fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000002280)=ANY=[@ANYBLOB="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"]) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000002100)=@abs, &(0x7f0000000100)=0x6e, 0x800) recvmsg$unix(r2, 0x0, 0x0) (async) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0), &(0x7f0000001280)={0x0, 0xfb, 0xe15, 0x0, 0x0, "6c09ecfa2d815613e88c55159d7bde32", "8b9314c8d1dc44832863a17d12ec2253589e73b5c026fe20b4f2bc4d6745fad01b0041044fe001ec106e50dfacc64cf2bcc833d311dba624b3230f03e9314c67d4fab8a9c195da879993bc0576be338045c6f7ebec34525327dee2513fcfc161aba086c36bcc7ff841837a13db49d1a6a292803b5f2607697305c8efff328aa4add29c3d5a9b355d529e9c19acc03ecbd5ac4f5c2bac6e7c8fb53753c2d19810bb6a83b3dabce4dd49e235644183b782a10eec2776574195989a709fa4e083f8f3b87c5f6ddbef3dc977cbe84d2fbca58a518b051f76eab38a082aab990b8ac4d07549d1ec109f732478290e3cb60b154a1edd1a85544391bca7da8dcfcc205cf3038f42c0e8722eca37128b07d107d985f7250de5d54682f6244e739ec8f4ed8bf77a5a20d8ec27bc7286d9018ab8de38981aa87f0c6c0fd46f1f73763b743d3e1207289334562590fcf2ab2766850d052489841441e9574ce821cfbf7b1dfadd61b503aa7623a9c664360c5358bf102dfa0d3e552bf387fdc8dc873f4b59bddce9beb00e74a189de0258ff7276dba0757d3086a284359f9ce0195d08492edc817127ec99e7e33b74d7ec6b32dd4c9f882d9748dbc99b97d24114a39f2210cecafc36b91988a4bddf1d2b7c7e647dfa9f88da6549a26eb55c9174790666e08fc0b3ee7d1e6674fc4224dd35e8924be5e61d114604a138069c02db7ea9033fa665fdb8950ee87935d76672072d8523f526e11fde80b5cba875672aa7b9dc6078caf3eb6d806bd4ff7f8198da138906007ce45099e0523184f8200f89629d3f1abefaa12afa59d7e0c05eded0d1e34561386b945e3c7cc0ac3b2d77d0ddaa7911a01aed5b6159c411baed6533bce1ce76985017762aa996d79b82b29d514d28db106ffe5d1e561804f54ea7884d8b3d158510bdd08bb59955adee054130bedeaf9b2d26f21b7d0bce3259e5901c3cc973a2795c1421ec3b0b1957292c3bf43ff83f0ef102155ac2dc1a4c55f0ed70c9b3614b3896e021f117c3a80c2aae09092bcd3bc634017fffc154f8aa21394431b63c100f19298de204b27a77a00681a207506ad1eb03e97f81e9d1671d026186e0b551252eed4f7d12d0480616e7b17d16aea3418dba6ff29520404f77d67581eac956f80ae36a1e5e07a92c32e69d4dd676c5b63daa80c656fd222f4b406db28a399c14267f3dea94879aecad9cf13f3964c7ae5447afab8be34db87fa1e483fe09c628d231a8dbbb35096004fbb0cf5a6e13ab374f17d05249215bb4280a2c61732b187d698b66ec7314c21ec4c2c97c288d395104e2db29529f992da8b6cbe4d425b23b3304d457b75328a40b3936a6d5587c068a449501704f637c85fb046df24c4c462e09e1bfa5f7d3943b462da69c1ffc460a82aad0191ba77fa18aaa7ea9fdc168b9361e9ca16d56b36a6821b22764fda8000dc857db9ee5aa7e53202b35e7b3acb59f8151c3fd74063f132f51dceb0b3fb7920d5d2ffbc4847a65ab1d9f88088b2f28254f2695ba55deb705429db7d3167158676083e5df15c4318333f4870cbbdee2866259d8a1d84f7f141887f232230ff973c2fbfaa21933c0e7661b83a52e0a135820f20ef4725b025c4ef1f433a93d05a75a3ccee3748d02b14b3ebfad8b8a819bc97358abbe516725ea5b145612d7416b264b52e49301092301e7bceb75cec58e1657ca7076d721c76cfec1811394f7158f451c87e586dab0cff7eccea7af211b308422edb5caadd615dcf0a96b9d460dd60e4d802120795bb3b659ef88fca4d758be1f5dd83d7f3946accfefdde5c50551f586fe73ef33dcc42b84781e943b18e2ae05cb209ebe4b5f3a26eac806777b9c9e18ee617609c6909d1581eb60a9a9d1053c26738e8491795865bd090b2fe97948d1b6f49a0f6e4253add1fda4545c19dafb86e5966739d39ec57310a45d646f33c0f6a339d560c96aad2120738d0b430a011189cab1d795095c11609efda879614286cbe7ddec26a4e9ff17135c63af046800ca11dbd82711f4fc570b50d799eba2a4ec2b04f15e87703bd54fc1d5f3c137ff8185414387c995113225795072630f49125b5b1fd0322793b2bb6fb24b99a521829555341ee2a2241dbe80746452dfd715bff60f4a40f56e12f6043381ebd06b44e3eaf68340efaaf36ad7cd2af8574d068e09640d6b5f0a22e1ba1dbca51e2b0aac25dab11ca88a0262293d89321181501ba32b3dac866c19d2e836209472ad2aa8a4af62af995b8c6d0b79c3edadbbc7fd38033a761ace773f2acb8ae79f84205cbcc296a65055d10b6cab38b8c0a50539b6926ebb517228af26af276da8c635b769273db475ecd8b281ea3b3fcf858bef76ce761e11e84088c44ccf0e1b986483ed1f8ade7800716f7bbde795e37ec5fc950fcdae1eafda3991b231728c7bf36c3f1d7950ba934bcec383d0ed635033426ca85e0b6ec41b467d9943805881a414b8aa11c566d0d1b763caef197d19af8546a173dd8f2eae9f5a49e7bdfe9e287de4e16a5f96074553622a7fd3d0646d4e07ebdd402c6579b8f8ed25f468ce2427567563cfec729e1af74a62d92c03b1e45df4d29deb4f3a247e5ac1ab1fc74bfef2b8082d55f20a5fdfbe456e1493cda4035766bc9f215730456338e34b85f847377eaf0965f7b43c457bc011e61273543980ee1a1e6fea0c244e593d83e144c38416cc94a519799f2bc34d405b0a3d3f7df9c45236604c815c52f0776542141080ef27dcdc1af36f723e95a0c5103274f12f7237af76a4c5cb9498e21bc9142c3568ad93222e54389d01e6f16830b5c9cc09872671da06d8da068ed1ffed1be41902b1ba1cce6318eef7fb850624698101df4ffac57de42d1b13ce581a472b8a5e6db267dae639ff76f3348a61ebc92d6f4368da9a6c56062955ecb6d352e9af918eb473515f8bf2096b51353d7b2a804627a88a629f2e0ecd42e307faaf9807197cd775c1090dba98e2ada1833587410d3cf9fd9b68e80e9361aa16da5877b79a87985667938c2ffe6f5b8f30511301ab45ea0e1488d96e590120df3cf0bf992feb9d96a421d2134aad816bbed4fde7eec2c25301beec61d64c57c0ed86b2e2efe0a95daec2ce57fb1f3f9e322d404d13ba6641aa535a1d3afd263425e66dee3687d5c38d80811170034d58872002cbbfa323fe064bde7ae7c46e8eb89ee71ef00abefc124a8d87c315465d578adc92b28f20c3a35c572765be05171d6ba756a18bbdc7fb36ec5feb02a8b2d6df43c0992b1cd117b420cbb2a765c1055557094ae894226de63a1a8afa43500706945657ef9a23376da5088c4cebaab7e18fe32b57ec0e5b345692d8bc5c6021aa34dfa88d5a66a370a867037fa0ac3fabb26b22779b9004e1bc4b3912357a7a47a67ea378c8c4bbe04b851d2363c45e55786a770e14d781b3a2d0b9bbdb4de2eed51c8d018988e5df45506e0b59a0320ad3ef9ff7ef17460b1ecb201cba6b53bb2ab63a559c497f06f313bb33028a232a7477cbc2c4cc395e8fa099fb0f0c46983aa66f24a2f432778da560c940d13acbe487e18c38c9187fea093d3505ca99f5dd6518b55cf45d5fcce9dab48caca06c9b5d82d96cfcde96cbca66fa5ecb2750df998613c36c3e9ffbb7f483e4c47beb0c782947be3f006bedbdcc9999cdf1ba1f2412d10f06fd74be142019cb423d23eaae5809aab6f29b85940087d1f2ce206391c27a52b28c3f6271a5a61477a74d34924d5bf5344ddd701f5b380a019708d921af8b5236fc5be7e5a025c908cc64f7370d58eb192346d255f06f58a04088d5bf9120997776b0c170139dc3d5fd7bf5ef9965764b91f399dd331cacdcd6b94be02c99f48b802e19b22dcb3294c3cb73c43dd2ab04dc0b35f28217c333dc372c20bcb6d1d85412cde8a1b9da4bfd05326a910cbb4715048bd753e134ffa537b3d349a4df3a8804e1c15595f5f2504bd7cd45c1120ab72bb7c7091a52bed9e0b9ae17e81a165039b406c88c2e84b1943f15215cd750edbfb06bbb41db6be57eb7cb1b4d45c48adee6d5823b27516bd8d9102fd0ce22508afc8229677723cd1ab59d3d79cc4d134ac3ea52069fef5d7677041d80424de8789f4d744d58ea57ea0dcebe692c0ce86da822c6c0f91057ef12230a43aec01c367572dfe475d10f61ba4f26a87c2387c94f5ea1db190f82d06b01177e2ff4abcd42992c70fde480315b9d7cf3cb1abb395b9d5dd3c8eb8888256e58c829f96c3d7952c56245acdc694a173c059767e427905216e6dc218854a1a42fd08e538bf7e287a47c07bd39d222bf6b1a95a0265a54f9e2ac826709782752ca38bc2545a7d002dd0f0049ae7a011223e20a9110ab3f73fa0ca575e94e588571dbb45475dfd94d01d798741cec3bae3ac35009c87b651035fb121637c905995754165e4475e8240a8705c047493df1c58bc52c811c74d636b513189068773776a976aae4df1529e5b1d1c73f3c0ffd18e0ed80ede33093d05811d4d6636337167da82d78d62a75bb608eeacb761424f51949ab34db4b968cab26b3f4fa0f1358d05e6ebe0c5d4fe672cde830e5612e7b6930bb330e3ee74040e7a532b5c4a8f9712718f72c58b6d567d55ff461aad4faabff255554221a788f6b1210d3a1586f281fbaaeb77c80c16f861ca95e1433c5c84705034d67f624675204392fc1bb24e2652694bf3888158f895820555954ebbfc43c545f5afdcd0fa4c315213f3fe4cee6e79c469dc28abd3f81ad166f143b42b3096643c87b07dc22957a4e56ccbbf50a660e5353b8f169fbb84eea9c4e3d378e9f6226363db9007a550c1f1683b3d7967c5838e47df18874edf849168f2091c0c6e399e5ddb51335825b7e52315aef31da409d4febd5acc4f7528d2f7f845b42330b5fabadb0e3b1f9c3a48743f5c33b9a36305d75fe03cff4cdaa974d8d241e72b981f7af5586612a5ea8ea7eaebeb71934d35bb335992b3e9040838212257e10859f4f1f76cf782c4f0685b418a86b1c5ccbc702feed607b74cb22c700ec4ca683fd161e5bdb7f08ec155f2bb1f4bc"}, 0xe15, 0x0) (async) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000380)={0x6, 0xfb, 0x0, 0x4, 0x0, "b145e3180bb48426b58ee26ae64909d4", "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"}, 0xc001, 0x0) symlink(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)='./file0\x00') setresgid(0x0, r1, 0x0) [ 1187.855612] FAULT_INJECTION: forcing a failure. [ 1187.855612] name failslab, interval 1, probability 0, space 0, times 0 [ 1187.872388] CPU: 1 PID: 20859 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1187.880287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1187.889636] Call Trace: [ 1187.889659] dump_stack+0x1fc/0x2ef [ 1187.889678] should_fail.cold+0xa/0xf [ 1187.889697] ? setup_fault_attr+0x200/0x200 [ 1187.889713] ? lock_acquire+0x170/0x3c0 [ 1187.889733] __should_failslab+0x115/0x180 [ 1187.889756] should_failslab+0x5/0x10 [ 1187.899715] kmem_cache_alloc+0x277/0x370 [ 1187.899731] ? shmem_destroy_callback+0xb0/0xb0 [ 1187.899749] shmem_alloc_inode+0x18/0x40 [ 1187.899763] ? shmem_destroy_callback+0xb0/0xb0 [ 1187.899777] alloc_inode+0x5d/0x180 [ 1187.899789] new_inode+0x1d/0xf0 [ 1187.899807] shmem_get_inode+0x96/0x8d0 [ 1187.944441] __shmem_file_setup.part.0+0x7a/0x2b0 [ 1187.949267] shmem_file_setup+0x61/0x90 [ 1187.953221] __se_sys_memfd_create+0x26b/0x440 [ 1187.957802] ? memfd_file_seals_ptr+0x150/0x150 [ 1187.962456] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1187.967802] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1187.972810] ? do_syscall_64+0x21/0x620 [ 1187.976791] do_syscall_64+0xf9/0x620 [ 1187.980595] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1187.985763] RIP: 0033:0x7f350f3a80e9 [ 1187.989460] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1188.008781] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1188.016470] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a80e9 [ 1188.023726] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f350f4011ee [ 1188.030989] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f350dd1d1d0 [ 1188.038241] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1188.045501] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020000080 17:56:44 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = accept$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast1}}, &(0x7f0000000180)=0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'syzkaller0\x00', 0x0}) connect(r2, &(0x7f0000000440)=@xdp={0x2c, 0x3, r3, 0x30}, 0x80) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RVERSION(r5, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) open(&(0x7f0000000000)='./bus\x00', 0x86000, 0x0) r6 = dup(r5) r7 = socket$packet(0x11, 0x3, 0x300) write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0x0) getpeername(r7, &(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f00000000c0)=0x80) write$FUSE_BMAP(r6, &(0x7f0000000100)={0x18}, 0x18) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="38010000"], 0x138) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000200)=0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000300)={{{@in=@empty, @in=@rand_addr=0x64010102, 0x4e22, 0x0, 0x4e23, 0x5, 0xa, 0x20, 0x80, 0x2, 0x0, r9}, {0x8, 0xffffffff, 0x0, 0x8, 0xcb, 0x0, 0x9ed}, {0x0, 0x2031, 0x9}, 0x800, 0x6e6bbd, 0x0, 0x0, 0x1, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d2, 0x3c}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x3500, 0x4, 0x1, 0x6, 0x0, 0x245, 0x42}}, 0xe4) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000280), 0x10002, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_L}, {@msize={'msize', 0x3d, 0x1000}}, {@access_user}, {@mmap}, {@version_9p2000}, {@access_any}], [{@fowner_gt={'fowner>', r9}}, {@fowner_lt={'fowner<', r9}}, {@appraise}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@obj_role={'obj_role', 0x3d, '-\x13-{'}}]}}) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000002c0)={'netpci0\x00'}) 17:56:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ec", 0x12a, 0x10000}], 0x0, &(0x7f0000000080)) [ 1188.058402] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 17:56:44 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r3}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r7}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x29, 0x9, 0x6, 0x1, 0x40, @private0, @loopback, 0x7800, 0x7, 0x1, 0x6}}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="8800007a61cb8564077d3cc10587ae21bfe4aa59d27d18de3634e8f740d359b18fe1a7d8e86e31", @ANYRES16=0x0, @ANYBLOB="00012cbd7000fcdbdf250500000008000500fffeffff080005000300000005000600020000000500020006000000050006000800000005000200030000002400018008000100", @ANYRES32=r3, @ANYBLOB="080001007949989d062faaa723989e3ee3c5932721bb36dd7b7c9b648665732789b7a98c0f67821592bb29005edf60eeadebb393036411ae82d9dcc9990d577ed4c4a6e4d005", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="080005004000000010000380080002001f000000040001000500020008000000"], 0x88}, 0x1, 0x0, 0x0, 0x488c0}, 0x4840) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(r9, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000220001002bbd7000fcdbdf250a1400070000000702000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x90) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x13c, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x3, 0x0, 0xf201}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000480)=""/179, 0xb3}], 0x2, 0x80, 0x1000) 17:56:44 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0603d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a03e00c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 3) 17:56:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf2", 0x12b, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:44 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0502d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00005c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1188.230487] FAULT_INJECTION: forcing a failure. [ 1188.230487] name failslab, interval 1, probability 0, space 0, times 0 [ 1188.292185] CPU: 1 PID: 20885 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1188.300092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1188.309545] Call Trace: [ 1188.312144] dump_stack+0x1fc/0x2ef [ 1188.315784] should_fail.cold+0xa/0xf [ 1188.319688] ? setup_fault_attr+0x200/0x200 [ 1188.324017] ? lock_acquire+0x170/0x3c0 [ 1188.328006] __should_failslab+0x115/0x180 [ 1188.332252] should_failslab+0x5/0x10 [ 1188.336053] kmem_cache_alloc+0x277/0x370 [ 1188.340209] __d_alloc+0x2b/0xa10 [ 1188.343677] d_alloc_pseudo+0x19/0x70 [ 1188.347482] alloc_file_pseudo+0xc6/0x250 [ 1188.351633] ? alloc_file+0x4d0/0x4d0 [ 1188.355436] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1188.361063] ? shmem_get_inode+0x44c/0x8d0 [ 1188.365304] __shmem_file_setup.part.0+0x102/0x2b0 [ 1188.370238] shmem_file_setup+0x61/0x90 [ 1188.374207] __se_sys_memfd_create+0x26b/0x440 [ 1188.378781] ? memfd_file_seals_ptr+0x150/0x150 [ 1188.383440] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1188.388792] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1188.393796] ? do_syscall_64+0x21/0x620 [ 1188.397760] do_syscall_64+0xf9/0x620 [ 1188.401549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1188.406722] RIP: 0033:0x7f350f3a80e9 [ 1188.410433] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1188.429318] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1188.437013] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a80e9 [ 1188.444265] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f350f4011ee [ 1188.451517] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f350dd1d1d0 [ 1188.458771] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1188.467325] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020000080 17:56:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12b, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 4) 17:56:45 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = accept$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast1}}, &(0x7f0000000180)=0x1c) (async) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'syzkaller0\x00', 0x0}) connect(r2, &(0x7f0000000440)=@xdp={0x2c, 0x3, r3, 0x30}, 0x80) (async) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RVERSION(r5, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) (async) open(&(0x7f0000000000)='./bus\x00', 0x86000, 0x0) (async) r6 = dup(r5) r7 = socket$packet(0x11, 0x3, 0x300) (async) write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0x0) getpeername(r7, &(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f00000000c0)=0x80) write$FUSE_BMAP(r6, &(0x7f0000000100)={0x18}, 0x18) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) write$FUSE_DIRENTPLUS(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="38010000"], 0x138) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000200)=0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000300)={{{@in=@empty, @in=@rand_addr=0x64010102, 0x4e22, 0x0, 0x4e23, 0x5, 0xa, 0x20, 0x80, 0x2, 0x0, r9}, {0x8, 0xffffffff, 0x0, 0x8, 0xcb, 0x0, 0x9ed}, {0x0, 0x2031, 0x9}, 0x800, 0x6e6bbd, 0x0, 0x0, 0x1, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d2, 0x3c}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x3500, 0x4, 0x1, 0x6, 0x0, 0x245, 0x42}}, 0xe4) (async) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000280), 