1b3a728a6fe5680606b840457c423b4aa4b2f3682140ef554c64cc9da0af9e85c7d99e7a00efdd24cdb98efe9f88b6e5d82a3fd696ad4202bde371a607d3e1c50e61f904842f1292cf67a7b4f044a61f2fabb4868934163bab683e0a33c8493e1c2e1adc4943722ade532188565b7ac649587bad1dcd4aa653fe7027e3dc458fe9940e275d72441ca45bcfeda4d496389c1c1d896a842bea0dbc72a5916088a9b02d17c5f06fa32e8814d3b75470a5279439f93b6b8cf3fff4a1a41ec843d6c6f0e8a1164e307abef2a5f940ae8b554685861d6d882207bd8413787bd7d3058a0eea0632408b77a7cebca634d9df48e549fefb30ee67d08b37c877754016e05c8afdf62236b0bda6cbfba85555f52ec305729bba9fcdadfaed38c477cff2c7385fc99e5205ea40d8bf7e406537c14bd78d71e9b805057d6c1563a1a7414d580d3340b5ba8726db2cfe685777f899499012c7d0787fde27fa74a51159bbfd08a3b425f8d0d747d4fac766ca97de55c4939d85656291947ee0ced73ff7c8d02fd14efe7aa2c6a34de947b4b26d1bac4aea7ee7fad6adc84ac47fb164364b70fa092afc76ce0277b4fd3d5d8c5cd6817cc9d165e525a2e61429e57014bd7e2afab75e5f77f04616a34adc5f5fbb78ec9a4d12293ca5df635d942aba4b152336e389238ccea4b25278d55a99f1895e5aa976049e7f4c500672ad0150cd74cfc29adab1dc7f60c2855a7f8152b2961c71bd91f7999676a1a97523615647ee0f34947e9514a786ffd5f96a7a0699ad92f97af107b44ea18f36ec94f6c17a2371cb45c8670c21a829b55cc513de86d806852d06791689606cec1a4861cc966861569765ca8551405ee8e42db3b5eb8e9cf647ad56a88e1a10c79d215f93036b477dda8b6d3c0066526eb84b995dd6de807eb508fb8ed5114f08a60accb95bb940fc71594b77eb7f05c05b192b2665547bf18f29b5de82ff0318b360657c68c02520c098f8ec412e691410f37d06f86b18f9f14310d90d95be91bdf6484c864297bd7c84e121519917237f02f0f9a8f0eaba6e80a641153828dd3c8592cd3f82e9e70459a41c636fbcf434fac2d50821e474e92f13ab18ebedb5844e2026717bdaf338ae7a98afe4a71b6767c85b96f579647b1905b3812fa806927e7ef2827180978388db0ee68f2d07ddba519df55403b9b18ec6633c1010f941938d8a53c6eee6e2b8037038c0102a92e6440a22eb5d90199dd7663ff10e0ce2d166782dba81642ea776f5fb9305519f5ca09ff93b2c925468fd57f5056cd0dbceae3a04172bd98ce948b1485c372b35a473243054538a8d84211cf06b5d2cbad0bf3d8020528394444fadae5a47d8137ac730134615e9b35e1d5e4fd2c3e7f4dfcbbcfec03b48ca3f428a7cd3380b7a04abfab9a2eee2a7fa6bdbf7ff6261e8ffb35430f361e5c3997c1d0f18b0ddda7ae31e29150465b1d6be89420555d11d1a6bd792874cde2c488e8b9b5e0190ff61ad7fe1ea6775404ad8b63e8f4705b091221470b92c5cee9ea6d357338121dced176f7be1cb290d88265a5b37969fb5de0a1e11c5179d94636a46c3fe966a78c2e640207038ac78d95199e7d969864df43c8cf8311ff10eafb17eec3ec607775cd7ff25bfb3fb55365cc4968bc9f1e5961e1ac26b07725abc741fff1ebbc895eeac34130b9d59df05ffd212b44852749770098c91aaeaef570a735d4e53415a6e85aacb1c169a30ebecddc8bf22e5f9720ecb9c5bc3ef75219b1ec5a1407b338e3da19b7e3ff150c6cd179bcbdcdf1647bd07b3fa9f603bf372575afdc0bd7b132518a9abe4f10e7878ff1d1330633d40f74bdf4e35c5fda9c300b8ac1a66c49a216442aa803d223c229c2059efbe8748ad34c279a7e4fa216b2a5055b3c707a08bca055b749bdd95dfbc0c8010bea76eba56f264c8d082b1a48aca182bca9a78b31240f63a01cca80e8331b1b41ab899e858bbfb63705bf372017e8ef5d1ed164fd38172969a0b146332ad94455985f54f5970a557378331454254c392a6ab3633146fc525b900211fb12f0f18fc5c237800fb02f27f12e275379223dedb39b8a193f4e921c488c6be49646b5b3512c0e6b3644d804542a7e0e770ce10c14299110806c9ed18577278912331711c4ae2c841b9c758cbda98771673d3f71183896bed5b07852ce55c1062c2b72a7a8d3a50a539fc2f79365e26275a64eb43de04710b92f437e9231b0812d27b940e468f571f247ef24a7c64c79e70596569c3334267d6b05b4fdf66fd632ab2b79bc6baf5bbbd6740373559b2efd4bc5deb398a8de36cf7ca79a7413be78f1fe948e5064f469a8cd566495b33aae13241b47b6619c9422370a3bb34a9b090c693a5630f2ac08daecf8438b2e8ba652fb521469d65ca3a3ccf64bfaa8ca07aea634785b65545da8663b91c6b67e3afc57991bf4363997034af6a58637c5c11fca92ccf76449ac413db30743945aa882b73d292eac00c731848d57c9e6c76723abff65760b4d4730e3b48d5cc9177afdffa070af617dc4d562137d1d96b8acbbb266ba9f492f77f06f17484efd06db116f984e913e51cc24f966064223befe67c4ae5b5eccf0d6655e4ac0abe3acdb313f7c79c8331f29e646f43114a7c636a4d387bb1803af6627511964351bd5860ea6f32aeecd39f66a2584fb0ad58cf0205209b2c30d66c31a2bcc8236a41f493a986aee3066a92f01ac9f7a36bf85404d0f0c9fc299adb42ea076ac5265ef906438e9a46eed9301b0149ac19186ef43b76ee5d9000f4582f030c5116643456b8a5b5febf39c9953b148730622bee989464e0322aa79b1f94d4a40a5ecb65faea06cd96421e49c60c5aaee744d76bf23fce85f9c7e24430b1ca4fcc06c1e1c03a05e16b2d8b75239a99c73c69f47dc186c8db562a83f712df3fd5331a4611fdadaa965f244a8787e1a1ca7a3b423934d90c4c0b45cfc649694295d807440aacbdf73e8c7ec7f5d6d6546e3c1f82505dff252f41aa65c4eabaf62f4adc8961ef36615fbc041c6e95fde7a2f6f354b480108a65fc6dff920c9b951b8eadd6d4b334ee48fe9f9d3b6861698bdfe42c7c146f27b8cc3e3b258f11e364465c6a0a68ae693ab4fc3f91718c9e3ae6d0c38a89acbdde55543ca997975b397e05cb0743b1986127e71ee4604ffa7db493524bc476a2ee9a040f7f6322107bd18c96d6cfcad6195c984371dd4204785f3f087bf5c17eac31a66dded675dbdfe7992d92d122f5f0cb962dac7f6c802f0f7793625baa9d4c662182d04faafd53e4a7d1d82d8700599a998d1c68478eaa2e9796a322f956d665d668e44b9abdd13fb380ecc1604cdedff505dc3961b217117773bb7ce67ced96ed339c69e4129c4308b1fa003cf92c3a38c1421240db2d012347132cab5dcd08b09714ee9bef5c26e6c3c16597090f4f0f521c545b32f580b1e8c6bb2f7ed3feeb6faaa2be4616969e1efa302867ef544f6f2dc4f380267691d9cd74b6e6e5eb343635f3e69d357d388d1bea741bef8d4227db1039f0abe92c5e9b0a48d1338d57bd8a16020bc2a11ed446de6dfc50d2a16ea26f7dec081f3d84eadaa0bb9f1586321fb4c8496f3d869e0281394f18f31f7f9ef9d8bf87f8ff0721cd47115280cc8a85dc8279d24573abe91b01609b0c9fea170c63312eb51096696d916732834235acb13ceb9908f9fc918e29c7ed19841f2ff1a649a416161f732c8fe545a6c13a358d04b17f1ed25834f581c8e71a2162563602ac4e0638867281c8185056bd2fd42151160e48473545c0d641bdf153371ef58f666997681ff89a72e315541ed69c8697f10afdc4bb9583b36d0b51c6e14681f62c823519ee7cf95558a899ba1459e7ba23ca02fff2c804d615a3ea08a3cc33da889429d1ec0e2b75d9175d8dd43477a5547f58c00111cff891d0d32b9326ec7f8eeba6cd9ae9b50626c98e0dc7fdb353e232658947ed9844db6f9c5517a3ab5202303f001027ae3e17a46d2fc9163555113d8dc4074ad366a938399eb1ebd4d6ff2d6597bf7060bdeffaa01c1f4d3a1ddf03ba4be6663443abc4cac7b312efb6b44bd81074f2520cd6f8938762f6a4cc85303d43a8f0952180b1dbd36db9a20e33c0f6b135b3df93ce2e099df2b201345691f5d711b3fa8121b3eae4da971bb0fc44a6deeb573e17ada7935a3783b9b261a51d1755e159e651c20b59fb0ffe39af0281707f387bffa103f885624a2b9392708be713efb8f38292e15afd269ac3e824ee49121f7461a31d53811c91672236af7bec9352a534842827afa92990a99ad4304186bc414ecc8fbc43d635e43295248ac4c7cb111df57b18fe3b8bf1337958c43e57bba37f2ac7a4d28b0a8a49888068cd1cfb9bc92ea5e7950bd9502501fb6aec5f1192a59a3790f729c7eee098a04c3ade9ede5d0ec29c0fbe8fcb2626fe403f36c106f0e3c04afde768db3825f2d27713f62ba225c91813255cce63547e3044657638a773007e66594a3b", 0x1000}, {&(0x7f0000002040)="34a19b50b43f2fdbcef3b5fe1633620ba18c417e4562b4a5f51f918bd40749043ea2707a810604c62bb289292a025778bc3c8a81713e2cf784458f8814afb8cdd5daa575ba43e7bc255bdc984dd8e299a8115a95b7d143d84f112e1e78b1d2306c238ed2f5b51f94708ba01220ce8cce179ae52ec4884ad8", 0x78}, {&(0x7f00000020c0)="30c181b49899ecd60970ae591e569d8a572b11b5cb3d7941c02069c68e352d58234514fe7c57b7075c91b82214cf479ebee513deb15254db477075e18b32bcca837ea4a459bb6bfd2f0a23", 0x4b}], 0x5, &(0x7f00000021c0)={0x80, 0xff, 0x9, "e72494a404269dcf630c71e2ad588b88872cce06e2607f1661a192bbdd6964f3e39ec135434793f9e12a5bb2e0a1e242378f38dce2dfad9f2f512d203b4a4610f411fb0ea439cff7ed41ef1cf5361d5787f276c2f0267f6da932804189532215b394c28757ff984e8ea92ef6af33"}, 0x80, 0x5}, {&(0x7f0000002240)={0x27, 0x1, 0x2, 0x3, 0x1000, 0x1ff, "842ebd2aa94ace74f6780f577bcde9a25db2efa80e59c58173a9e56c7c3e15154b5532420d4a69708336081925520911b252a3b8e7b5ebbe8140b25068fab3", 0x29}, 0x60, &(0x7f0000003580)=[{&(0x7f00000022c0)="c669d67bbe35d67696ecd906e11cc2599de5a6817cf49e083bdce55a2c1979d59b42283e7dd7b331b138590248dca0550435b235b19a7f3f9b0aeefea55c061dcadf43cf4e30a90552a16c2bdc435dd1310fde3a8a63e82e2904ba7a80b3db0ccea24922dd761970a5c9f63f0eb9dc9681ee92ef581d66d6deb67c0d1542f3765c8d49f967a5b1717d54110db9667b259928a9c065ad2117ab73ea77924a2e63d821db65c716f16e6e243c3a4e77c0a54f1a5b42c3376441e40e1623102faf0a64b2380ab6cb7e7a4e4eb57d511879341b7fd2fdd4ee69896579d1385c1cfa2fe570eeed7d410dcf9ac1cb21f9", 0xed}, {&(0x7f00000023c0)="10ae8edf96f0cdd7ad7f51348dcd5729510ce51fcbf77b4cb81751cca4b85ea411553ccc31ddca460136fef9d46deadaf383146b09c6cce605870ca7dbe1b113c2724c98edd7f509ce3b908513fda8decf45f6d39f7728b56c", 0x59}, {&(0x7f0000002440)="12a4d95dd4d13bd4877144784df05f523fbaf4b0250d574eb06bef1beaf387391f250d9777ccd1544553e47b94c3df3dbcd9f84a", 0x34}, {&(0x7f0000002480)="37f47fba3539eb275fbb6dce7bfd885c4fdbc725c7d21ee7cdeb22cb6f0838e9de03ac401af8d6ce9d58342d709a675ab848a7c4919ebf525c7698bed19961166ae6fd065c2f25fd3319474d06925629fafadd4beb2381cff706a43b8ee7af415955d386b7170fa7c8e88fb0b694139091de6d49d9c299f362696acfbd649e32966809e127efbb5c1ed8f6a5c9e31660fcf850263976626120409a306dfc8d23256e8f90b9ef1090c47b4717d04770c22981551cff2912d175175f17ba2ce7c455aa9f2999c2b5f07c44943e5a2f373faa769c1e11e8c0e713624a919fc7aa4df90a5de7da6426f6416e01139296cc8ed4434f742bf7d04db45399fba8daa00b4f2bf98495b4eec6271a5d2ffc802fdb34d173be564027e9cdbbc18b985b4157ab7f84cc77683f4ac31049f4fd7fe7737441ebdb6a1fb3504f503340fb13e389382f6117695a95ff6015522f3fc02b516f874dd3e513ac3212750cbda994db4f90a0ac4ec840358f895d82c9d5b7906fa70677ea312b02873a1316f289d8707958a7d0dcb7fdfed342da290f1fd8bfe0f6cecd4ac53605df6d4e8700097c1b2117c877ca74882bdfb339b9cf4cecce8bf813d818f632c149ece07577fd40355d3f6b8f25b6c0f534cb9655b82868bbc65b467877d71814ea7e499cbe906715560aa2f2e8d729398d8cccc0efa3f503767fd7d4a4e911631fcbae59dc0715aa38989b103679b20377299605acbd1a2638f826210353d14473da25c23bfe4276037babfa282b4a6d5bfb71951f5f6a9715df1cc3fd1a68c891897d04f9190bd63624e03106c65da7ed70755dcab8c7e437cf8b13ddac2d39d3bb3a0e9dade5436345ee41820cd03a0bed804388bb32f12a2a58c57321e627027aac29f2d20ea16f73544791e307fa9fdf6e40878df13328c1ff6b627a77505b4adb98faa881ee29c7f3d52a79ea3338f8b49c8d9360a5151bf41362eef55722e6577448b6fb2e27e0cb9a903005da89317c912c0c10d1c63cadb468e74fb4579d3566121cc69b522f64289f66927533c274ef65a2a6c8124f5bc82b5f3a8b59cd27fd2eeb311829e50e678d93faa1279b13c6292377d7d4baeeb70f5f8c84798e88adbfd8a4df7ce2984fbac509c1c0b76e631d6a3681207917ca0c10ec3281be460334e70ab891203d049e62405f09008b91968fe699ab7973545cfe96ab5c40097006a458d23463c910a9919af361ed196a0b1dddc07734b9ad98c334ba07c7af0bdce3fc8a9caaaf253ddc6030ea12c4a02671b98116b15f2fb1b196584af012ae3b9a707b6b582217d5bc0f77b1709c0ad8bad4d25db014c7ba3d251d46ae047245226eaf35b6c842dca22485e18069204a00476bd52e57b6cbbc338c149c486f1a047c89296e0c8a6c66e623f732c64485eadca79120fdaeedd56c71e3824975f9e1bdc8dfdac6263db38b193e9387f6491ab9bc103dbe275dc054438e08118ac36a58d5173f49146dd054c04f10e441d628936b3bc35b0f27d3daf33f0a542df385808c8cc26b00a2354a79be4d7e35a62aea813768f4e2eeafc65f2ab8596799ac3a1f324689a9ce0f010ed4f245b52d21cb90cb5a84cc637ad50ecd86b054694d94e03b232fe1d9e33090b6795cce6b477a1269b96ead3fa6a4f1ba6817beba3148efa5f6e265f50e5884c8bf4ddd67037fa84bf76bffc303f6e333eb7f3ab7bdfe37184cf297d38b78310bc6f28d2e771399da8d7c3b63c2ca26ff8daa5bf358a1b7df2a75e999d3b7d26b83dcd0fc0c37a54a28da6e05e3b6416dd2cbc1ed06d9056e85f52828d809a569981ed7085986d3e4d3ee2914330aae009507d0ad4549e19cdcd74f57629add750b9a3d97d33b1f11c5f4b2fbbd85ac5e8576f65d9cc4e69b9febfb76b9490db6b4f9b9d09a4d92dce78b965fdcc1a446e54bad21d742146746d08276e851eefb3e7e838a10840fd920fd98095a937b9d5ca0058ed200477363aa3e926c3c96c63ceacebf9fceb45953ee3bf2c515b24efc7c91b575ff0b32a7bd0c0f7f06adf245f9ad4da1cbf368194b3f648cbab5c4d1305482bfd6b30c140715905df657d04c568a58957e756bd1fa8a5a084580f9bad2ce702a01af448ab2ba17c4f3b439c42ed1cdadd9b8683e59269a302c01c37e32186a6d87a3fd6d3fb02b145b67b20adda37cc1d937b6834caf664ef54f536e0a64f97708bc8aac15cacc39b8ec2f6ab651d0f5b11f0ff492a30b8aefaf7abe7ab442135d658e1d4f6118e2e17cdf25cafce13a435506994ed8d0e22b2c8f002af29a8d622c6da30ec84aebf60037cedc94c8da935352256d2e42ca2ce0f60cc842ede3e69b4f23346b685e1be38b819e762d223d3b0bcf73d1126c607ca01a6add533f2c5b77c55491713c3ed400cd3223bba0f63674278aacbcd6df31664bad925a88c0fe3af2c2194e669a8ea709875d754e50a10e90e16b90666cc4de81a1bfd7ec75ba999bb3d36e8b98fbfa55893d15eb3d6b69b237f160bcb6ae1c5182e802169c7fae4ba44f35f3b4f4c1115b991cea15d29a696c03b321f88e53314495617af8f283a91a203bdf7f011646fb39db0d11e34a06e7798d9660b879d9c6aaaa72ac904984dd2c77c25d5a32568e76c07ab9a78e688c5445cf234e4faae6b703bb40b2dafcc277b1da8895c4add8334c216146005ccc23fb5599f7953e9e8ad911bc30302a74c491dda8a1eb904a5f152903f76143d53029ed0a7a690278fc12f108d9dbf6cae98b5b7a17319ad33a78a0d20842025cb46e32e085ba4b7a53fafeb55e7c44a900950dc4da6fe4ce38a3de979a1e388acb74e2e137eb470e15307596c305b8cf73d8cdfc3201c850605ea6a1cf0d88d6a698833ee7f776e73fb315f7701327be4770676aa8f316fed089ce0a0598fa8a08dbefa979c6f165de58f29e22e7a27efd61aa79c8daa9bb9c2adff064c47d337528806078bbe9156c64ddbd556dfcc0ff3d814b9a7ca8aa9457832a14cea3ab785da3c420d8646ff9e3481db614ce19b869a037d6592d4d6379ddf2f63627ac28c5a62adc03cf11d2ab55ddebf31526995cb341c8614c906f7f8a30cb24c3cd804f808d226065458d73728e9115b1a5ee130a6aea9f33ff5a3656470e722acf9bccb78709175b8c6ec8dbcd3fab51cba69f6433185497df422e8e520883e972eccac1edbbe73827bc1b897ae6be53a3f32a90c56db889bd3c376eb1a193788ae1e039499d4d6ba6a3a08a011894611947e3d7583eb42a99a3e0aa4b6b979dd37a1d5098d0f3a1a959584acc44f85a13d86e767e50824d4fda2ca893acb2c80e0f64cd6e584a7b699389a0998aff7851a101c17b5ace45262a57a1492607a4ee21bbf32f67ebfe90adaaf402d96072f3e06c1298853134fd8be4f91bb81f81d1ccda612e8b079ec2afdd72cf769f5147e70745a84022ff09eddfbc3827f2db8fb42fbc6cbba128f63be12b1a7a4f02f04542acdabf79eedc06072c1a1cfaa206eabe3659b99486eb03157609220a34a18075544c4cb7ef8ed98f2a22cd9b7874c6fb385cc857f221b953eabe8332f8ae03ca7363d84b31973ce51e81db2a9484cce0350a2e703185d02e3f478d985d61163c5a507b3720a61f447293441bf115877ac45d12892f7e94a29608c8b0419d6888e12a07b5c2d94c37f0e5eb7c822688bb4fad6a9891637f50c26c9865823be6dc61006f219bdcc7392a6fa712d61ee9253fa873d0b684da3f4e125d4dc6ec5f88269b237eeace1a7bb4fa9bd3ea7acfd0158b5f769613567d821b025b9e7f3276542a0835c33bed8eced694f4d3c6706768bd632a376b6dcb9c12a624b2dacc367a56e8634cbc4ebe0c40e91efb7b4de806cdb324e8e7bf4f25e32fea135a708bf50cb2e6e2e964e0086d3f49b75d66279f30501cc9c1392e6c1615e3c211d07a3d00be15e862a04484b5e346ff78fd835796c33e91be0baf74af968dcf8297d64a1fa9626f8bbc27764ebab767f82dcdc46467d6c48f6efa11b23f95e698b5ecaddcb1a96971ac22f49e8cb2222e682a759c113fdc7ff4d6b1d6a33f2075501880bd66f355ce9bed0263ff11f0641c1f26ff4ddbc83e7c523a4304092b1d02c17e7d5d9e6a5965848bb9aafb204009af20f68fc52743276548f9f2f5e7c3e9454f660eacc6713ffe112fceca69aee4ffe5ac75849e56c48d2758d60c4575c831e3c28ca95062c20f15c21a4a13d496c066e241e7f4f96642c1e6a05b11dbe760818cfee82274cbb96add03b0bbe034d2b9801450a991c7d6b07e0c90919e65abcfe0524f25b7a1f6669408f07277418ce6f8a2e60c2344cc5fff05e63644bbaa5e160fb21a98c638ca91aa3893ba40ce3004b32f4d72a032309959ef58e86d8219111b57659d1e991cde4eb709ad93ed487633a4ca23c597e177d0846126f8dc8d4ee843d7196413578d0137c3ec568522af2d977926fdda358ffc5c7206a0766fa1366e81e783efe57e5ef51fb398c61e90078c1cfefbfb8d5469ec9989c9eada28ab519e747a174a3476751c6f7e39f3b9fea01045c1026baa945006508a45ff55cd10606590eefdcf6bac2b2f9b07da5692422d2ba21121720fe036725cbc5b89602bb60f751b3c5cba8bd6e0acfdebe00295fb78f14ed56c38a230ee5688fdc2b6d78b971f95ad4473e0570105cd69330a8aba93823d090cb8bbcb3fadbbe3cf5beea25ae2500d481d0161842dc277123bf89adae7eb1bf97bbd93034536dbe2eb9519b152a9a070e2104cbf100db2692de5199fcc8baf32c210c8d928d0ee068c1b066b684a4dc5bed0fd5faa5072518d7a02e2c9d9c3ee1ad1ba5bc3a1a4cc119c22364d7329f0466354a0d365dad777fbfdf0e295a22414458dd49f46a3cf3a71fdc821f09919078c1a01b33e87ec6788d0934a2beeee7396ea6c87fff659ac546eab33c3666abb84b4226fb0444d30964fdcb8ca3201d897ca2df1198537f4fd9c92af2ecbcb6d302140227db3eb4f876edd74be152f52a14ebf25fb63f98dc9063b77037da336a25014ee3b357246542e502547ee8351b9551f33e88ff6dc5bec7da297002357cb8f61ff139e25b650e7099da337aea42edc48e4ae4e76fa5d6c669351c81ea9379dc7d5ffb7ef339426e0880327ad0074aeb26adfed05b8539cba96321fb722348809660fc990ec983e4a37c74953abf514b90909678103a712c81a936a6d27ad8cfa29f3a558fb5e0fc3697e0c83df9f4cc222ed76f62edd981b89ff74f0dc1df321c1e7bcd6740594c3600368699e68b313de408d702f3fa135a6a2b8f025368341f2aaae23f1267a6c86695262c72e8b5598df527bbbb27dd3cc9d4991f7f74a63f40fa98cc310fb988e3c8234b806baea2afca55e3cedfbe9f5bff28ba46e10cdf818b5629a9d0ec73de2ad12f43cf2da59ee900383a6babe3e221659307ce9f0270d3f22390a868e8ec30910038e3eeb1e5b9dff516c5f5d24d900f1397a0e8946cf8e510cf5d55eb468be01c0da25f450d3c26dc7bf2c467535489b8d5876b47fd413f88f73e61ef89f3fd873ed7435c54adf257f8ff2209b441067540c79427b811ba27a9d82fab4368ce52bbab1d23104d690ed1410626c09eeef932c5e5ccfd556a4db477d65a639313601a4f71cf2afee48f27a70fc0dadc826399cc75d6450921aea32226a0e6991d3c1df9147e29776c0c0145cc7e0af5999c51ccf5ebb73b7c976b8a360686ec25dd685cbe9a997dfe4fdc1d91d88275589c1d3086d29b2e90de60d804615e4ad65228f", 0x1000}, {&(0x7f0000003480)="ee7261b60848428ba34d6997a85f628b9e3bc199d38372897024eff0faaada0aac45331fd59d36bc598f774125ce6168d146ed87c04ad31b3909539288393485aac91b1a12304c61310cf5a410ee1430854508c1f50f518d64b89954e377a99c0fcaef537cf188b6f8c297a4024f7449636f957567988fc4d2f2b49631555df0caf815ffe603154b7d54361dc88187d1e8f3092514f5986594b6ef6442dfc93bbdda0ff878021398c6f0546b89ae5e2bbb40dae131c5a8c45700741b4e55d167cbd295c2fcfb3cfe79d7b880", 0xcc}], 0x5, &(0x7f0000003600)={0x100, 0x109, 0x200, "32393912def14c326ae6a70fd42d5fdc5e9e7bcaa68dd1666e53e992843920f091f4f274e7e6aeb722194c884327e9cdd4d29ca6d0cd427b1263883075ceabdd05149722fef742dd19f67417a65010d3011be63b5e9ee9b33909441b6d2b723f8e487efb0ff95d0e3083da83a93f930dc5adc1a356314d3a0c63b929da6d2f0f44003296eb4802c188c9af7bb44e73a4bee9163dd39fb7dc3203f9da0a804cc009c626e2ed6ecfe763c002d4c4bc69c5c32c2fa5ba9b2d7f1b040bd545b77e0a7e151043bdd25a9356bac8515a6bcdae304347daf65e9d4eb56a83de97fab2d79e6342dfbf74a80ae0c069d4"}, 0x100, 0x40000}], 0x6, 0x4000) sendfile(0xffffffffffffffff, r4, 0x0, 0x80b0) 11:52:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x300) 11:52:40 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}}}}}, &(0x7f0000000100)) [ 942.576404][T17744] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 942.584458][T17744] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 942.592860][T17744] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x3000000) 11:52:40 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}}}}}, &(0x7f0000000100)) 11:52:40 executing program 0 (fault-call:0 fault-nth:82): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 942.859777][T17771] FAULT_INJECTION: forcing a failure. [ 942.859777][T17771] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 942.873006][T17771] CPU: 0 PID: 17771 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 942.873012][T17771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.873015][T17771] Call Trace: [ 942.873034][T17771] dump_stack+0x1d8/0x2f8 [ 942.873050][T17771] should_fail+0x555/0x770 [ 942.873064][T17771] should_fail_alloc_page+0x55/0x60 [ 942.873073][T17771] prepare_alloc_pages+0x283/0x470 [ 942.873085][T17771] __alloc_pages_nodemask+0xb2/0x5d0 [ 942.873103][T17771] kmem_getpages+0x56/0xa20 [ 942.873112][T17771] ? trace_lock_release+0x135/0x1a0 [ 942.873122][T17771] cache_grow_begin+0x7e/0x2c0 [ 942.873138][T17771] cache_alloc_refill+0x311/0x3f0 [ 942.891066][T17771] ? check_preemption_disabled+0xb7/0x2a0 [ 942.891082][T17771] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 942.891091][T17771] ? btrfs_mount_root+0x12c/0x1050 [ 942.891102][T17771] btrfs_mount_root+0x12c/0x1050 [ 942.891116][T17771] ? vfs_parse_fs_string+0x13b/0x1a0 [ 942.891127][T17771] ? trace_kfree+0xa0/0x110 [ 942.903109][T17771] legacy_get_tree+0xf9/0x1a0 [ 942.903120][T17771] ? btrfs_control_open+0x40/0x40 [ 942.903130][T17771] vfs_get_tree+0x8f/0x380 [ 942.903142][T17771] vfs_kern_mount+0xc2/0x160 [ 942.913409][T17771] btrfs_mount+0x34f/0x18f0 [ 942.913429][T17771] ? legacy_parse_param+0x37b/0x880 [ 942.913442][T17771] ? cap_capable+0x250/0x290 [ 942.923210][T17771] legacy_get_tree+0xf9/0x1a0 [ 942.923221][T17771] ? btrfs_resize_thread_pool+0x290/0x290 [ 942.923235][T17771] vfs_get_tree+0x8f/0x380 [ 942.933154][T17771] do_mount+0x169d/0x2490 [ 942.933166][T17771] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 942.933173][T17771] ? copy_mount_options+0x5f/0x3c0 [ 942.933184][T17771] ? copy_mount_options+0x308/0x3c0 [ 942.943891][T17771] ksys_mount+0xcc/0x100 [ 942.943904][T17771] __x64_sys_mount+0xbf/0xd0 [ 942.943916][T17771] do_syscall_64+0xfe/0x140 [ 942.943931][T17771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.954548][T17771] RIP: 0033:0x45c27a [ 942.954558][T17771] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 942.954563][T17771] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 942.954572][T17771] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 942.954581][T17771] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 942.964750][T17771] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 942.964755][T17771] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 942.964760][T17771] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000080)={0x2, 0x6e, "adc7a3d6462d24747b6690135f4373e6993dbfaf60ce5a8f92e6e916ca90b9d24b3740d10c4b6ef351917aa096b22dedb265b83cd377e5f8557e0577cb306681b96bf9a790af17770fbed231d8a0b2240736c89837ca1e38f552c8c9501b866839ac471b17915bc9be234072e73c"}) 11:52:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\xf4', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:40 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000}}}}}, &(0x7f0000000100)) 11:52:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0xa4ffffff) 11:52:40 executing program 0 (fault-call:0 fault-nth:83): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:40 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x2, 0x30000) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) writev(r0, &(0x7f0000000780)=[{&(0x7f00000003c0)="c088c613864a6de38f4be7974609c96a1bffa3fef9200c36ad552beae4e0bb275da866791c353e0464e4f4ef28a83bdec7aab7debb845608d800f61e7c296aa5530498a83a5331b18cd6947b711e78a4484cbd1f70c21c0d7314ffaa67ff7db51f89e17db51d05eadc59e23e41fdae4d75974da457c2dbabd79326132e2d8ec53c7bbfd037db069b0aeb374f1cbbe3c2767f61f435fc91e30eb05241d14299542c0f4996ca2abcd172a43c154bd0b93f3cae349be880862b0a36e8b07c60a35d77352ebbe61715c756ca58bacd2f0935c2b3", 0xd2}, {&(0x7f00000004c0)="3101067e82a2e4ae1f3d541fdad8a9387ff143cff4b9cf904547268b69aa3f39c52558efd2ccb541f44dc121d480b8189ded66de6420d7644bce03d117761eb322621ebb3233b61d8f8df0299f931165372af2ab15a31e5e542321b9b0b13f91bc8c6606c9fb27cfb1fec1b4ba2c532953f28a3e334322e63ea6369a0df78c5b5591222d556f6d00945f81e9a9f628c22391db3eab21", 