0x10002, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_L}, {@msize={'msize', 0x3d, 0x1000}}, {@access_user}, {@mmap}, {@version_9p2000}, {@access_any}], [{@fowner_gt={'fowner>', r9}}, {@fowner_lt={'fowner<', r9}}, {@appraise}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@obj_role={'obj_role', 0x3d, '-\x13-{'}}]}}) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000002c0)={'netpci0\x00'}) [ 1188.517629] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1188.602112] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1188.620274] FAULT_INJECTION: forcing a failure. [ 1188.620274] name failslab, interval 1, probability 0, space 0, times 0 [ 1188.675551] CPU: 1 PID: 20910 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1188.683452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1188.692808] Call Trace: [ 1188.695404] dump_stack+0x1fc/0x2ef [ 1188.699045] should_fail.cold+0xa/0xf [ 1188.702853] ? setup_fault_attr+0x200/0x200 [ 1188.707182] ? lock_acquire+0x170/0x3c0 [ 1188.711173] __should_failslab+0x115/0x180 [ 1188.715411] should_failslab+0x5/0x10 [ 1188.719210] kmem_cache_alloc+0x277/0x370 [ 1188.723357] __alloc_file+0x21/0x340 [ 1188.727065] alloc_empty_file+0x6d/0x170 [ 1188.731117] alloc_file+0x5e/0x4d0 [ 1188.734648] alloc_file_pseudo+0x165/0x250 [ 1188.738869] ? alloc_file+0x4d0/0x4d0 [ 1188.742657] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1188.748268] ? shmem_get_inode+0x44c/0x8d0 [ 1188.752506] __shmem_file_setup.part.0+0x102/0x2b0 [ 1188.757428] shmem_file_setup+0x61/0x90 [ 1188.761392] __se_sys_memfd_create+0x26b/0x440 [ 1188.765961] ? memfd_file_seals_ptr+0x150/0x150 [ 1188.770618] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1188.775970] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1188.780985] ? do_syscall_64+0x21/0x620 [ 1188.784950] do_syscall_64+0xf9/0x620 [ 1188.788742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1188.793919] RIP: 0033:0x7f350f3a80e9 [ 1188.797626] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1188.816512] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1188.824208] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a80e9 [ 1188.831466] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f350f4011ee [ 1188.838725] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f350dd1d1d0 [ 1188.845979] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1188.853320] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020000080 17:56:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 5) [ 1188.864141] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 17:56:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00006c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1188.944930] FAULT_INJECTION: forcing a failure. [ 1188.944930] name failslab, interval 1, probability 0, space 0, times 0 [ 1188.967746] CPU: 1 PID: 20920 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1188.975654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1188.985017] Call Trace: [ 1188.987790] dump_stack+0x1fc/0x2ef [ 1188.991434] should_fail.cold+0xa/0xf [ 1188.995246] ? setup_fault_attr+0x200/0x200 [ 1188.999579] ? lock_acquire+0x170/0x3c0 [ 1189.003573] __should_failslab+0x115/0x180 [ 1189.007821] should_failslab+0x5/0x10 [ 1189.011627] kmem_cache_alloc_trace+0x284/0x380 [ 1189.016309] apparmor_file_alloc_security+0x394/0xad0 [ 1189.021517] ? apparmor_file_receive+0x160/0x160 [ 1189.026284] ? __alloc_file+0x21/0x340 [ 1189.030185] security_file_alloc+0x40/0x90 [ 1189.034431] __alloc_file+0xd8/0x340 [ 1189.038155] alloc_empty_file+0x6d/0x170 [ 1189.042227] alloc_file+0x5e/0x4d0 [ 1189.045788] alloc_file_pseudo+0x165/0x250 [ 1189.050039] ? alloc_file+0x4d0/0x4d0 [ 1189.053853] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1189.059488] ? shmem_get_inode+0x44c/0x8d0 [ 1189.063737] __shmem_file_setup.part.0+0x102/0x2b0 [ 1189.068688] shmem_file_setup+0x61/0x90 [ 1189.072668] __se_sys_memfd_create+0x26b/0x440 [ 1189.077261] ? memfd_file_seals_ptr+0x150/0x150 [ 1189.081945] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1189.087315] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1189.092338] ? do_syscall_64+0x21/0x620 [ 1189.096312] do_syscall_64+0xf9/0x620 [ 1189.100100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1189.105291] RIP: 0033:0x7f350f3a80e9 [ 1189.108986] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1189.127868] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1189.135555] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a80e9 17:56:45 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r3}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r7}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x29, 0x9, 0x6, 0x1, 0x40, @private0, @loopback, 0x7800, 0x7, 0x1, 0x6}}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="8800007a61cb8564077d3cc10587ae21bfe4aa59d27d18de3634e8f740d359b18fe1a7d8e86e31", @ANYRES16=0x0, @ANYBLOB="00012cbd7000fcdbdf250500000008000500fffeffff080005000300000005000600020000000500020006000000050006000800000005000200030000002400018008000100", @ANYRES32=r3, @ANYBLOB="080001007949989d062faaa723989e3ee3c5932721bb36dd7b7c9b648665732789b7a98c0f67821592bb29005edf60eeadebb393036411ae82d9dcc9990d577ed4c4a6e4d005", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="080005004000000010000380080002001f000000040001000500020008000000"], 0x88}, 0x1, 0x0, 0x0, 0x488c0}, 0x4840) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(r9, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000220001002bbd7000fcdbdf250a1400070000000702000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x90) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x13c, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x3, 0x0, 0xf201}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 17:56:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0504d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12b, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:45 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = accept$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast1}}, &(0x7f0000000180)=0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'syzkaller0\x00', 0x0}) connect(r2, &(0x7f0000000440)=@xdp={0x2c, 0x3, r3, 0x30}, 0x80) (async, rerun: 32) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) (rerun: 32) write$P9_RVERSION(r5, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) (async) open(&(0x7f0000000000)='./bus\x00', 0x86000, 0x0) (async) r6 = dup(r5) (async) r7 = socket$packet(0x11, 0x3, 0x300) write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 32) getpeername(r7, &(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f00000000c0)=0x80) (rerun: 32) write$FUSE_BMAP(r6, &(0x7f0000000100)={0x18}, 0x18) (async, rerun: 32) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) write$FUSE_DIRENTPLUS(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="38010000"], 0x138) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) (async) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000200)=0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000300)={{{@in=@empty, @in=@rand_addr=0x64010102, 0x4e22, 0x0, 0x4e23, 0x5, 0xa, 0x20, 0x80, 0x2, 0x0, r9}, {0x8, 0xffffffff, 0x0, 0x8, 0xcb, 0x0, 0x9ed}, {0x0, 0x2031, 0x9}, 0x800, 0x6e6bbd, 0x0, 0x0, 0x1, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d2, 0x3c}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x3500, 0x4, 0x1, 0x6, 0x0, 0x245, 0x42}}, 0xe4) (async) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000280), 0x10002, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_L}, {@msize={'msize', 0x3d, 0x1000}}, {@access_user}, {@mmap}, {@version_9p2000}, {@access_any}], [{@fowner_gt={'fowner>', r9}}, {@fowner_lt={'fowner<', r9}}, {@appraise}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@obj_role={'obj_role', 0x3d, '-\x13-{'}}]}}) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000002c0)={'netpci0\x00'}) 17:56:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 6) [ 1189.142812] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f350f4011ee [ 1189.150074] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f350dd1d1d0 [ 1189.157327] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1189.164578] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020000080 17:56:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00007c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c}], 0x0, &(0x7f0000000080)) [ 1189.284578] FAULT_INJECTION: forcing a failure. [ 1189.284578] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1189.341279] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1189.347858] CPU: 0 PID: 20951 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1189.347894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1189.347899] Call Trace: [ 1189.347921] dump_stack+0x1fc/0x2ef [ 1189.347941] should_fail.cold+0xa/0xf [ 1189.347958] ? lock_acquire+0x170/0x3c0 [ 1189.347975] ? setup_fault_attr+0x200/0x200 [ 1189.348000] __alloc_pages_nodemask+0x239/0x2890 17:56:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0505d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1189.348017] ? __lock_acquire+0x6de/0x3ff0 [ 1189.348035] ? static_obj+0x50/0x50 [ 1189.348057] ? __lock_acquire+0x6de/0x3ff0 [ 1189.348073] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1189.348088] ? __lock_acquire+0x6de/0x3ff0 [ 1189.348109] ? mark_held_locks+0xf0/0xf0 [ 1189.348125] ? unwind_next_frame+0xeee/0x1400 [ 1189.348140] ? mark_held_locks+0xf0/0xf0 [ 1189.348159] ? deref_stack_reg+0x134/0x1d0 [ 1189.348172] ? get_reg+0x176/0x1f0 [ 1189.348190] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 1189.348208] alloc_pages_vma+0xf2/0x780 [ 1189.348229] shmem_alloc_page+0x11c/0x1f0 [ 1189.348244] ? shmem_swapin+0x220/0x220 [ 1189.348277] ? percpu_counter_add_batch+0x126/0x180 [ 1189.348294] ? __vm_enough_memory+0x316/0x650 [ 1189.348314] shmem_alloc_and_acct_page+0x15a/0x850 [ 1189.348334] shmem_getpage_gfp+0x4e9/0x37f0 [ 1189.348364] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1189.348380] ? mark_held_locks+0xa6/0xf0 [ 1189.348394] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1189.348407] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1189.348425] shmem_write_begin+0xff/0x1e0 [ 1189.348446] generic_perform_write+0x1f8/0x4d0 [ 1189.348470] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1189.348484] ? current_time+0x1c0/0x1c0 [ 1189.348501] ? lock_acquire+0x170/0x3c0 [ 1189.348517] __generic_file_write_iter+0x24b/0x610 [ 1189.348535] generic_file_write_iter+0x3f8/0x730 [ 1189.348556] __vfs_write+0x51b/0x770 [ 1189.348572] ? kernel_read+0x110/0x110 [ 1189.348596] ? check_preemption_disabled+0x41/0x280 [ 1189.348616] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1189.348634] vfs_write+0x1f3/0x540 [ 1189.348652] __x64_sys_pwrite64+0x1f7/0x250 [ 1189.348668] ? ksys_pwrite64+0x1a0/0x1a0 [ 1189.348684] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1189.348698] ? do_syscall_64+0x21/0x620 [ 1189.348715] do_syscall_64+0xf9/0x620 [ 1189.348733] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1189.348745] RIP: 0033:0x7f350f35b0b7 17:56:46 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = accept$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast1}}, &(0x7f0000000180)=0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'syzkaller0\x00', 0x0}) connect(r2, &(0x7f0000000440)=@xdp={0x2c, 0x3, r3, 0x30}, 0x80) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RVERSION(r5, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) open(&(0x7f0000000000)='./bus\x00', 0x86000, 0x0) r6 = dup(r5) r7 = socket$packet(0x11, 0x3, 0x300) write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0x0) getpeername(r7, &(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f00000000c0)=0x80) write$FUSE_BMAP(r6, &(0x7f0000000100)={0x18}, 0x18) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="38010000"], 0x138) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000200)=0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000300)={{{@in=@empty, @in=@rand_addr=0x64010102, 0x4e22, 0x0, 0x4e23, 0x5, 0xa, 0x20, 0x80, 0x2, 0x0, r9}, {0x8, 0xffffffff, 0x0, 0x8, 0xcb, 0x0, 0x9ed}, {0x0, 0x2031, 0x9}, 0x800, 0x6e6bbd, 0x0, 0x0, 0x1, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d2, 0x3c}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x3500, 0x4, 0x1, 0x6, 0x0, 0x245, 0x42}}, 0xe4) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000280), 0x10002, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_L}, {@msize={'msize', 0x3d, 0x1000}}, {@access_user}, {@mmap}, {@version_9p2000}, {@access_any}], [{@fowner_gt={'fowner>', r9}}, {@fowner_lt={'fowner<', r9}}, {@appraise}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@obj_role={'obj_role', 0x3d, '-\x13-{'}}]}}) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000002c0)={'netpci0\x00'}) 17:56:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c}], 0x0, &(0x7f0000000080)) 17:56:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 7) [ 1189.348758] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1189.348766] RSP: 002b:00007f350dd1cf00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1189.348780] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f35b0b7 [ 1189.348788] RDX: 000000000000012c RSI: 0000000020000240 RDI: 0000000000000004 [ 1189.348796] RBP: 0000000000000001 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1189.348805] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 1189.348812] R13: 0000000000000004 R14: 0000000020000040 R15: 0000000000000000 [ 1189.867791] FAULT_INJECTION: forcing a failure. [ 1189.867791] name failslab, interval 1, probability 0, space 0, times 0 [ 1189.879545] CPU: 1 PID: 20984 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1189.887433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1189.896786] Call Trace: [ 1189.899384] dump_stack+0x1fc/0x2ef [ 1189.903022] should_fail.cold+0xa/0xf [ 1189.903221] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1189.906827] ? setup_fault_attr+0x200/0x200 [ 1189.917745] ? __lock_acquire+0x6de/0x3ff0 [ 1189.921987] __should_failslab+0x115/0x180 [ 1189.926232] should_failslab+0x5/0x10 [ 1189.930160] kmem_cache_alloc+0x3f/0x370 [ 1189.934237] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 1189.939874] __radix_tree_create+0x314/0x540 [ 1189.944299] __radix_tree_insert+0xbb/0x5f0 [ 1189.948632] ? __radix_tree_create+0x540/0x540 [ 1189.953225] ? lock_acquire+0x170/0x3c0 [ 1189.957208] ? shmem_add_to_page_cache+0x306/0xbb0 [ 1189.962154] shmem_add_to_page_cache+0x616/0xbb0 [ 1189.966911] ? shmem_recalc_inode+0x310/0x310 [ 1189.966928] ? __radix_tree_preload+0x1fe/0x280 [ 1189.966952] shmem_getpage_gfp+0x2004/0x37f0 [ 1189.966983] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1189.966999] ? mark_held_locks+0xa6/0xf0 [ 1189.967012] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1189.967029] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1189.976166] shmem_write_begin+0xff/0x1e0 [ 1189.976189] generic_perform_write+0x1f8/0x4d0 [ 1189.976214] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1189.976228] ? current_time+0x1c0/0x1c0 [ 1189.976247] ? lock_acquire+0x170/0x3c0 [ 1189.976264] __generic_file_write_iter+0x24b/0x610 [ 1189.976282] generic_file_write_iter+0x3f8/0x730 [ 1189.976306] __vfs_write+0x51b/0x770 [ 1190.034804] ? kernel_read+0x110/0x110 [ 1190.038710] ? check_preemption_disabled+0x41/0x280 [ 1190.043743] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1190.048774] vfs_write+0x1f3/0x540 [ 1190.052316] __x64_sys_pwrite64+0x1f7/0x250 [ 1190.056623] ? ksys_pwrite64+0x1a0/0x1a0 [ 1190.060671] ? trace_hardirqs_off_caller+0x6e/0x210 17:56:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c}], 0x0, &(0x7f0000000080)) [ 1190.065676] ? do_syscall_64+0x21/0x620 [ 1190.069642] do_syscall_64+0xf9/0x620 [ 1190.073436] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1190.078609] RIP: 0033:0x7f350f35b0b7 [ 1190.082303] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1190.101236] RSP: 002b:00007f350dd1cf00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1190.108959] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f35b0b7 [ 1190.116235] RDX: 000000000000012c RSI: 0000000020000240 RDI: 0000000000000004 [ 1190.123504] RBP: 0000000000000001 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1190.130764] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 1190.138027] R13: 0000000000000004 R14: 0000000020000040 R15: 0000000000000000 17:56:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a0000ec513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:46 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0506d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1190.155715] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 17:56:46 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r6}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x29, 0x9, 