0x96}, {&(0x7f0000000080)="7d66a7f19b36fb4fae987ddfaccb259f2fc83300d064ae2d56e5f28384f07c614e735225a4fa246237aaebb62979005a6bc1d1ce4c4ccb154b316752863e5e42ee3c9c6c05b83be6ac8620ca", 0x4c}, {&(0x7f0000000580)}, {&(0x7f00000005c0)="42a9c6256a49e926ff8dea74a88f6f316ae2b4cdee093c08a926e29bd25f3f07dc4befdd2eca283a490180b3a56299279680db6a2f3ed45e8a9176c038b5fb8d217a0b0fafd47492827c0eba7161cf47ccbcfbfb0a73f14c5987b5d705f07d8815197125fe1d6ef683e148bf448ded50eb87da03b2d0700ee3a0c9b11b9a", 0x7e}, {&(0x7f0000000640)="b9d3a17a6a5fb653c597d81fdb6af80127db2d0a79f635042c0c8fcdc31166be60207dd7c939216d14ecb676cafe7b818ca7ef49ce593f3169950521bd73da0e0e6bb76c3a54137c71cfd474617df772ebde8ce905352fe5e8a2011ae707a278eacedf4e5513c4817f319a9778feb40d8eeebd0fe8", 0x75}, {&(0x7f00000006c0)="66fdee3ddcf80ec67deabbd541d089df02083f1fa75500158f4e1de746f5c0b926a118a13755acad29b3eba9f5a447f3e075fe57b521b6863d4024d9bfae37ea9c4351f53f", 0x45}, {&(0x7f0000000740)="e016a695eb0f4603c6a6c290f2f5373c5616f49035ff7fc96a2c8b1a15be467dfb77e1121f3b4717b14283060f253f3b9e470857ff23", 0x36}], 0x8) r1 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x200000, 0x400) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x80, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='syscall\x00') syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x4, 0x44000) syz_open_dev$cec(&(0x7f0000000300)='/dev/cec#\x00', 0x2, 0x2) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000580)) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x200, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ubi_ctrl\x00', 0x400, 0x0) openat$cgroup_ro(r4, &(0x7f0000000180)='\x00\x00\x00\x00\x00\x00\x00\x00tat\x00', 0x2761, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) setsockopt$inet6_tcp_buf(r1, 0x6, 0x21, &(0x7f0000000000)="9f332325f3e1d01743179110fda7893b540034f6384382fe10c0b37aea426001928506546c46c282076924b546fbefa1646f9aaf6d298c3bedbb20daf90b9a267a525b545ff2a951b62e8b31b9114759afdf694b936425168c8d705ec2fa5e3b6fa06a38e3f1f5b40dfc3b962554ff23f03bd8a22aecbfcedcf70cb8fa40", 0x7e) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x400) ioctl$sock_inet_SIOCDELRT(r3, 0x890c, &(0x7f0000000840)={0x0, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e21, @local}, {0x2, 0x4e22, @loopback}, 0x2, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000800)='bond0\x00', 0x4, 0x1, 0x7}) 11:52:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0xffffffa4) 11:52:40 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}}}}}, &(0x7f0000000100)) 11:52:41 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000}}}}}, &(0x7f0000000100)) 11:52:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x300000000000000) 11:52:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='/\f\x00\x9b\x04)-8\a\xb4\xbf\xdd\xe1[\xfc\xb0\xf8#\xf5\x02\xf8\xe32e\xbf\xa9\x8f\t\xa3\x03]\xea\x9f\xd3\x03\x19\x87\x98_yC\xf7\xb2|\x15\xfc\xa9\x91\x9c\x94@\x92z@\x80j\xe0\a\x9c\xf4\xf3\xd6\x84B\x16w|\x06O\xbaCt\xdel\xc9i)#8\x13\x9bK\x1e&\x17}8\xa59\x82\x97Aa\xab\xab\xb9\xa4\xe0\x94s\x123\xa5\x11\x81\xa4\x8d\x89\xdbcT\x87\"\x11\xecg\xb8U\x8d\x8f\x13\x13\x1at@@4\xc9Q\xf3\xc6\x0e\x9b\xdb!\x10\xfdg\x8e\x18\xc1\xbas\xceY\xd7\xe7\xb6\xb1\x8e\xf9\x80\xb3\xe7S\xb9\x92\xf5\xd09\xdbn~\xf3\"#B\x93\t\xcagQ\xa6\xa2\xbf\x11\xfba\xe7\xe9\xe9@\xd5\x888$p9\xb7\xbeM\x9d#\x87\x9a\xd3\xc0-\xf2\xa4\x85\x03\x02\xf1l\xaa5\xde\x02G\x1eX\xb7\xaa\x1el\xbb-k\xa1\xf2\x1a}T=\xcbFq\xb8\x18\tGv\xb5kR\xfa\x1f\x93RgA\xf6\x81o\xca\xd8\x8az&\x97A\x97\xe4\xd4\xe0\xb4\'ds\x1c\xf1\xf69\x06\xbe\x90\xaf\aN\x17\x06\v\v;\n0\xb4\x88\xf189\xe1g\xb0\x8f\xcd>\x7fI\"\fd-%\x94\xde1\x88rW8\xb4\xb6I0\x89$\x8a\xf5\xb9\xca2\xb7\x83\xec\xa3k\a\xee\xba<\xf3\xce\x87', 0x2761, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000280)='-\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000000)=0x1000, &(0x7f0000000b00)=0x2) r2 = socket$bt_rfcomm(0x1f, 0x1, 0x3) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000200)={0x9, 0x428, "efd01db47c9727dda9f22323ea53869a08fbb5af42ed97ee2f956cff969cba463af0e932a91fbc5e0482a864f2b1f6e5e6514ff4820a9eefc18072c6ce63c7b5dae71f1251d821d4e8874dfc692aca269540f1b3bacf1aff26137f57bdd6528cf9c5b95e5e155c63b5db7b38a4ab19"}) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x0) [ 943.455916][T17790] FAULT_INJECTION: forcing a failure. [ 943.455916][T17790] name failslab, interval 1, probability 0, space 0, times 0 [ 943.468651][T17790] CPU: 0 PID: 17790 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 943.476538][T17790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.486594][T17790] Call Trace: [ 943.489975][T17790] dump_stack+0x1d8/0x2f8 [ 943.494307][T17790] should_fail+0x555/0x770 [ 943.498724][T17790] __should_failslab+0x11a/0x160 [ 943.503657][T17790] ? xas_create+0x1197/0x1910 [ 943.508329][T17790] should_failslab+0x9/0x20 [ 943.512834][T17790] kmem_cache_alloc+0x56/0x2e0 [ 943.517595][T17790] xas_create+0x1197/0x1910 [ 943.522199][T17790] ? perf_trace_lock_acquire+0x97/0x3b0 [ 943.527746][T17790] ? trace_event_raw_event_lock_acquire+0x210/0x210 [ 943.534328][T17790] xas_store+0x95/0x1440 [ 943.538570][T17790] ? xas_load+0x434/0x450 [ 943.542906][T17790] __add_to_page_cache_locked+0x5f0/0xbf0 [ 943.548627][T17790] ? workingset_activation+0x2b0/0x2b0 [ 943.554081][T17790] add_to_page_cache_lru+0x156/0x4a0 [ 943.559361][T17790] pagecache_get_page+0x355/0xa20 [ 943.564388][T17790] __getblk_gfp+0x239/0x8b0 [ 943.568975][T17790] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 943.574628][T17790] __bread_gfp+0x2f/0x360 [ 943.578954][T17790] btrfs_read_dev_super+0x8a/0x220 [ 943.584062][T17790] btrfs_get_bdev_and_sb+0x1ec/0x280 [ 943.589345][T17790] open_fs_devices+0x14d/0xb40 [ 943.597445][T17790] ? list_sort+0x7f2/0x860 [ 943.601859][T17790] ? btrfs_open_devices+0x1c0/0x1c0 [ 943.607051][T17790] btrfs_open_devices+0x11d/0x1c0 [ 943.612071][T17790] btrfs_mount_root+0x6ef/0x1050 [ 943.617009][T17790] ? vfs_parse_fs_string+0x13b/0x1a0 [ 943.622294][T17790] ? trace_kfree+0xa0/0x110 [ 943.626802][T17790] legacy_get_tree+0xf9/0x1a0 [ 943.631483][T17790] ? btrfs_control_open+0x40/0x40 [ 943.636511][T17790] vfs_get_tree+0x8f/0x380 [ 943.640927][T17790] vfs_kern_mount+0xc2/0x160 [ 943.645514][T17790] btrfs_mount+0x34f/0x18f0 [ 943.650027][T17790] ? legacy_parse_param+0x37b/0x880 [ 943.655234][T17790] ? cap_capable+0x250/0x290 [ 943.659827][T17790] legacy_get_tree+0xf9/0x1a0 [ 943.664500][T17790] ? btrfs_resize_thread_pool+0x290/0x290 [ 943.670218][T17790] vfs_get_tree+0x8f/0x380 [ 943.675523][T17790] do_mount+0x169d/0x2490 [ 943.679846][T17790] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 943.685383][T17790] ? copy_mount_options+0x5f/0x3c0 [ 943.690494][T17790] ? copy_mount_options+0x308/0x3c0 [ 943.695690][T17790] ksys_mount+0xcc/0x100 [ 943.699925][T17790] __x64_sys_mount+0xbf/0xd0 [ 943.704508][T17790] do_syscall_64+0xfe/0x140 [ 943.709012][T17790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.714897][T17790] RIP: 0033:0x45c27a [ 943.718786][T17790] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 943.738477][T17790] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 943.746884][T17790] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 943.754850][T17790] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 943.762823][T17790] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 943.770791][T17790] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 943.778871][T17790] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0xa4ffffff00000000) 11:52:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfst', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:41 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8004020000000000}}}}}, &(0x7f0000000100)) 11:52:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x1, 0x2, 0x3, 0xc4b, r2}, &(0x7f0000000100)=0x10) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) 11:52:41 executing program 0 (fault-call:0 fault-nth:84): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:41 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000}}}}}, &(0x7f0000000100)) 11:52:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0xffffffff00000000) 11:52:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000200}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb4, r2, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffff}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xf689}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fff}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x6, 0x8}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x65}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x2, 0x2) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b1) 11:52:41 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000}}}}}, &(0x7f0000000100)) 11:52:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'L+', 0x434a}, 0x28, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="00080400000000d0"], 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r0, 0x0, 0xfffffffc) sendfile(r0, r1, 0x0, 0x10000000000080b4) [ 944.060218][T17832] FAULT_INJECTION: forcing a failure. [ 944.060218][T17832] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 944.073557][T17832] CPU: 1 PID: 17832 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 944.081435][T17832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.091478][T17832] Call Trace: [ 944.094862][T17832] dump_stack+0x1d8/0x2f8 [ 944.099192][T17832] should_fail+0x555/0x770 [ 944.103608][T17832] should_fail_alloc_page+0x55/0x60 [ 944.108796][T17832] prepare_alloc_pages+0x283/0x470 [ 944.113903][T17832] __alloc_pages_nodemask+0xb2/0x5d0 [ 944.119276][T17832] kmem_getpages+0x56/0xa20 [ 944.123772][T17832] ? trace_lock_release+0x135/0x1a0 [ 944.128993][T17832] cache_grow_begin+0x7e/0x2c0 [ 944.133788][T17832] cache_alloc_refill+0x311/0x3f0 [ 944.138807][T17832] ? check_preemption_disabled+0xb7/0x2a0 [ 944.144522][T17832] kmem_cache_alloc+0x2b9/0x2e0 [ 944.149363][T17832] ? getname_kernel+0x59/0x2f0 [ 944.154118][T17832] getname_kernel+0x59/0x2f0 [ 944.158705][T17832] kern_path+0x1f/0x40 [ 944.162766][T17832] blkdev_get_by_path+0x71/0x270 [ 944.167809][T17832] btrfs_scan_one_device+0xbd/0x450 [ 944.173001][T17832] ? btrfs_mount_root+0x477/0x1050 [ 944.178104][T17832] ? trace_hardirqs_on+0x74/0x80 [ 944.183034][T17832] btrfs_mount_root+0x4af/0x1050 [ 944.187968][T17832] ? vfs_parse_fs_string+0x13b/0x1a0 [ 944.193258][T17832] ? trace_kfree+0xa0/0x110 [ 944.197760][T17832] legacy_get_tree+0xf9/0x1a0 [ 944.202425][T17832] ? btrfs_control_open+0x40/0x40 [ 944.207443][T17832] vfs_get_tree+0x8f/0x380 [ 944.211855][T17832] vfs_kern_mount+0xc2/0x160 [ 944.216437][T17832] btrfs_mount+0x34f/0x18f0 [ 944.220938][T17832] ? legacy_parse_param+0x37b/0x880 [ 944.226145][T17832] ? cap_capable+0x250/0x290 [ 944.230735][T17832] legacy_get_tree+0xf9/0x1a0 [ 944.235434][T17832] ? btrfs_resize_thread_pool+0x290/0x290 [ 944.241150][T17832] vfs_get_tree+0x8f/0x380 [ 944.245557][T17832] do_mount+0x169d/0x2490 [ 944.249875][T17832] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 944.255407][T17832] ? copy_mount_options+0x5f/0x3c0 [ 944.260513][T17832] ? copy_mount_options+0x308/0x3c0 [ 944.265704][T17832] ksys_mount+0xcc/0x100 [ 944.269941][T17832] __x64_sys_mount+0xbf/0xd0 [ 944.274532][T17832] do_syscall_64+0xfe/0x140 [ 944.279206][T17832] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.285088][T17832] RIP: 0033:0x45c27a [ 944.288976][T17832] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 944.308581][T17832] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 944.316983][T17832] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 944.324945][T17832] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 944.332907][T17832] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 944.340869][T17832] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 944.348830][T17832] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfsB', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:42 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000}}}}}, &(0x7f0000000100)) 11:52:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:42 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000140)="cec2da99d0e50b959f93af8599f6e4b1d696ff1d5cf01f67cf4f5e1de9771f2d7a8ce17cf2115aee0b31b68d16687ce78983ed57969f8fc8e8be1bb7312df7032496da382576f7cc60b778dabaab752d0ce7df4eb1ef44de5797a9c7442b5337b3b08a876f7369fed482bae99772ca7680fb4c238528bd3bf6954c2273f7f56a6d463b964399fe4d9df404385a0e0b4c9e9765c1f8cadca8368ccd0eed197cc4c090e319121594f6b32b6206ad65208a9adc4148c51b9b5ba81ca33a10bca3f67e9172de1d64") io_setup(0x5, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f0000000380)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x7, 0xe9, r0, &(0x7f0000000280)="ea87414db22bf8b523a6e29b23fb42ffb64a1c2712a526bf4055f6df85c7cd1ef1ce6991c993a07a3385f8d1ce8b3685626c17ef0f005576d712284b0d193494c9b140b2a159e43d03ba12fceccaf0352a83538d4f9a58418a687e5e95a20604a70737d32076ffc34850bc191e9c94d74c6eba54086fe8e6cbc22a11aa598ba780f2254a15a375cfdd26dddf0f0b29a0c59cef4e7b2e36d7d3d8d7ab941af1cd6e2f46fc3c5ad630", 0xa8, 0x54a, 0x0, 0x2}]) 11:52:42 executing program 0 (fault-call:0 fault-nth:85): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x90', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:42 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x84ffffff00000000}}}}}, &(0x7f0000000100)) 11:52:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x4, 0x800) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000100)=0x40, 0x4) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e22, 0x2e, @dev={0xfe, 0x80, [], 0x19}}, {0xa, 0x4e22, 0x5, @dev={0xfe, 0x80, [], 0x1d}, 0x3}, 0x0, [0x6, 0x14, 0x4, 0x1, 0x4, 0x10000, 0x7, 0xffffffffffffff80]}, 0x5c) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="14459e75405f602d"], 0x8) setsockopt$inet6_opts(r3, 0x29, 0x6, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f00000001c0)=0xb148, 0x4) [ 944.648770][T17859] FAULT_INJECTION: forcing a failure. [ 944.648770][T17859] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 944.662085][T17859] CPU: 0 PID: 17859 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 944.669964][T17859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.680025][T17859] Call Trace: [ 944.683318][T17859] dump_stack+0x1d8/0x2f8 [ 944.687650][T17859] should_fail+0x555/0x770 [ 944.692068][T17859] should_fail_alloc_page+0x55/0x60 [ 944.697257][T17859] prepare_alloc_pages+0x283/0x470 [ 944.702369][T17859] __alloc_pages_nodemask+0xb2/0x5d0 [ 944.707660][T17859] kmem_getpages+0x56/0xa20 [ 944.712158][T17859] ? trace_lock_release+0x135/0x1a0 [ 944.717351][T17859] cache_grow_begin+0x7e/0x2c0 [ 944.722135][T17859] cache_alloc_refill+0x311/0x3f0 [ 944.727162][T17859] ? check_preemption_disabled+0xb7/0x2a0 [ 944.732984][T17859] kmem_cache_alloc+0x2b9/0x2e0 [ 944.737846][T17859] ? getname_kernel+0x59/0x2f0 [ 944.742607][T17859] getname_kernel+0x59/0x2f0 [ 944.747195][T17859] kern_path+0x1f/0x40 [ 944.751257][T17859] blkdev_get_by_path+0x71/0x270 [ 944.756191][T17859] btrfs_get_bdev_and_sb+0x48/0x280 [ 944.761386][T17859] open_fs_devices+0x14d/0xb40 [ 944.766152][T17859] ? list_sort+0x7f2/0x860 [ 944.770573][T17859] ? btrfs_open_devices+0x1c0/0x1c0 [ 944.775777][T17859] btrfs_open_devices+0x11d/0x1c0 [ 944.780833][T17859] btrfs_mount_root+0x6ef/0x1050 [ 944.785802][T17859] ? vfs_parse_fs_string+0x13b/0x1a0 [ 944.791086][T17859] ? trace_kfree+0xa0/0x110 11:52:42 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) prctl$PR_SET_TSC(0x1a, 0x2) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) 11:52:42 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000}}}}}, &(0x7f0000000100)) 11:52:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x2) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={r2, 0x2}, 0x8) [ 944.795674][T17859] legacy_get_tree+0xf9/0x1a0 [ 944.800349][T17859] ? btrfs_control_open+0x40/0x40 [ 944.805371][T17859] vfs_get_tree+0x8f/0x380 [ 944.809787][T17859] vfs_kern_mount+0xc2/0x160 [ 944.814383][T17859] btrfs_mount+0x34f/0x18f0 [ 944.818895][T17859] ? legacy_parse_param+0x37b/0x880 [ 944.824102][T17859] ? cap_capable+0x250/0x290 [ 944.828707][T17859] legacy_get_tree+0xf9/0x1a0 [ 944.833489][T17859] ? btrfs_resize_thread_pool+0x290/0x290 [ 944.839207][T17859] vfs_get_tree+0x8f/0x380 [ 944.843623][T17859] do_mount+0x169d/0x2490 [ 944.847951][T17859] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 944.853490][T17859] ? copy_mount_options+0x5f/0x3c0 [ 944.858597][T17859] ? copy_mount_options+0x308/0x3c0 [ 944.863791][T17859] ksys_mount+0xcc/0x100 [ 944.868029][T17859] __x64_sys_mount+0xbf/0xd0 [ 944.872615][T17859] do_syscall_64+0xfe/0x140 [ 944.877133][T17859] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.883014][T17859] RIP: 0033:0x45c27a [ 944.886907][T17859] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 944.906510][T17859] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 944.914914][T17859] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 944.922882][T17859] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 944.930852][T17859] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 944.938820][T17859] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 944.946784][T17859] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:42 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) r1 = open(&(0x7f0000000000)='./file0\x00', 0xc000, 0x120) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x78) 11:52:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs ', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:42 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000}}}}}, &(0x7f0000000100)) 11:52:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r2, 0x29, 0x6, 0x0, 0x0) 11:52:42 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000}}}}}, &(0x7f0000000100)) 11:52:42 executing program 0 (fault-call:0 fault-nth:86): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) poll(&(0x7f0000000000)=[{r0, 0x1002}, {r0, 0x20}, {r1, 0x200}, {r0, 0x600}, {r0, 0x200}, {r0, 0x40}, {r1, 0x8}], 0x7, 0x5ab3) 11:52:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:42 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000}}}}}, &(0x7f0000000100)) 11:52:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/307], 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x10080) getpeername$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) 11:52:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) prctl$PR_GET_SECCOMP(0x15) sendfile(r1, r1, 0x0, 0x7fffffff) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000000c0)={r2, 0x3b, "ab33b19af3ad571a6ad0e724ec71d075581b83d27f14055e9ba22560141793806161a588a964cd28d1d452d211c9ad259460a4386cd7a46ed6faae"}, &(0x7f0000000140)=0x43) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) write$cgroup_pid(r0, &(0x7f0000001200)=r3, 0x12) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000001c0)={r2, 0x7, 0x1000, "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"}, 0x1008) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001240)='/proc/capi/capi20ncci\x00', 0x633f9a70bcfd8c7b, 0x0) 11:52:43 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000}}}}}, &(0x7f0000000100)) 11:52:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_FPEMU(0xa, 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) rt_sigqueueinfo(r2, 0xd, &(0x7f00000001c0)={0x13, 0xeba, 0x65b8}) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x3dfc0e2a1a5ebc67, 0x0) write$rfkill(r3, &(0x7f0000000040)={0x0, 0x6, 0x3, 0x1, 0x1}, 0x8) 11:52:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:43 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x0, 0x200000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000380)='cpuset.cpus\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x7fffffff) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000280)=0x8) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000140)) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x400000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000180)) sendfile(0xffffffffffffffff, r3, 0x0, 0x80b0) getsockname$unix(r2, &(0x7f0000000080), &(0x7f0000000000)=0x6e) ioctl$BLKFLSBUF(r4, 0x1261, &(0x7f00000001c0)=0x1) [ 945.476667][T17914] FAULT_INJECTION: forcing a failure. [ 945.476667][T17914] name failslab, interval 1, probability 0, space 0, times 0 [ 945.522753][T17914] CPU: 1 PID: 17914 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 945.530684][T17914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 945.541025][T17914] Call Trace: [ 945.544325][T17914] dump_stack+0x1d8/0x2f8 [ 945.548655][T17914] should_fail+0x555/0x770 [ 945.553071][T17914] __should_failslab+0x11a/0x160 [ 945.558113][T17914] should_failslab+0x9/0x20 [ 945.562637][T17914] kmem_cache_alloc_node+0x65/0x280 [ 945.567828][T17914] ? create_task_io_context+0x32/0x3e0 [ 945.573282][T17914] create_task_io_context+0x32/0x3e0 [ 945.578567][T17914] ? generic_make_request_checks+0x1401/0x1a00 [ 945.584716][T17914] generic_make_request_checks+0x1411/0x1a00 [ 945.590698][T17914] generic_make_request+0x33/0x980 [ 945.599335][T17914] submit_bio+0x254/0x540 [ 945.603659][T17914] ? guard_bio_eod+0x2a0/0x640 [ 945.608419][T17914] submit_bh_wbc+0x619/0x700 [ 945.613016][T17914] block_read_full_page+0x9de/0xbd0 [ 945.618214][T17914] ? blkdev_direct_IO+0xd0/0xd0 [ 945.623059][T17914] ? lru_cache_add+0x2db/0x3b0 [ 945.627829][T17914] ? add_to_page_cache_lru+0x2d4/0x4a0 [ 945.633287][T17914] blkdev_readpage+0x1c/0x20 [ 945.637872][T17914] do_read_cache_page+0x798/0xcb0 [ 945.642898][T17914] read_cache_page_gfp+0x29/0x30 [ 945.647832][T17914] btrfs_scan_one_device+0x16a/0x450 [ 945.653108][T17914] ? kfree+0x1a3/0x200 [ 945.657176][T17914] btrfs_mount_root+0x4af/0x1050 [ 945.662116][T17914] ? vfs_parse_fs_string+0x13b/0x1a0 [ 945.667395][T17914] ? trace_kfree+0xa0/0x110 [ 945.671895][T17914] legacy_get_tree+0xf9/0x1a0 [ 945.676567][T17914] ? btrfs_control_open+0x40/0x40 [ 945.681588][T17914] vfs_get_tree+0x8f/0x380 [ 945.686091][T17914] vfs_kern_mount+0xc2/0x160 [ 945.690675][T17914] btrfs_mount+0x34f/0x18f0 [ 945.695178][T17914] ? legacy_parse_param+0x37b/0x880 [ 945.700371][T17914] ? cap_capable+0x250/0x290 [ 945.704957][T17914] legacy_get_tree+0xf9/0x1a0 [ 945.709629][T17914] ? btrfs_resize_thread_pool+0x290/0x290 [ 945.715341][T17914] vfs_get_tree+0x8f/0x380 [ 945.721488][T17914] do_mount+0x169d/0x2490 [ 945.725808][T17914] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 945.731347][T17914] ? copy_mount_options+0x5f/0x3c0 [ 945.736454][T17914] ? copy_mount_options+0x308/0x3c0 [ 945.741653][T17914] ksys_mount+0xcc/0x100 [ 945.745890][T17914] __x64_sys_mount+0xbf/0xd0 [ 945.750475][T17914] do_syscall_64+0xfe/0x140 [ 945.754972][T17914] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 945.760852][T17914] RIP: 0033:0x45c27a [ 945.764740][T17914] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 945.784336][T17914] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 945.792737][T17914] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 945.800697][T17914] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 945.808660][T17914] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 11:52:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101002, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xb) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r2, 0x29, 0x6, 0x0, 0x0) 11:52:43 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000}}}}}, &(0x7f0000000100)) [ 945.816620][T17914] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 945.824581][T17914] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:43 executing program 0 (fault-call:0 fault-nth:87): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) getgroups(0x9, &(0x7f00000001c0)=[0xee00, 0xee00, 0xee00, 0x0, 0xee01, 0xee01, 0xee00, 0x0, 0xee00]) chown(&(0x7f0000000200)='./file0\x00', r1, r2) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r3, r3, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r3, 0x0, 0x80b0) 11:52:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:43 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x88ffffff00000000}}}}}, &(0x7f0000000100)) 11:52:43 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xb43, 0x100) r1 = fcntl$getown(r0, 0x9) setpriority(0x0, r1, 0xffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='timers\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x4f) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="0408000000000000"], 0x8) setsockopt$inet6_opts(r3, 0x29, 0x6, 0x0, 0x0) 11:52:43 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000}}}}}, &(0x7f0000000100)) 11:52:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000000)) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000200)={0x7, @win={{0x4a8, 0x3, 0x8, 0xffff}, 0x9, 0x9, &(0x7f00000000c0)={{0x6743, 0x100, 0x3, 0x6}, &(0x7f0000000080)={{0x200, 0x4, 0x7, 0x81}}}, 0x2, &(0x7f0000000100)="9b58a2fca822e69447831694f8fdd06fb3ad021f9cf0fbbefaac2fc444248ae7d795811eea40913f50afdfcf601a3a1c0078aa062f3b78f1e6928bc027dd3fca383a0d6d35d02088d0a1be42803b961071513d295ae4ec497a22720f54c0d7a5fe581400865a5d12d2aaf9027c15126542c773428cbecd83e22b7a20138e382d8d1fd09e8904c1e3ef684f2fbd024f4613b1ec71953b52845227689a91d35a6a68f19764fb22e522a6fde5c9258a134c91ce31de09d87bf6ff206f31a1d3fcb7c863ccb62cf6735f90a7c6981e62dddf61f9", 0x8}}) [ 946.100723][T17949] BTRFS error (device loop5): superblock checksum mismatch [ 946.119510][T17949] BTRFS error (device loop5): open_ctree failed 11:52:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:43 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x89ffffff00000000}}}}}, &(0x7f0000000100)) [ 946.206408][T17957] FAULT_INJECTION: forcing a failure. [ 946.206408][T17957] name failslab, interval 1, probability 0, space 0, times 0 [ 946.222105][T17957] CPU: 0 PID: 17957 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 946.234715][T17957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 946.234720][T17957] Call Trace: [ 946.234737][T17957] dump_stack+0x1d8/0x2f8 [ 946.234751][T17957] should_fail+0x555/0x770 [ 946.234765][T17957] __should_failslab+0x11a/0x160 [ 946.234777][T17957] ? mempool_alloc_slab+0x4d/0x70 [ 946.234787][T17957] should_failslab+0x9/0x20 [ 946.234797][T17957] kmem_cache_alloc+0x56/0x2e0 [ 946.234812][T17957] mempool_alloc_slab+0x4d/0x70 [ 946.252522][T17957] ? mempool_free+0x350/0x350 [ 946.252531][T17957] mempool_alloc+0x104/0x5e0 [ 946.252550][T17957] ? trace_lock_release+0x135/0x1a0 [ 946.261912][T17957] ? create_empty_buffers+0x53f/0x5a0 [ 946.261926][T17957] bio_alloc_bioset+0x1b0/0x5f0 [ 946.261936][T17957] ? __kasan_check_read+0x11/0x20 [ 946.261950][T17957] ? do_raw_spin_unlock+0x49/0x260 [ 946.271439][T17957] submit_bh_wbc+0x1d5/0x700 [ 946.271458][T17957] block_read_full_page+0x9de/0xbd0 [ 946.281028][T17957] ? blkdev_direct_IO+0xd0/0xd0 [ 946.281039][T17957] ? lru_cache_add+0x2db/0x3b0 [ 946.281052][T17957] ? add_to_page_cache_lru+0x2d4/0x4a0 [ 946.295456][T17957] blkdev_readpage+0x1c/0x20 [ 946.295466][T17957] do_read_cache_page+0x798/0xcb0 [ 946.295479][T17957] read_cache_page_gfp+0x29/0x30 [ 946.305769][T17957] btrfs_scan_one_device+0x16a/0x450 [ 946.305781][T17957] ? trace_hardirqs_on+0x74/0x80 [ 946.305794][T17957] btrfs_mount_root+0x4af/0x1050 [ 946.305810][T17957] ? vfs_parse_fs_string+0x13b/0x1a0 [ 946.305819][T17957] ? trace_kfree+0xa0/0x110 [ 946.305830][T17957] legacy_get_tree+0xf9/0x1a0 [ 946.305837][T17957] ? btrfs_control_open+0x40/0x40 [ 946.305847][T17957] vfs_get_tree+0x8f/0x380 [ 946.305858][T17957] vfs_kern_mount+0xc2/0x160 [ 946.305869][T17957] btrfs_mount+0x34f/0x18f0 [ 946.365605][T17957] ? legacy_parse_param+0x37b/0x880 [ 946.375808][T17957] ? cap_capable+0x250/0x290 [ 946.375825][T17957] legacy_get_tree+0xf9/0x1a0 [ 946.375835][T17957] ? btrfs_resize_thread_pool+0x290/0x290 [ 946.375845][T17957] vfs_get_tree+0x8f/0x380 [ 946.375857][T17957] do_mount+0x169d/0x2490 [ 946.375871][T17957] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 946.385013][T17957] ? copy_mount_options+0x5f/0x3c0 [ 946.385027][T17957] ? copy_mount_options+0x308/0x3c0 [ 946.385042][T17957] ksys_mount+0xcc/0x100 [ 946.394478][T17957] __x64_sys_mount+0xbf/0xd0 [ 946.394492][T17957] do_syscall_64+0xfe/0x140 [ 946.394506][T17957] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 946.394517][T17957] RIP: 0033:0x45c27a [ 946.473711][T17957] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 946.493309][T17957] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 11:52:44 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000}}}}}, &(0x7f0000000100)) 11:52:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'team_slave_0\x00', 0x34692fc1}) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) [ 946.501722][T17957] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 946.509699][T17957] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 946.517666][T17957] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 946.525629][T17957] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 946.533598][T17957] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:44 executing program 0 (fault-call:0 fault-nth:88): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_page\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7fffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendfile(0xffffffffffffffff, r1, 0x0, 0x80b0) r2 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = getpgrp(0x0) r4 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) close(r4) fcntl$getflags(r1, 0x3) 11:52:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0xebdc8e00806aa78a) sendmsg$kcm(r1, &(0x7f0000000740)={&(0x7f0000000040)=@in={0x2, 0x4e24, @empty}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="b933f04dac8702eaadd4dc1af76caae406", 0x11}, {&(0x7f00000001c0)="0f02cb7417367c5b9d5576c913ff6fafbbd03dc5d34cb23a3666308b7a730d3149be7883b835ed4ac3a2c587b78885d8fe975399703878aaf7452035417cb3c504ff6e4e0d2ac09c2e38169d4f2133f1712f2435b26905fa6c3a4ce43a787c837c67f396bda7a90140facb898e621de7e1d5cd60738404752241fe0464f76acf5071c83e8a76b1e7b9e5b438cf338e52d97d9c0bc701cfbde224e98d8c420097155bc16a93ea865bd1ee4b", 0xab}, {&(0x7f0000000280)="dc6c374168fecfd9e38aecea8be57799883d7252e7545d5d794712ce7a18605903e78f02af536f0220dc01f3c883b80c16e49ac22c23772d3b7c62633e6a141c47c670557b20ffc18fbbd298af52bfa571d79fecdc48234634efdd69e26aa2df6f4922023fd6592851440c865529996a3d185a65ddf6e410c34c645355415c", 0x7f}, {&(0x7f0000000300)="b4b9070dd3587f64db7f84e342fdd9ecf6a8f04372b8789cc24656484b2af5652ff088b4a70f86e3c3636c90d141faec6dde88b10580e9177a6f73de80e8b6ac9bc43bac963b674310adbd502804970693eed3b19822be0f42fcd06bf13430a89ba9824b176cbb698d2791d3e01aa7df4745c497bddce9eaf3b8be35b9d996464e57cd875ea3693bd4185a14468afbf53e39568e5f99b025572f196f3ad73d4d4e952d26649b2752d686f6e28c63", 0xae}], 0x4, &(0x7f00000003c0)=[{0x100, 0x11, 0x5, "a6c01e68f5c2e326b7a08c4f92ea1818ac6fedb473445cd693fc9ffe5d125ce641bd662ee8d9417cd0a235c8b8697f185e14654b2025d06027c41f7a4e6c9dbfc67b4a062fbeab29502300e4b226e21291dd201a524772f02e2a5cbf239462f5903d17324a8673f8929e174fd370086d2a5c77fad60567fa659fea246a24393a2c808f41f1b6bdaba45bfeb7ba1f7daafbed518d1aff6b1347f3e284852be6d53474d8aedd969ee78843e911ccb554633112e8a4fa34a709f78f75d708eaa2a3c4e0f4130b190e6b7a7700c3d755243f9cf8ae365d13ae42ee8a2e08a4aa36a0a2e9776472ddcb0b9ac912640fd3"}, {0x28, 0x10d, 0xfffffffffffffffe, "d3b79d1583e0388bbec5151ab6596b3ad0a54a4fbad3"}, {0xa0, 0x0, 0xfff, "4a8a12aa63d8630054eec921ab85c5d463d5828849fde8ccb957ef6b5b2b28d12effaf10ca38f931bf6e6832b0277fb496c63f57505f66437e8760eaca81d74cc7513b611589217da5f967e0c29ced102eecec7af62c124850e3880aea735041b5e54b3eb0daead7cd3ce644f907a7d0bec83c6977ab8e64c6eacd594c1c9aa1886bc1031f73d3ec578b7c3cceb97221"}, {0x88, 0x103, 0x3, "71b29ad33e8f2afbfb62ad8ffbaaab7c3cde0a29252fbe9f9ffcbacc4d0e339622efff79f7961d80f7e9da51c5971d1ce164e2f8d7e9ee84c5964cb457f3f1cbee0f6b06cb9ebd33ebd07352cf37c226b3974c42364062ea23587e1007ca5e9edfbdfafd9e30d28e813439ad8c2366350c99654e62eb"}, {0xf0, 0x10c, 0x8, "eabf5fe4dc5334fc86a7e07917570691943cb9f0584f35ca2601e6512edcbd23ee56d07505c83493b8819e3e052661e67d22cef13877d817e325792d36916a596dac3c9930eaaf2c49fed7dc6ecfae7ecc614c6743f3767e9eb5bdc839fe3c185c0c145a2e6bef3916a80736710aaecd1a8c05756cbea26d1de7e63204b00c72ddc3aebee89d7dda70f54a563ba7d0a9bc390eccd12d414aced3b6fc2607227712e372248acea8c40a20f4077a8ec3d714a6bd249cf21b37b20958fcc0856faafb644e0c1eddd1084bc2328a8b67ca79cba509ed54e2a745b886c8b50049"}, {0x40, 0x13a, 0x8, "4221b4cbab53b1ebd6086919a7d25259895ded281c146b6aac139150755bf8929e84201f1df0ab50c78a6b7e"}], 0x380}, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r2, 0x29, 0x6, 0x0, 0x0) 11:52:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:44 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xf003000000000000}}}}}, &(0x7f0000000100)) 11:52:44 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000}}}}}, &(0x7f0000000100)) 11:52:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000040)=""/52, &(0x7f0000000080)=0x34) r1 = socket$inet6(0xa, 0xf, 