0x6, 0x1, 0x40, @private0, @loopback, 0x7800, 0x7, 0x1, 0x6}}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="8800007a61cb8564077d3cc10587ae21bfe4aa59d27d18de3634e8f740d359b18fe1a7d8e86e31", @ANYRES16=0x0, @ANYBLOB="00012cbd7000fcdbdf250500000008000500fffeffff080005000300000005000600020000000500020006000000050006000800000005000200030000002400018008000100", @ANYRES32=r2, @ANYBLOB="080001007949989d062faaa723989e3ee3c5932721bb36dd7b7c9b648665732789b7a98c0f67821592bb29005edf60eeadebb393036411ae82d9dcc9990d577ed4c4a6e4d005", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="080005004000000010000380080002001f000000040001000500020008000000"], 0x88}, 0x1, 0x0, 0x0, 0x488c0}, 0x4840) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(r8, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000220001002bbd7000fcdbdf250a1400070000000702000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x90) 17:56:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 8) 17:56:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@deltfilter={0x24}, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$can_bcm(0x1d, 0x2, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x50, 0x10, 0xffffff1f, 0x70bd28, 0x4, {0x0, 0x0, 0x0, 0x0, 0x0, 0x60410}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa}, {0x18, 0x2, 0x0, 0x1, @val={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x50}}, 0x0) [ 1190.273603] FAULT_INJECTION: forcing a failure. [ 1190.273603] name failslab, interval 1, probability 0, space 0, times 0 [ 1190.304584] CPU: 1 PID: 21006 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1190.312487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1190.321861] Call Trace: [ 1190.324456] dump_stack+0x1fc/0x2ef [ 1190.328098] should_fail.cold+0xa/0xf [ 1190.331899] ? setup_fault_attr+0x200/0x200 [ 1190.336216] ? lock_acquire+0x170/0x3c0 [ 1190.340184] __should_failslab+0x115/0x180 [ 1190.344412] should_failslab+0x5/0x10 [ 1190.348203] kmem_cache_alloc+0x277/0x370 [ 1190.352343] getname_flags+0xce/0x590 [ 1190.356140] do_sys_open+0x26c/0x520 [ 1190.359852] ? filp_open+0x70/0x70 [ 1190.363386] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1190.368736] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1190.373746] ? do_syscall_64+0x21/0x620 [ 1190.377710] do_syscall_64+0xf9/0x620 [ 1190.381515] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1190.386689] RIP: 0033:0x7f350f35b004 [ 1190.390391] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1190.409280] RSP: 002b:00007f350dd1ceb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1190.416974] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f35b004 17:56:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a02814c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:46 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0507d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1190.424229] RDX: 0000000000000002 RSI: 00007f350dd1cfe0 RDI: 00000000ffffff9c [ 1190.431482] RBP: 00007f350dd1cfe0 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1190.438743] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1190.446001] R13: 0000000000000004 R14: 0000000020000058 R15: 0000000000000001 17:56:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) 17:56:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 9) 17:56:47 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r6}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x29, 0x9, 0x6, 0x1, 0x40, @private0, @loopback, 0x7800, 0x7, 0x1, 0x6}}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="8800007a61cb8564077d3cc10587ae21bfe4aa59d27d18de3634e8f740d359b18fe1a7d8e86e31", @ANYRES16=0x0, @ANYBLOB="00012cbd7000fcdbdf250500000008000500fffeffff080005000300000005000600020000000500020006000000050006000800000005000200030000002400018008000100", @ANYRES32=r2, @ANYBLOB="080001007949989d062faaa723989e3ee3c5932721bb36dd7b7c9b648665732789b7a98c0f67821592bb29005edf60eeadebb393036411ae82d9dcc9990d577ed4c4a6e4d005", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="080005004000000010000380080002001f000000040001000500020008000000"], 0x88}, 0x1, 0x0, 0x0, 0x488c0}, 0x4840) pipe(&(0x7f0000000340)) 17:56:47 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a01428c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0510d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1190.597409] FAULT_INJECTION: forcing a failure. [ 1190.597409] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1190.609250] CPU: 1 PID: 21023 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1190.617142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1190.626499] Call Trace: [ 1190.629099] dump_stack+0x1fc/0x2ef [ 1190.632738] should_fail.cold+0xa/0xf [ 1190.636553] ? setup_fault_attr+0x200/0x200 [ 1190.640886] ? do_writepages+0x290/0x290 [ 1190.644982] ? unlock_page+0x13d/0x230 [ 1190.648876] __alloc_pages_nodemask+0x239/0x2890 [ 1190.653646] ? generic_perform_write+0x36c/0x4d0 [ 1190.658514] ? __lock_acquire+0x6de/0x3ff0 [ 1190.662764] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1190.667619] ? lock_downgrade+0x720/0x720 [ 1190.671774] ? lock_acquire+0x170/0x3c0 [ 1190.675782] ? up_write+0x18/0x150 [ 1190.679340] ? generic_file_write_iter+0x381/0x730 [ 1190.684288] cache_grow_begin+0xa4/0x8a0 [ 1190.688356] ? setup_fault_attr+0x200/0x200 [ 1190.692683] ? lock_acquire+0x170/0x3c0 [ 1190.696664] cache_alloc_refill+0x273/0x340 [ 1190.700996] kmem_cache_alloc+0x346/0x370 [ 1190.705155] getname_flags+0xce/0x590 [ 1190.708978] do_sys_open+0x26c/0x520 [ 1190.712699] ? filp_open+0x70/0x70 [ 1190.716259] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1190.721634] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1190.726660] ? do_syscall_64+0x21/0x620 [ 1190.730647] do_syscall_64+0xf9/0x620 [ 1190.734463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1190.739666] RIP: 0033:0x7f350f35b004 [ 1190.743386] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1190.762293] RSP: 002b:00007f350dd1ceb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1190.770018] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f35b004 [ 1190.777296] RDX: 0000000000000002 RSI: 00007f350dd1cfe0 RDI: 00000000ffffff9c [ 1190.784574] RBP: 00007f350dd1cfe0 R08: 0000000000000000 R09: 00007f350dd1d1d0 17:56:47 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r6}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x29, 0x9, 0x6, 0x1, 0x40, @private0, @loopback, 0x7800, 0x7, 0x1, 0x6}}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="8800007a61cb8564077d3cc10587ae21bfe4aa59d27d18de3634e8f740d359b18fe1a7d8e86e31", @ANYRES16=0x0, @ANYBLOB="00012cbd7000fcdbdf250500000008000500fffeffff080005000300000005000600020000000500020006000000050006000800000005000200030000002400018008000100", @ANYRES32=r2, @ANYBLOB="080001007949989d062faaa723989e3ee3c5932721bb36dd7b7c9b648665732789b7a98c0f67821592bb29005edf60eeadebb393036411ae82d9dcc9990d577ed4c4a6e4d005", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="080005004000000010000380080002001f000000040001000500020008000000"], 0x88}, 0x1, 0x0, 0x0, 0x488c0}, 0x4840) 17:56:47 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a0003ec513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1190.791854] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1190.799131] R13: 0000000000000004 R14: 0000000020000058 R15: 0000000000000001 17:56:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) 17:56:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 10) 17:56:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) (async) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@deltfilter={0x24}, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) (async) socket$can_bcm(0x1d, 0x2, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) (async) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x50, 0x10, 0xffffff1f, 0x70bd28, 0x4, {0x0, 0x0, 0x0, 0x0, 0x0, 0x60410}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa}, {0x18, 0x2, 0x0, 0x1, @val={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x50}}, 0x0) 17:56:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="050340a436473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:47 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a06247c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:47 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r6}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x29, 0x9, 0x6, 0x1, 0x40, @private0, @loopback, 0x7800, 0x7, 0x1, 0x6}}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="8800007a61cb8564077d3cc10587ae21bfe4aa59d27d18de3634e8f740d359b18fe1a7d8e86e31", @ANYRES16=0x0, @ANYBLOB="00012cbd7000fcdbdf250500000008000500fffeffff080005000300000005000600020000000500020006000000050006000800000005000200030000002400018008000100", @ANYRES32=r2, @ANYBLOB="080001007949989d062faaa723989e3ee3c5932721bb36dd7b7c9b648665732789b7a98c0f67821592bb29005edf60eeadebb393036411ae82d9dcc9990d577ed4c4a6e4d005", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="080005004000000010000380080002001f000000040001000500020008000000"], 0x88}, 0x1, 0x0, 0x0, 0x488c0}, 0x4840) 17:56:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d0329a153e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1191.019109] FAULT_INJECTION: forcing a failure. [ 1191.019109] name failslab, interval 1, probability 0, space 0, times 0 [ 1191.060542] CPU: 1 PID: 21071 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1191.068464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1191.077834] Call Trace: [ 1191.080440] dump_stack+0x1fc/0x2ef [ 1191.084083] should_fail.cold+0xa/0xf [ 1191.087918] ? setup_fault_attr+0x200/0x200 [ 1191.092251] ? lock_acquire+0x170/0x3c0 [ 1191.096245] __should_failslab+0x115/0x180 [ 1191.100493] should_failslab+0x5/0x10 [ 1191.104303] kmem_cache_alloc_trace+0x284/0x380 17:56:47 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a04762c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1191.108977] apparmor_file_alloc_security+0x394/0xad0 [ 1191.114157] ? apparmor_file_receive+0x160/0x160 [ 1191.118898] ? __alloc_file+0x21/0x340 [ 1191.122771] security_file_alloc+0x40/0x90 [ 1191.126993] __alloc_file+0xd8/0x340 [ 1191.130695] alloc_empty_file+0x6d/0x170 [ 1191.134748] path_openat+0xe9/0x2df0 [ 1191.138448] ? __lock_acquire+0x6de/0x3ff0 [ 1191.142693] ? path_lookupat+0x8d0/0x8d0 [ 1191.146763] ? mark_held_locks+0xf0/0xf0 [ 1191.150833] ? mark_held_locks+0xf0/0xf0 [ 1191.154906] do_filp_open+0x18c/0x3f0 17:56:47 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r6}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x29, 0x9, 0x6, 0x1, 0x40, @private0, @loopback, 0x7800, 0x7, 0x1, 0x6}}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="8800007a61cb8564077d3cc10587ae21bfe4aa59d27d18de3634e8f740d359b18fe1a7d8e86e31", @ANYRES16=0x0, @ANYBLOB="00012cbd7000fcdbdf250500000008000500fffeffff080005000300000005000600020000000500020006000000050006000800000005000200030000002400018008000100", @ANYRES32=r2, @ANYBLOB="080001007949989d062faaa723989e3ee3c5932721bb36dd7b7c9b648665732789b7a98c0f67821592bb29005edf60eeadebb393036411ae82d9dcc9990d577ed4c4a6e4d005", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="080005004000000010000380080002001f000000040001000500020008000000"], 0x88}, 0x1, 0x0, 0x0, 0x488c0}, 0x4840) [ 1191.158713] ? may_open_dev+0xf0/0xf0 [ 1191.162520] ? __alloc_fd+0x28d/0x570 [ 1191.166335] ? lock_downgrade+0x720/0x720 [ 1191.170488] ? lock_acquire+0x170/0x3c0 [ 1191.174469] ? __alloc_fd+0x34/0x570 [ 1191.178193] ? do_raw_spin_unlock+0x171/0x230 [ 1191.182694] ? _raw_spin_unlock+0x29/0x40 [ 1191.186854] ? __alloc_fd+0x28d/0x570 [ 1191.190671] do_sys_open+0x3b3/0x520 [ 1191.194393] ? filp_open+0x70/0x70 [ 1191.197944] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1191.203316] ? trace_hardirqs_off_caller+0x6e/0x210 17:56:47 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r6}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x29, 0x9, 0x6, 0x1, 0x40, @private0, @loopback, 0x7800, 0x7, 0x1, 0x6}}) [ 1191.208340] ? do_syscall_64+0x21/0x620 [ 1191.212327] do_syscall_64+0xf9/0x620 [ 1191.216138] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1191.221331] RIP: 0033:0x7f350f35b004 [ 1191.225048] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1191.243954] RSP: 002b:00007f350dd1ceb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1191.251674] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f35b004 17:56:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 11) 17:56:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, 0x0) 17:56:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) (async) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@deltfilter={0x24}, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$can_bcm(0x1d, 0x2, 0x2) (async, rerun: 32) socket$can_bcm(0x1d, 0x2, 0x2) (async, rerun: 32) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x50, 0x10, 0xffffff1f, 0x70bd28, 0x4, {0x0, 0x0, 0x0, 0x0, 0x0, 0x60410}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa}, {0x18, 0x2, 0x0, 0x1, @val={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x50}}, 0x0) [ 1191.259040] RDX: 0000000000000002 RSI: 00007f350dd1cfe0 RDI: 00000000ffffff9c [ 1191.266313] RBP: 00007f350dd1cfe0 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1191.273581] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1191.280875] R13: 0000000000000004 R14: 0000000020000058 R15: 0000000000000001 17:56:47 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r6}) 17:56:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d032d05c3e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:47 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00002c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1191.422085] FAULT_INJECTION: forcing a failure. [ 1191.422085] name failslab, interval 1, probability 0, space 0, times 0 [ 1191.451495] CPU: 0 PID: 21107 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1191.459402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1191.468753] Call Trace: [ 1191.471333] dump_stack+0x1fc/0x2ef [ 1191.474945] should_fail.cold+0xa/0xf [ 1191.478738] ? setup_fault_attr+0x200/0x200 [ 1191.483046] ? lock_acquire+0x170/0x3c0 [ 1191.487042] __should_failslab+0x115/0x180 [ 1191.491272] should_failslab+0x5/0x10 [ 1191.495054] kmem_cache_alloc_trace+0x284/0x380 [ 1191.499708] ? loop_info64_to_compat+0x5e0/0x5e0 [ 1191.504446] __kthread_create_on_node+0xd2/0x410 [ 1191.509187] ? kthread_parkme+0xa0/0xa0 [ 1191.513141] ? lock_acquire+0x170/0x3c0 [ 1191.517100] ? lo_ioctl+0x1bb/0x20e0 [ 1191.520800] ? __mutex_lock+0x368/0x1190 [ 1191.524850] ? lock_downgrade+0x720/0x720 [ 1191.528988] ? check_preemption_disabled+0x41/0x280 [ 1191.533992] ? loop_info64_to_compat+0x5e0/0x5e0 [ 1191.538727] kthread_create_on_node+0xbb/0xf0 [ 1191.543204] ? __kthread_create_on_node+0x410/0x410 [ 1191.548212] ? __fget+0x356/0x510 [ 1191.551665] ? do_dup2+0x450/0x450 [ 1191.555201] ? __lockdep_init_map+0x100/0x5a0 [ 1191.559755] ? __lockdep_init_map+0x100/0x5a0 [ 1191.564241] lo_ioctl+0xae5/0x20e0 [ 1191.567770] ? loop_set_status64+0x110/0x110 [ 1191.572167] blkdev_ioctl+0x5cb/0x1a80 [ 1191.576041] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1191.581419] ? blkpg_ioctl+0x9d0/0x9d0 [ 1191.585305] ? mark_held_locks+0xf0/0xf0 [ 1191.589349] ? mark_held_locks+0xf0/0xf0 [ 1191.593394] ? debug_check_no_obj_freed+0x201/0x490 [ 1191.598402] ? lock_downgrade+0x720/0x720 [ 1191.602535] block_ioctl+0xe9/0x130 [ 1191.606142] ? blkdev_fallocate+0x3f0/0x3f0 [ 1191.610451] do_vfs_ioctl+0xcdb/0x12e0 [ 1191.614321] ? lock_downgrade+0x720/0x720 [ 1191.618454] ? check_preemption_disabled+0x41/0x280 [ 1191.623451] ? ioctl_preallocate+0x200/0x200 [ 1191.627849] ? __fget+0x356/0x510 [ 1191.631285] ? do_dup2+0x450/0x450 [ 1191.634810] ? do_sys_open+0x2bf/0x520 [ 1191.638692] ksys_ioctl+0x9b/0xc0 [ 1191.642139] __x64_sys_ioctl+0x6f/0xb0 [ 1191.646008] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1191.650572] do_syscall_64+0xf9/0x620 [ 1191.654359] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1191.659528] RIP: 0033:0x7f350f3a7ea7 [ 1191.663223] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1191.682105] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1191.689792] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f3a7ea7 [ 1191.697040] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1191.704288] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1191.711536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 17:56:48 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00004c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1191.718787] R13: 0000000000000004 R14: 0000000020000058 R15: 0000000000000001 17:56:48 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r6}) 17:56:48 executing program 0: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r6}) 17:56:48 