0xfffffffffffffffe) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000000c0)=ANY=[], 0x0) lgetxattr(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)=@known='system.posix_acl_default\x00', &(0x7f0000000140)=""/11, 0xb) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x1, 0x40) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000200)={0x0, 0x0, [], @raw_data=[0x80000000, 0x9, 0x4d, 0x6, 0x3, 0x488b13e2, 0x7f, 0x10001, 0x4, 0x4, 0x5, 0x2553, 0x6d, 0x1000, 0x400, 0xfff, 0x9, 0x1000, 0x4, 0x7, 0x200, 0x1, 0x8, 0x8, 0x9ab, 0x0, 0x4, 0x2, 0x0, 0x2, 0x6]}) connect$netlink(r2, &(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbff, 0x20002}, 0x765) 11:52:44 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) unlink(&(0x7f0000000000)='./file0\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x80b0) 11:52:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:44 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xfdffffff00000000}}}}}, &(0x7f0000000100)) 11:52:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000040)={0x101, 0x53, "91a82346b1f76564ecebb852ebf47e4674476245a9941930fe41e00cb557ae496574e0b814141496a2332d1f29c5782a129763274660ae3529b32b8669dc8f0f32581de71668004997a234ce6c603c6282793b"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r1, 0x28, &(0x7f0000000100)}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) umount2(&(0x7f0000000000)='./file0\x00', 0x1) getsockopt$inet_buf(r4, 0x0, 0x4, &(0x7f0000000300)=""/61, &(0x7f0000000340)=0x3d) setsockopt$inet6_opts(r2, 0x29, 0x6, 0x0, 0x0) getsockopt$inet_mreqn(r4, 0x0, 0x20, &(0x7f0000000a80)={@loopback, @remote, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000b00)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c40)={{{@in=@dev={0xac, 0x14, 0x14, 0xa}, @in6=@rand_addr="25c3ab12f3f74712ddedae4a8c3674cd", 0x4e20, 0x0, 0x4e21, 0x0, 0xa, 0x20, 0xf3a619e82729027e, 0x0, r5, r6}, {0x8, 0x7, 0xe3, 0x1, 0x1, 0x0, 0x4, 0x3}, {0x6, 0x8, 0x1000, 0x6}, 0xdd70, 0x0, 0x0, 0x1, 0x1}, {{@in6=@rand_addr="36ca5729314e109be23d80b4d095b793", 0x4d4, 0x2b}, 0xdd4c575b90e102f4, @in=@remote, 0x3503, 0x1, 0x0, 0x1ff, 0x8001, 0x7, 0x2}}, 0xe8) [ 946.900738][T17999] FAULT_INJECTION: forcing a failure. [ 946.900738][T17999] name failslab, interval 1, probability 0, space 0, times 0 [ 946.934145][T17999] CPU: 0 PID: 17999 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 946.942081][T17999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 946.952139][T17999] Call Trace: [ 946.955429][T17999] dump_stack+0x1d8/0x2f8 [ 946.959768][T17999] should_fail+0x555/0x770 [ 946.964213][T17999] __should_failslab+0x11a/0x160 [ 946.969156][T17999] ? mempool_alloc_slab+0x4d/0x70 [ 946.974173][T17999] should_failslab+0x9/0x20 [ 946.978678][T17999] kmem_cache_alloc+0x56/0x2e0 [ 946.983440][T17999] mempool_alloc_slab+0x4d/0x70 [ 946.988280][T17999] ? mempool_free+0x350/0x350 [ 946.992962][T17999] mempool_alloc+0x104/0x5e0 [ 946.997552][T17999] ? trace_lock_release+0x135/0x1a0 [ 947.002755][T17999] ? create_empty_buffers+0x53f/0x5a0 [ 947.008125][T17999] bio_alloc_bioset+0x1b0/0x5f0 [ 947.012974][T17999] ? __kasan_check_read+0x11/0x20 [ 947.017997][T17999] ? do_raw_spin_unlock+0x49/0x260 [ 947.023112][T17999] submit_bh_wbc+0x1d5/0x700 [ 947.027702][T17999] block_read_full_page+0x9de/0xbd0 [ 947.033030][T17999] ? blkdev_direct_IO+0xd0/0xd0 [ 947.037877][T17999] ? lru_cache_add+0x2db/0x3b0 [ 947.042642][T17999] ? add_to_page_cache_lru+0x2d4/0x4a0 11:52:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r2, 0x29, 0x6, 0x0, 0x0) [ 947.048100][T17999] blkdev_readpage+0x1c/0x20 [ 947.052682][T17999] do_read_cache_page+0x798/0xcb0 [ 947.057708][T17999] read_cache_page_gfp+0x29/0x30 [ 947.062765][T17999] btrfs_scan_one_device+0x16a/0x450 [ 947.068053][T17999] ? trace_hardirqs_on+0x74/0x80 [ 947.073003][T17999] btrfs_mount_root+0x4af/0x1050 [ 947.077969][T17999] ? vfs_parse_fs_string+0x13b/0x1a0 [ 947.083252][T17999] ? trace_kfree+0xa0/0x110 [ 947.087751][T17999] legacy_get_tree+0xf9/0x1a0 [ 947.092424][T17999] ? btrfs_control_open+0x40/0x40 [ 947.097448][T17999] vfs_get_tree+0x8f/0x380 [ 947.101859][T17999] vfs_kern_mount+0xc2/0x160 [ 947.106446][T17999] btrfs_mount+0x34f/0x18f0 [ 947.110957][T17999] ? legacy_parse_param+0x37b/0x880 [ 947.116153][T17999] ? cap_capable+0x250/0x290 [ 947.120746][T17999] legacy_get_tree+0xf9/0x1a0 [ 947.125418][T17999] ? btrfs_resize_thread_pool+0x290/0x290 [ 947.131133][T17999] vfs_get_tree+0x8f/0x380 [ 947.135634][T17999] do_mount+0x169d/0x2490 [ 947.139956][T17999] ? copy_mount_options+0x308/0x3c0 [ 947.139969][T17999] ksys_mount+0xcc/0x100 [ 947.149473][T17999] __x64_sys_mount+0xbf/0xd0 [ 947.149486][T17999] do_syscall_64+0xfe/0x140 [ 947.149498][T17999] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.149506][T17999] RIP: 0033:0x45c27a [ 947.149516][T17999] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 947.149521][T17999] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 947.149532][T17999] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 947.187932][T17999] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 947.187937][T17999] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 947.187941][T17999] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 947.187946][T17999] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:44 executing program 0 (fault-call:0 fault-nth:89): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\xde', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:44 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xfe03000000000000}}}}}, &(0x7f0000000100)) 11:52:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x200000, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8, 0x30, r0, 0x8000000) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x2) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000200)=ANY=[@ANYBLOB="00000400001da9f40000e6dfa1f947fc4bfde775ad768a00"], 0x8) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x101080) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000080)={0x1, 0x0, {0x16, 0x9, 0xb, 0x17, 0x1, 0x81, 0x6, 0x14, 0xffffffffffffffff}}) ioctl$PPPIOCSMRU(r3, 0x40047452, &(0x7f00000000c0)=0x5) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r3, 0xc018620c, &(0x7f0000000040)={0x3}) setsockopt$inet6_opts(r2, 0x29, 0x6, 0x0, 0x0) 11:52:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r2, 0x29, 0x6, 0x0, 0x0) 11:52:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x6e4c51e2b24a76f4, 0xa}}, 0x20) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r2, 0x29, 0x6, 0x0, 0x0) 11:52:45 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000}}}}}, &(0x7f0000000100)) 11:52:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r2, 0x29, 0x6, 0x0, 0x0) 11:52:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 947.455664][T18027] FAULT_INJECTION: forcing a failure. [ 947.455664][T18027] name failslab, interval 1, probability 0, space 0, times 0 [ 947.491133][T18027] CPU: 1 PID: 18027 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 947.499170][T18027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 947.509218][T18027] Call Trace: [ 947.509234][T18027] dump_stack+0x1d8/0x2f8 [ 947.509248][T18027] should_fail+0x555/0x770 [ 947.509261][T18027] __should_failslab+0x11a/0x160 [ 947.509280][T18027] should_failslab+0x9/0x20 [ 947.521369][T18027] kmem_cache_alloc_node+0x65/0x280 [ 947.521391][T18027] ? create_task_io_context+0x32/0x3e0 [ 947.530888][T18027] create_task_io_context+0x32/0x3e0 [ 947.530897][T18027] ? generic_make_request_checks+0x1401/0x1a00 [ 947.530907][T18027] generic_make_request_checks+0x1411/0x1a00 [ 947.530924][T18027] generic_make_request+0x33/0x980 [ 947.541566][T18027] submit_bio+0x254/0x540 [ 947.541576][T18027] ? guard_bio_eod+0x2a0/0x640 [ 947.541590][T18027] submit_bh_wbc+0x619/0x700 [ 947.553359][T18027] block_read_full_page+0x9de/0xbd0 [ 947.553374][T18027] ? blkdev_direct_IO+0xd0/0xd0 [ 947.553387][T18027] ? lru_cache_add+0x2db/0x3b0 [ 947.553400][T18027] ? add_to_page_cache_lru+0x2d4/0x4a0 [ 947.602219][T18027] blkdev_readpage+0x1c/0x20 [ 947.606804][T18027] do_read_cache_page+0x798/0xcb0 [ 947.611827][T18027] read_cache_page_gfp+0x29/0x30 [ 947.616764][T18027] btrfs_scan_one_device+0x16a/0x450 [ 947.622048][T18027] ? trace_hardirqs_on+0x74/0x80 [ 947.627080][T18027] btrfs_mount_root+0x4af/0x1050 [ 947.632022][T18027] ? vfs_parse_fs_string+0x13b/0x1a0 [ 947.637302][T18027] ? trace_kfree+0xa0/0x110 [ 947.641911][T18027] legacy_get_tree+0xf9/0x1a0 [ 947.646589][T18027] ? btrfs_control_open+0x40/0x40 [ 947.651614][T18027] vfs_get_tree+0x8f/0x380 [ 947.656029][T18027] vfs_kern_mount+0xc2/0x160 [ 947.660618][T18027] btrfs_mount+0x34f/0x18f0 [ 947.665129][T18027] ? legacy_parse_param+0x37b/0x880 [ 947.670325][T18027] ? cap_capable+0x250/0x290 [ 947.674939][T18027] legacy_get_tree+0xf9/0x1a0 [ 947.679611][T18027] ? btrfs_resize_thread_pool+0x290/0x290 [ 947.685327][T18027] vfs_get_tree+0x8f/0x380 [ 947.689742][T18027] do_mount+0x169d/0x2490 [ 947.694065][T18027] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 947.699604][T18027] ? copy_mount_options+0x5f/0x3c0 [ 947.704714][T18027] ? copy_mount_options+0x308/0x3c0 [ 947.709910][T18027] ksys_mount+0xcc/0x100 [ 947.714154][T18027] __x64_sys_mount+0xbf/0xd0 [ 947.718740][T18027] do_syscall_64+0xfe/0x140 [ 947.723251][T18027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.729135][T18027] RIP: 0033:0x45c27a [ 947.733027][T18027] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 11:52:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) 11:52:45 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x10000, 0x200000) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000000)=ANY=[@ANYBLOB="0002000000000000d31f822018caabae8157f0435b4fe03403d31f82a32370b426b0dd075e6477680bd65c6c9d49f4a21c06000845d021a9b2f947ddf2"], 0x8) setsockopt$inet6_opts(r2, 0x29, 0x6, 0x0, 0x0) 11:52:45 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xffff000000000000}}}}}, &(0x7f0000000100)) [ 947.752630][T18027] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 947.761037][T18027] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 947.769006][T18027] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 947.776971][T18027] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 947.784934][T18027] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 947.792900][T18027] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:45 executing program 0 (fault-call:0 fault-nth:90): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\xe0', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6(0xa, 0x2, 0x0) 11:52:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) bind$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0xffff, 0x7fffffff, 0x401, 0xff, 0x9}, 0x14) 11:52:45 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}}}}}, &(0x7f0000000100)) [ 947.937628][T18053] Unknown ioctl 35090 11:52:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 11:52:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x70, 0x6, 0x9, 0x3f, 0x0, 0x0, 