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03206a43e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:48 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00005c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 12) 17:56:48 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086}) 17:56:48 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d032aaf93e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1191.995019] FAULT_INJECTION: forcing a failure. [ 1191.995019] name failslab, interval 1, probability 0, space 0, times 0 [ 1192.024262] CPU: 1 PID: 21141 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1192.032173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1192.041533] Call Trace: 17:56:48 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00006c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:48 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086}) [ 1192.044139] dump_stack+0x1fc/0x2ef [ 1192.047787] should_fail.cold+0xa/0xf [ 1192.051603] ? setup_fault_attr+0x200/0x200 [ 1192.055939] ? lock_acquire+0x170/0x3c0 [ 1192.059927] __should_failslab+0x115/0x180 [ 1192.064163] should_failslab+0x5/0x10 [ 1192.067969] kmem_cache_alloc_trace+0x284/0x380 [ 1192.072646] ? loop_info64_to_compat+0x5e0/0x5e0 [ 1192.077413] __kthread_create_on_node+0xd2/0x410 [ 1192.082170] ? kthread_parkme+0xa0/0xa0 [ 1192.086147] ? lock_acquire+0x170/0x3c0 [ 1192.090129] ? lo_ioctl+0x1bb/0x20e0 17:56:48 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086}) [ 1192.093861] ? __mutex_lock+0x368/0x1190 [ 1192.097941] ? lock_downgrade+0x720/0x720 [ 1192.102100] ? check_preemption_disabled+0x41/0x280 [ 1192.107129] ? loop_info64_to_compat+0x5e0/0x5e0 [ 1192.111883] kthread_create_on_node+0xbb/0xf0 [ 1192.116380] ? __kthread_create_on_node+0x410/0x410 [ 1192.121406] ? __fget+0x356/0x510 [ 1192.124876] ? do_dup2+0x450/0x450 [ 1192.128427] ? __lockdep_init_map+0x100/0x5a0 [ 1192.132928] ? __lockdep_init_map+0x100/0x5a0 [ 1192.137433] lo_ioctl+0xae5/0x20e0 [ 1192.140982] ? loop_set_status64+0x110/0x110 17:56:48 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r4}) 17:56:48 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r4}) [ 1192.145395] blkdev_ioctl+0x5cb/0x1a80 [ 1192.149284] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1192.154659] ? blkpg_ioctl+0x9d0/0x9d0 [ 1192.158557] ? mark_held_locks+0xf0/0xf0 [ 1192.162624] ? mark_held_locks+0xf0/0xf0 [ 1192.166696] ? debug_check_no_obj_freed+0x201/0x490 [ 1192.171726] ? lock_downgrade+0x720/0x720 [ 1192.175886] block_ioctl+0xe9/0x130 [ 1192.179514] ? blkdev_fallocate+0x3f0/0x3f0 [ 1192.183848] do_vfs_ioctl+0xcdb/0x12e0 [ 1192.187747] ? lock_downgrade+0x720/0x720 [ 1192.191894] ? check_preemption_disabled+0x41/0x280 [ 1192.196911] ? ioctl_preallocate+0x200/0x200 [ 1192.201321] ? __fget+0x356/0x510 [ 1192.204779] ? do_dup2+0x450/0x450 [ 1192.208327] ? do_sys_open+0x2bf/0x520 [ 1192.212222] ksys_ioctl+0x9b/0xc0 [ 1192.215691] __x64_sys_ioctl+0x6f/0xb0 [ 1192.219583] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1192.224170] do_syscall_64+0xf9/0x620 [ 1192.227983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1192.233171] RIP: 0033:0x7f350f3a7ea7 [ 1192.236883] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1192.255781] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1192.263487] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f3a7ea7 [ 1192.270861] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1192.278146] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1192.285406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 17:56:48 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r4}) 17:56:48 executing program 0: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r6}) 17:56:48 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup(0xffffffffffffffff) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r5}) 17:56:48 executing program 1: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r6}) [ 1192.292664] R13: 0000000000000004 R14: 0000000020000058 R15: 0000000000000001 17:56:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 13) 17:56:48 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00007c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:48 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d032b6fd3e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1192.472090] FAULT_INJECTION: forcing a failure. [ 1192.472090] name failslab, interval 1, probability 0, space 0, times 0 [ 1192.501122] CPU: 0 PID: 21168 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1192.509030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1192.518391] Call Trace: [ 1192.520989] dump_stack+0x1fc/0x2ef [ 1192.524621] should_fail.cold+0xa/0xf [ 1192.528424] ? setup_fault_attr+0x200/0x200 [ 1192.532745] ? lock_acquire+0x170/0x3c0 [ 1192.536722] __should_failslab+0x115/0x180 [ 1192.540957] should_failslab+0x5/0x10 [ 1192.544744] kmem_cache_alloc+0x277/0x370 [ 1192.548889] __kernfs_new_node+0xd2/0x680 [ 1192.553046] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1192.557800] ? _raw_spin_unlock_irq+0x5a/0x80 [ 1192.562306] ? __cpu_to_node+0x7b/0xa0 [ 1192.566204] ? mark_held_locks+0xf0/0xf0 [ 1192.570260] ? io_schedule_timeout+0x140/0x140 [ 1192.574922] ? enqueue_entity+0xf86/0x3850 [ 1192.579164] ? set_user_nice.part.0+0x3b9/0xab0 [ 1192.583835] kernfs_create_dir_ns+0x9e/0x230 [ 1192.588249] internal_create_group+0x1c1/0xb20 [ 1192.592830] ? sysfs_remove_link_from_group+0x70/0x70 [ 1192.598018] ? lock_downgrade+0x720/0x720 [ 1192.602184] lo_ioctl+0xf7c/0x20e0 [ 1192.605722] ? loop_set_status64+0x110/0x110 [ 1192.610115] blkdev_ioctl+0x5cb/0x1a80 [ 1192.613998] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1192.619356] ? blkpg_ioctl+0x9d0/0x9d0 [ 1192.623240] ? mark_held_locks+0xf0/0xf0 [ 1192.627293] ? mark_held_locks+0xf0/0xf0 [ 1192.631349] ? debug_check_no_obj_freed+0x201/0x490 [ 1192.636365] ? lock_downgrade+0x720/0x720 [ 1192.640516] block_ioctl+0xe9/0x130 [ 1192.644126] ? blkdev_fallocate+0x3f0/0x3f0 [ 1192.648440] do_vfs_ioctl+0xcdb/0x12e0 [ 1192.652320] ? lock_downgrade+0x720/0x720 [ 1192.656463] ? check_preemption_disabled+0x41/0x280 [ 1192.661474] ? ioctl_preallocate+0x200/0x200 [ 1192.665869] ? __fget+0x356/0x510 [ 1192.669307] ? do_dup2+0x450/0x450 [ 1192.672832] ? do_sys_open+0x2bf/0x520 [ 1192.676718] ksys_ioctl+0x9b/0xc0 [ 1192.680163] __x64_sys_ioctl+0x6f/0xb0 [ 1192.684036] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1192.688602] do_syscall_64+0xf9/0x620 [ 1192.692388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1192.697570] RIP: 0033:0x7f350f3a7ea7 [ 1192.701274] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 17:56:49 executing program 1: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r6}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x29, 0x9, 0x6, 0x1, 0x40, @private0, @loopback, 0x7800, 0x7, 0x1, 0x6}}) 17:56:49 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup(0xffffffffffffffff) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r5}) 17:56:49 executing program 0: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r6}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x29, 0x9, 0x6, 0x1, 0x40, @private0, @loopback, 0x7800, 0x7, 0x1, 0x6}}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="8800007a61cb8564077d3cc10587ae21bfe4aa59d27d18de3634e8f740d359b18fe1a7d8e86e31", @ANYRES16=0x0, @ANYBLOB="00012cbd7000fcdbdf250500000008000500fffeffff080005000300000005000600020000000500020006000000050006000800000005000200030000002400018008000100", @ANYRES32=r2, @ANYBLOB="080001007949989d062faaa723989e3ee3c5932721bb36dd7b7c9b648665732789b7a98c0f67821592bb29005edf60eeadebb393036411ae82d9dcc9990d577ed4c4a6e4d005", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="080005004000000010000380080002001f000000040001000500020008000000"], 0x88}, 0x1, 0x0, 0x0, 0x488c0}, 0x4840) 17:56:49 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00008c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0200a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1192.720171] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1192.727884] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f3a7ea7 [ 1192.735145] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1192.742402] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1192.749656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1192.756913] R13: 0000000000000004 R14: 0000000020000058 R15: 0000000000000001 17:56:49 