0xab91, 0x10, 0xd, 0x1, 0x40, 0x7fff, 0x1d, 0xffffffffffff8001, 0x4, 0x3, 0x3, 0xffffffffffff7fff, 0x2, 0x0, 0x9, 0x9, 0x3, 0x3, 0x80000001, 0x1, 0x5, 0x2, 0x5, 0x5, 0x1f, 0x4, 0x7, 0x3, 0x6, 0xffffffffffff270c, 0x27, 0x0, 0x7, 0x2, @perf_config_ext={0x20200, 0x101}, 0x10000, 0x6, 0x20, 0x7, 0x5cb941e9, 0x0, 0x9}, r2, 0x1, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:45 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}}}, &(0x7f0000000100)) [ 947.958535][T18056] Unknown ioctl 35090 11:52:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:45 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}}}}, &(0x7f0000000100)) 11:52:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)) [ 948.086694][T18059] FAULT_INJECTION: forcing a failure. [ 948.086694][T18059] name failslab, interval 1, probability 0, space 0, times 0 [ 948.107771][T18059] CPU: 0 PID: 18059 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 948.115703][T18059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.125759][T18059] Call Trace: [ 948.129188][T18059] dump_stack+0x1d8/0x2f8 [ 948.133520][T18059] should_fail+0x555/0x770 [ 948.137939][T18059] __should_failslab+0x11a/0x160 [ 948.142875][T18059] ? getname_kernel+0x59/0x2f0 [ 948.147639][T18059] should_failslab+0x9/0x20 [ 948.152137][T18059] kmem_cache_alloc+0x56/0x2e0 [ 948.156900][T18059] getname_kernel+0x59/0x2f0 [ 948.161488][T18059] kern_path+0x1f/0x40 [ 948.165639][T18059] blkdev_get_by_path+0x71/0x270 [ 948.170580][T18059] btrfs_get_bdev_and_sb+0x48/0x280 [ 948.175774][T18059] open_fs_devices+0x14d/0xb40 [ 948.180536][T18059] ? list_sort+0x7f2/0x860 [ 948.184948][T18059] ? btrfs_open_devices+0x1c0/0x1c0 [ 948.190231][T18059] btrfs_open_devices+0x11d/0x1c0 [ 948.195440][T18059] btrfs_mount_root+0x6ef/0x1050 [ 948.200387][T18059] ? vfs_parse_fs_string+0x13b/0x1a0 [ 948.205663][T18059] ? trace_kfree+0xa0/0x110 [ 948.210164][T18059] legacy_get_tree+0xf9/0x1a0 [ 948.214837][T18059] ? btrfs_control_open+0x40/0x40 [ 948.219855][T18059] vfs_get_tree+0x8f/0x380 [ 948.224270][T18059] vfs_kern_mount+0xc2/0x160 [ 948.228856][T18059] btrfs_mount+0x34f/0x18f0 [ 948.233450][T18059] ? legacy_parse_param+0x37b/0x880 [ 948.238737][T18059] ? cap_capable+0x250/0x290 [ 948.243324][T18059] legacy_get_tree+0xf9/0x1a0 [ 948.247993][T18059] ? btrfs_resize_thread_pool+0x290/0x290 [ 948.253709][T18059] vfs_get_tree+0x8f/0x380 [ 948.258224][T18059] do_mount+0x169d/0x2490 [ 948.262546][T18059] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 948.268084][T18059] ? copy_mount_options+0x5f/0x3c0 [ 948.273193][T18059] ? copy_mount_options+0x308/0x3c0 [ 948.278383][T18059] ksys_mount+0xcc/0x100 [ 948.282617][T18059] __x64_sys_mount+0xbf/0xd0 [ 948.287204][T18059] do_syscall_64+0xfe/0x140 [ 948.291704][T18059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.297583][T18059] RIP: 0033:0x45c27a [ 948.301471][T18059] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 948.321167][T18059] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 948.329575][T18059] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a 11:52:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sync() setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000000)=ANY=[@ANYBLOB="000004000000000011003693c26ef8e222c83468112bb1ee81a4fcaf2e2cda999e0f57d5c407cfbd12bd6aa68cb5f256a82c62e52aedffa4f1107de063a8027ad11c7a393edfa7a682fd8dfb2375879a928bad7114c524febbc97c0a3452c61bf3844bf3eadcb9821ce741d81399218bb765cc6704b55f080b3c51dc"], 0x8) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x0) getrlimit(0x0, &(0x7f0000000040)) semop(0x0, &(0x7f0000000000)=[{}, {}, {}, {}], 0x1a) semctl$GETALL(0x0, 0x0, 0x11, &(0x7f0000000100)=""/45) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20000, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000001600)={0xf4, 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB="04630440000000000d63000006630440010000000b63000011634840000000000000000000000000000000000000000001000000000000000000000058000000000000001800000000000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a747001000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/12], @ANYBLOB="0c0000000000000001000000000000002700000000000000"], @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="000000000000000000634040000000000000000000000000000000000000000011000000000000000000000068000000000000001800000000000000", @ANYPTR=&(0x7f0000001300)=ANY=[@ANYBLOB="852a747001000000", @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB='\x00'/4096], @ANYBLOB="001000000000000000000000000000002e00000000000000852a68770001000002000000000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000001280)=ANY=[@ANYBLOB='\x00'/102], @ANYBLOB='f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\"\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000001380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00(\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="016340400300000000000000000000000000000000000000f1c439f8000000000000000048000000000000001800000000000000", @ANYPTR=&(0x7f00000013c0)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a62770ac0601391bf73d7536100"/36], @ANYPTR=&(0x7f0000001440)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="0663044003000000"], 0x4a, 0x0, &(0x7f0000001580)="ea74d134d8b6dbd0411760cbb5e62ea800187859adb346e433a12195f0e95c11e5a44da3b72b5b3722d9b1dcc0f8c46580fe8683a2cb231bd7b72812a6541a94e4e1735dccf106df1aab"}) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 948.337635][T18059] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 948.345599][T18059] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 948.353562][T18059] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 948.361523][T18059] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:46 executing program 0 (fault-call:0 fault-nth:91): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x02', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:46 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}}}, &(0x7f0000000100)) 11:52:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000240)) 11:52:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000240)) 11:52:46 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}}}, &(0x7f0000000100)) 11:52:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) r2 = fcntl$dupfd(r1, 0x406, r0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000000)={{0xf5, 0xfffffffffffffff7}, 0x50}, 0x10) setsockopt$inet6_opts(r1, 0x29, 0x36, 0x0, 0x0) [ 948.592192][T18088] FAULT_INJECTION: forcing a failure. [ 948.592192][T18088] name failslab, interval 1, probability 0, space 0, times 0 [ 948.629233][T18088] CPU: 1 PID: 18088 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 948.637434][T18088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.647585][T18088] Call Trace: [ 948.650878][T18088] dump_stack+0x1d8/0x2f8 [ 948.655218][T18088] should_fail+0x555/0x770 [ 948.659646][T18088] __should_failslab+0x11a/0x160 [ 948.664577][T18088] ? mempool_alloc_slab+0x4d/0x70 [ 948.669595][T18088] should_failslab+0x9/0x20 [ 948.674096][T18088] kmem_cache_alloc+0x56/0x2e0 [ 948.678863][T18088] mempool_alloc_slab+0x4d/0x70 [ 948.683710][T18088] ? mempool_free+0x350/0x350 [ 948.688376][T18088] mempool_alloc+0x104/0x5e0 [ 948.692963][T18088] ? __find_get_block+0xd2f/0x10b0 [ 948.698097][T18088] ? __kasan_check_read+0x11/0x20 [ 948.703110][T18088] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 948.708742][T18088] bio_alloc_bioset+0x1b0/0x5f0 [ 948.713587][T18088] ? __find_get_block+0xf8a/0x10b0 [ 948.718698][T18088] submit_bh_wbc+0x1d5/0x700 [ 948.723293][T18088] __bread_gfp+0x1ad/0x360 [ 948.727717][T18088] btrfs_read_dev_super+0x8a/0x220 [ 948.732996][T18088] btrfs_get_bdev_and_sb+0x1ec/0x280 [ 948.738309][T18088] open_fs_devices+0x14d/0xb40 [ 948.743072][T18088] ? list_sort+0x7f2/0x860 [ 948.747481][T18088] ? btrfs_open_devices+0x1c0/0x1c0 [ 948.752681][T18088] btrfs_open_devices+0x11d/0x1c0 [ 948.757790][T18088] btrfs_mount_root+0x6ef/0x1050 [ 948.762815][T18088] ? vfs_parse_fs_string+0x13b/0x1a0 [ 948.768097][T18088] ? trace_kfree+0xa0/0x110 [ 948.772602][T18088] legacy_get_tree+0xf9/0x1a0 [ 948.777277][T18088] ? btrfs_control_open+0x40/0x40 [ 948.782301][T18088] vfs_get_tree+0x8f/0x380 [ 948.786714][T18088] vfs_kern_mount+0xc2/0x160 [ 948.791300][T18088] btrfs_mount+0x34f/0x18f0 [ 948.795816][T18088] ? legacy_parse_param+0x37b/0x880 [ 948.801007][T18088] ? cap_capable+0x250/0x290 [ 948.805596][T18088] legacy_get_tree+0xf9/0x1a0 [ 948.810272][T18088] ? btrfs_resize_thread_pool+0x290/0x290 [ 948.815986][T18088] vfs_get_tree+0x8f/0x380 [ 948.820747][T18088] do_mount+0x169d/0x2490 [ 948.825069][T18088] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 948.830607][T18088] ? copy_mount_options+0x5f/0x3c0 [ 948.835834][T18088] ? copy_mount_options+0x308/0x3c0 [ 948.841135][T18088] ksys_mount+0xcc/0x100 [ 948.845377][T18088] __x64_sys_mount+0xbf/0xd0 [ 948.850052][T18088] do_syscall_64+0xfe/0x140 [ 948.854552][T18088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.860435][T18088] RIP: 0033:0x45c27a [ 948.864324][T18088] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 948.884032][T18088] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 11:52:46 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}, &(0x7f0000000100)) [ 948.892434][T18088] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 948.900396][T18088] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 948.908360][T18088] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 948.916328][T18088] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 948.924465][T18088] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 11:52:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x10', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x0, 0x8) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x1) getsockname$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r2, 0x29, 0x6, 0x0, 0x0) getsockname$unix(r0, &(0x7f00000000c0), &(0x7f00000001c0)=0x6e) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000200)={0x10000, 0x3f, 0x5e, 0x8}, 0x8) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000380)) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f0000000280)="33d94abdbfa866cba204cb287101d6bdf40c7e58a86cac81af58577daca9534410c1f6de417454480306e5667c1af6995821d3e5d66f3d6e4a6f6f9e44629e9558939a1e82d22194d5c9f9e39935aa5ff3fa64576fedca269aa48d5fd048d44d3c31c19707de689f747a9e10d3235ac43f0d27fa9e7a976136aafe769f4640e3c378f70393b8258ba3980b") 11:52:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000240)) 11:52:46 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}}}}, &(0x7f0000000100)) 11:52:46 executing program 0 (fault-call:0 fault-nth:92): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x06', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 11:52:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)) 11:52:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) 11:52:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)) 11:52:46 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}, &(0x7f0000000100)) 11:52:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="0005000000000000"], 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) [ 949.206098][T18117] FAULT_INJECTION: forcing a failure. [ 949.206098][T18117] name failslab, interval 1, probability 0, space 0, times 0 [ 949.241802][T18117] CPU: 1 PID: 18117 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 949.249726][T18117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.249730][T18117] Call Trace: [ 949.249747][T18117] dump_stack+0x1d8/0x2f8 [ 949.249763][T18117] should_fail+0x555/0x770 [ 949.249779][T18117] __should_failslab+0x11a/0x160 [ 949.249790][T18117] should_failslab+0x9/0x20 [ 949.249800][T18117] kmem_cache_alloc_trace+0x5d/0x2f0 [ 949.249809][T18117] ? btrfs_alloc_device+0x78/0x5a0 [ 949.249820][T18117] btrfs_alloc_device+0x78/0x5a0 [ 949.249829][T18117] ? blkdev_put+0x2c8/0x3b0 [ 949.249841][T18117] close_fs_devices+0x4ae/0x910 [ 949.249857][T18117] btrfs_close_devices+0x33/0x130 [ 949.249867][T18117] btrfs_mount_root+0xa9d/0x1050 [ 949.249882][T18117] ? vfs_parse_fs_string+0x13b/0x1a0 [ 949.286827][T18117] ? trace_kfree+0xa0/0x110 [ 949.286840][T18117] legacy_get_tree+0xf9/0x1a0 [ 949.286851][T18117] ? btrfs_control_open+0x40/0x40 [ 949.286865][T18117] vfs_get_tree+0x8f/0x380 [ 949.340111][T18117] vfs_kern_mount+0xc2/0x160 [ 949.344706][T18117] btrfs_mount+0x34f/0x18f0 [ 949.349217][T18117] ? legacy_parse_param+0x37b/0x880 [ 949.354416][T18117] ? cap_capable+0x250/0x290 [ 949.359044][T18117] legacy_get_tree+0xf9/0x1a0 [ 949.363717][T18117] ? btrfs_resize_thread_pool+0x290/0x290 [ 949.369428][T18117] vfs_get_tree+0x8f/0x380 [ 949.373842][T18117] do_mount+0x169d/0x2490 [ 949.378165][T18117] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 949.383706][T18117] ? copy_mount_options+0x5f/0x3c0 [ 949.388816][T18117] ? copy_mount_options+0x308/0x3c0 [ 949.394007][T18117] ksys_mount+0xcc/0x100 [ 949.398250][T18117] __x64_sys_mount+0xbf/0xd0 [ 949.402834][T18117] do_syscall_64+0xfe/0x140 [ 949.407342][T18117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.413319][T18117] RIP: 0033:0x45c27a [ 949.417207][T18117] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 949.436812][T18117] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 949.445303][T18117] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a 11:52:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:52:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000000)=ANY=[@ANYBLOB="2d509efd6f4cd0875aeeb598839f236ef793da4d311ce1b656cb84ffcc88d577dcfa8766261e8e5bfe056bd50fab856db3e2dc35b8a627dc99effa27b116f36d0946b9ba6ea54f604495768172bffc91e2cf152cf0544d735c76a7f1ccc25928e9830c4d653e8525adc2cb9dbe743dc2743576ddf4f0427862bf433c0f4d2f1df948ee4a0a673403c5612418fb5fbe3a598a49a67b1e14787e161dbdbfeb6b3789996d1d0f45fa6037db622994bf811b44ee138e08496c8b"], 0x8) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) [ 949.453272][T18117] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 949.461244][T18117] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 949.469206][T18117] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 949.477280][T18117] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 949.486574][T18117] ------------[ cut here ]------------ [ 949.492044][T18117] kernel BUG at fs/btrfs/volumes.c:1275! [ 949.498462][T18117] invalid opcode: 0000 [#1] PREEMPT SMP KASAN 11:52:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)) 11:52:47 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}, &(0x7f0000000100)) [ 949.504546][T18117] CPU: 1 PID: 18117 Comm: syz-executor.0 Not tainted 5.3.0-rc4 #73 [ 949.506433][ T9266] kobject: 'loop1' (00000000f03bd2dd): kobject_uevent_env [ 949.512423][T18117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.512442][T18117] RIP: 0010:close_fs_devices+0x8ff/0x910 [ 949.512454][T18117] Code: 8b 5d c0 e9 4f ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 63 ff ff ff 48 89 df e8 ab 29 fb fe e9 56 ff ff ff e8 e1 2f c2 fe <0f> 0b e8 da 2f c2 fe 0f 0b 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 [ 949.536392][ T9266] kobject: 'loop1' (00000000f03bd2dd): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 949.554979][T18117] RSP: 0018:ffff888055b1f990 EFLAGS: 00010246 [ 949.554988][T18117] RAX: ffffffff82b1549f RBX: ffff88809fa02e68 RCX: 0000000000040000 [ 949.554992][T18117] RDX: ffffc90005f3d000 RSI: 000000000003ffff RDI: 0000000000040000 [ 949.554998][T18117] RBP: ffff888055b1fa20 R08: ffffffff82b22918 R09: fffffbfff11204f6 [ 949.555003][T18117] R10: fffffbfff11204f6 R11: 0000000000000000 R12: dffffc0000000000 [ 949.555009][T18117] R13: ffff88809fa02e70 R14: ffff88809fa02d80 R15: ffff8880a0468ac0 [ 949.555016][T18117] FS: 00007f250541d700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 949.555021][T18117] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 949.555025][T18117] CR2: 0000000000738000 CR3: 000000008b1ac000 CR4: 00000000001406e0 [ 949.555034][T18117] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 949.555038][T18117] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 949.555042][T18117] Call Trace: [ 949.555068][T18117] btrfs_close_devices+0x33/0x130 [ 949.662525][T18117] btrfs_mount_root+0xa9d/0x1050 [ 949.667468][T18117] ? vfs_parse_fs_string+0x13b/0x1a0 [ 949.672750][T18117] ? trace_kfree+0xa0/0x110 [ 949.677252][T18117] legacy_get_tree+0xf9/0x1a0 [ 949.681918][T18117] ? btrfs_control_open+0x40/0x40 [ 949.686937][T18117] vfs_get_tree+0x8f/0x380 [ 949.691346][T18117] vfs_kern_mount+0xc2/0x160 [ 949.695927][T18117] btrfs_mount+0x34f/0x18f0 [ 949.700428][T18117] ? legacy_parse_param+0x37b/0x880 [ 949.705625][T18117] ? cap_capable+0x250/0x290 [ 949.710213][T18117] legacy_get_tree+0xf9/0x1a0 [ 949.714882][T18117] ? btrfs_resize_thread_pool+0x290/0x290 [ 949.720594][T18117] vfs_get_tree+0x8f/0x380 [ 949.725036][T18117] do_mount+0x169d/0x2490 [ 949.729362][T18117] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 949.734897][T18117] ? copy_mount_options+0x5f/0x3c0 [ 949.740002][T18117] ? copy_mount_options+0x308/0x3c0 [ 949.745196][T18117] ksys_mount+0xcc/0x100 [ 949.749439][T18117] __x64_sys_mount+0xbf/0xd0 [ 949.754027][T18117] do_syscall_64+0xfe/0x140 [ 949.758529][T18117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.764431][T18117] RIP: 0033:0x45c27a [ 949.768320][T18117] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 949.787916][T18117] RSP: 002b:00007f250541ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 949.796668][T18117] RAX: ffffffffffffffda RBX: 00007f250541cb40 RCX: 000000000045c27a [ 949.804636][T18117] RDX: 00007f250541cae0 RSI: 0000000020000100 RDI: 00007f250541cb00 [ 949.812597][T18117] RBP: 0000000000000001 R08: 00007f250541cb40 R09: 00007f250541cae0 [ 949.820563][T18117] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 949.828529][T18117] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 949.836779][T18117] Modules linked in: [ 949.843540][T18117] ---[ end trace 8449ec47cd341ecc ]--- [ 949.849164][T18117] RIP: 0010:close_fs_devices+0x8ff/0x910 11:52:47 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x103801, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000100)={0x8, 0x7, 0x4, 0x40000, {0x77359400}, {0x5, 0x0, 0x2, 0x5, 0x81, 0x1, "021b018b"}, 0x1, 0x2, @planes=&(0x7f00000000c0)={0x8, 0x0, @mem_offset=0x4, 0x80}, 0x4}) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/515], 0x8) setsockopt$inet6_opts(r2, 0x29, 0x6, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f00000001c0)={0x8, 0x34363248, 0x2, @stepwise={0x3, 0x6, 0xffff, 0xd, 0x4, 0x7000000}}) [ 949.856065][T18117] Code: 8b 5d c0 e9 4f ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 63 ff ff ff 48 89 df e8 ab 29 fb fe e9 56 ff ff ff e8 e1 2f c2 fe <0f> 0b e8 da 2f c2 fe 0f 0b 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 [ 949.858785][ T3907] kobject: 'loop1' (00000000f03bd2dd): kobject_uevent_env [ 949.888071][ T3907] kobject: 'loop1' (00000000f03bd2dd): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 949.890311][T18117] RSP: 0018:ffff888055b1f990 EFLAGS: 00010246 [ 949.904950][T18128] kobject: 'loop5' (0000000024cd50df): kobject_uevent_env [ 949.905908][ T3907] kobject: 'loop4' (0000000003158913): kobject_uevent_env [ 949.912738][T18128] kobject: 'loop5' (0000000024cd50df): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 949.922530][ T3907] kobject: 'loop4' (0000000003158913): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 949.930313][T18117] RAX: ffffffff82b1549f RBX: ffff88809fa02e68 RCX: 0000000000040000 [ 949.948233][T18117] RDX: ffffc90005f3d000 RSI: 000000000003ffff RDI: 0000000000040000 [ 949.961945][ T3907] kobject: 'loop2' (00000000bed5b9fc): kobject_uevent_env [ 949.967566][T18143] kobject: 'loop1' (00000000f03bd2dd): kobject_uevent_env [ 949.976534][T18143] kobject: 'loop1' (00000000f03bd2dd): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 949.980675][T18117] RBP: ffff888055b1fa20 R08: ffffffff82b22918 R09: fffffbfff11204f6 [ 950.002042][T18128] kobject: 'loop5' (0000000024cd50df): kobject_uevent_env [ 950.008727][ T3907] kobject: 'loop2' (00000000bed5b9fc): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 950.018519][T18128] kobject: 'loop5' (0000000024cd50df): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 950.029434][T18117] R10: fffffbfff11204f6 R11: 0000000000000000 R12: dffffc0000000000 [ 950.037555][ T3907] kobject: 'loop3' (00000000be748770): kobject_uevent_env [ 950.037582][ T3907] kobject: 'loop3' (00000000be748770): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 950.056621][ T3907] kobject: 'loop4' (0000000003158913): kobject_uevent_env [ 950.064388][ T3907] kobject: 'loop4' (0000000003158913): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 950.065315][T18117] R13: ffff88809fa02e70 R14: ffff88809fa02d80 R15: ffff8880a0468ac0 [ 950.075676][ T3907] kobject: 'loop5' (0000000024cd50df): kobject_uevent_env [ 950.085641][T18117] FS: 00007f250541d700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 950.092250][ T3907] kobject: 'loop5' (0000000024cd50df): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 950.102581][T18117] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 950.110171][ T3907] kobject: 'loop0' (000000000aa6e4c9): kobject_uevent_env [ 950.118842][T18117] CR2: 00007ffe1eaefeb0 CR3: 000000008b1ac000 CR4: 00000000001406f0 [ 950.123108][ T3907] kobject: 'loop0' (000000000aa6e4c9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 950.131096][T18117] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 950.142438][ T3907] kobject: 'loop5' (0000000024cd50df): kobject_uevent_env [ 950.152228][T18117] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 950.166272][ T3907] kobject: 'loop5' (0000000024cd50df): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 950.171273][T18117] Kernel panic - not syncing: Fatal exception [ 950.178651][ T3907] kobject: 'loop4' (0000000003158913): kobject_uevent_env [ 950.191015][T18117] Kernel Offset: disabled [ 950.195336][T18117] Rebooting in 86400 seconds..