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a0000ec513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 14) 17:56:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0300a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:49 executing program 1: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r6}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x29, 0x9, 0x6, 0x1, 0x40, @private0, @loopback, 0x7800, 0x7, 0x1, 0x6}}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="8800007a61cb8564077d3cc10587ae21bfe4aa59d27d18de3634e8f740d359b18fe1a7d8e86e31", @ANYRES16=0x0, @ANYBLOB="00012cbd7000fcdbdf250500000008000500fffeffff080005000300000005000600020000000500020006000000050006000800000005000200030000002400018008000100", @ANYRES32=r2, @ANYBLOB="080001007949989d062faaa723989e3ee3c5932721bb36dd7b7c9b648665732789b7a98c0f67821592bb29005edf60eeadebb393036411ae82d9dcc9990d577ed4c4a6e4d005", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="080005004000000010000380080002001f000000040001000500020008000000"], 0x88}, 0x1, 0x0, 0x0, 0x488c0}, 0x4840) 17:56:49 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00010c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:49 executing program 0: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r6}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x29, 0x9, 0x6, 0x1, 0x40, @private0, @loopback, 0x7800, 0x7, 0x1, 0x6}}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="8800007a61cb8564077d3cc10587ae21bfe4aa59d27d18de3634e8f740d359b18fe1a7d8e86e31", @ANYRES16=0x0, @ANYBLOB="00012cbd7000fcdbdf250500000008000500fffeffff080005000300000005000600020000000500020006000000050006000800000005000200030000002400018008000100", @ANYRES32=r2, @ANYBLOB="080001007949989d062faaa723989e3ee3c5932721bb36dd7b7c9b648665732789b7a98c0f67821592bb29005edf60eeadebb393036411ae82d9dcc9990d577ed4c4a6e4d005", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="080005004000000010000380080002001f000000040001000500020008000000"], 0x88}, 0x1, 0x0, 0x0, 0x488c0}, 0x4840) 17:56:49 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup(0xffffffffffffffff) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r5}) [ 1192.986639] FAULT_INJECTION: forcing a failure. [ 1192.986639] name failslab, interval 1, probability 0, space 0, times 0 [ 1193.000504] CPU: 0 PID: 21194 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1193.008405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1193.017801] Call Trace: [ 1193.020424] dump_stack+0x1fc/0x2ef [ 1193.024052] should_fail.cold+0xa/0xf [ 1193.027859] ? setup_fault_attr+0x200/0x200 [ 1193.032184] ? lock_acquire+0x170/0x3c0 [ 1193.036152] __should_failslab+0x115/0x180 [ 1193.040372] should_failslab+0x5/0x10 [ 1193.044164] kmem_cache_alloc+0x277/0x370 [ 1193.048320] __kernfs_new_node+0xd2/0x680 [ 1193.052476] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1193.057226] ? kernfs_activate+0x2c/0x1d0 [ 1193.061363] ? lock_downgrade+0x720/0x720 [ 1193.065498] ? kernfs_add_one+0x51/0x4c0 [ 1193.069559] ? mutex_trylock+0x1a0/0x1a0 [ 1193.073625] ? __mutex_unlock_slowpath+0xea/0x610 [ 1193.078472] kernfs_new_node+0x92/0x120 [ 1193.082445] __kernfs_create_file+0x51/0x340 [ 1193.086853] sysfs_add_file_mode_ns+0x226/0x540 [ 1193.091531] internal_create_group+0x355/0xb20 [ 1193.096112] ? sysfs_remove_link_from_group+0x70/0x70 [ 1193.101287] ? lock_downgrade+0x720/0x720 [ 1193.105537] lo_ioctl+0xf7c/0x20e0 [ 1193.109078] ? loop_set_status64+0x110/0x110 [ 1193.113481] blkdev_ioctl+0x5cb/0x1a80 [ 1193.117353] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1193.122700] ? blkpg_ioctl+0x9d0/0x9d0 [ 1193.126584] ? mark_held_locks+0xf0/0xf0 [ 1193.130647] ? mark_held_locks+0xf0/0xf0 [ 1193.134709] ? debug_check_no_obj_freed+0x201/0x490 [ 1193.139712] ? lock_downgrade+0x720/0x720 [ 1193.143844] block_ioctl+0xe9/0x130 [ 1193.147460] ? blkdev_fallocate+0x3f0/0x3f0 [ 1193.151795] do_vfs_ioctl+0xcdb/0x12e0 [ 1193.155679] ? lock_downgrade+0x720/0x720 [ 1193.159811] ? check_preemption_disabled+0x41/0x280 [ 1193.164820] ? ioctl_preallocate+0x200/0x200 [ 1193.169234] ? __fget+0x356/0x510 [ 1193.172682] ? do_dup2+0x450/0x450 [ 1193.176213] ? do_sys_open+0x2bf/0x520 [ 1193.180094] ksys_ioctl+0x9b/0xc0 [ 1193.183530] __x64_sys_ioctl+0x6f/0xb0 [ 1193.187409] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1193.191992] do_syscall_64+0xf9/0x620 [ 1193.195786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1193.200963] RIP: 0033:0x7f350f3a7ea7 [ 1193.204657] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1193.223545] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:56:49 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a0003ec513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1193.231250] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f3a7ea7 [ 1193.238517] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1193.245772] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1193.253038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1193.260297] R13: 0000000000000004 R14: 0000000020000058 R15: 0000000000000001 17:56:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 15) 17:56:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0500a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:49 executing program 1: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r6}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x29, 0x9, 0x6, 0x1, 0x40, @private0, @loopback, 0x7800, 0x7, 0x1, 0x6}}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="8800007a61cb8564077d3cc10587ae21bfe4aa59d27d18de3634e8f740d359b18fe1a7d8e86e31", @ANYRES16=0x0, @ANYBLOB="00012cbd7000fcdbdf250500000008000500fffeffff080005000300000005000600020000000500020006000000050006000800000005000200030000002400018008000100", @ANYRES32=r2, @ANYBLOB="080001007949989d062faaa723989e3ee3c5932721bb36dd7b7c9b648665732789b7a98c0f67821592bb29005edf60eeadebb393036411ae82d9dcc9990d577ed4c4a6e4d005", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="080005004000000010000380080002001f000000040001000500020008000000"], 0x88}, 0x1, 0x0, 0x0, 0x488c0}, 0x4840) pipe(&(0x7f0000000340)) 17:56:49 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r5}) 17:56:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 1) [ 1193.417043] FAULT_INJECTION: forcing a failure. [ 1193.417043] name failslab, interval 1, probability 0, space 0, times 0 [ 1193.428862] CPU: 0 PID: 21216 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1193.436762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1193.446116] Call Trace: [ 1193.448716] dump_stack+0x1fc/0x2ef [ 1193.452357] should_fail.cold+0xa/0xf [ 1193.456168] ? setup_fault_attr+0x200/0x200 [ 1193.460496] ? lock_acquire+0x170/0x3c0 [ 1193.464470] __should_failslab+0x115/0x180 [ 1193.468691] should_failslab+0x5/0x10 [ 1193.472473] kmem_cache_alloc+0x277/0x370 [ 1193.476626] __kernfs_new_node+0xd2/0x680 [ 1193.480790] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1193.485543] ? kernfs_activate+0x2c/0x1d0 [ 1193.489685] ? lock_downgrade+0x720/0x720 [ 1193.493823] ? kernfs_add_one+0x51/0x4c0 [ 1193.497879] ? mutex_trylock+0x1a0/0x1a0 [ 1193.501938] ? __mutex_unlock_slowpath+0xea/0x610 [ 1193.506769] kernfs_new_node+0x92/0x120 [ 1193.510733] __kernfs_create_file+0x51/0x340 [ 1193.515129] sysfs_add_file_mode_ns+0x226/0x540 [ 1193.519800] internal_create_group+0x355/0xb20 [ 1193.524377] ? sysfs_remove_link_from_group+0x70/0x70 [ 1193.529550] ? lock_downgrade+0x720/0x720 [ 1193.533712] lo_ioctl+0xf7c/0x20e0 [ 1193.537261] ? loop_set_status64+0x110/0x110 [ 1193.541667] blkdev_ioctl+0x5cb/0x1a80 [ 1193.545548] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1193.550905] ? blkpg_ioctl+0x9d0/0x9d0 [ 1193.554782] ? mark_held_locks+0xf0/0xf0 [ 1193.558841] ? mark_held_locks+0xf0/0xf0 [ 1193.562915] ? debug_check_no_obj_freed+0x201/0x490 [ 1193.567928] ? lock_downgrade+0x720/0x720 [ 1193.572063] block_ioctl+0xe9/0x130 [ 1193.575677] ? blkdev_fallocate+0x3f0/0x3f0 [ 1193.580000] do_vfs_ioctl+0xcdb/0x12e0 [ 1193.583888] ? lock_downgrade+0x720/0x720 [ 1193.588021] ? check_preemption_disabled+0x41/0x280 [ 1193.593018] ? ioctl_preallocate+0x200/0x200 [ 1193.597425] ? __fget+0x356/0x510 [ 1193.600883] ? do_dup2+0x450/0x450 [ 1193.604419] ? do_sys_open+0x2bf/0x520 [ 1193.608298] ksys_ioctl+0x9b/0xc0 [ 1193.611737] __x64_sys_ioctl+0x6f/0xb0 [ 1193.615611] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1193.620186] do_syscall_64+0xf9/0x620 [ 1193.623983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1193.629155] RIP: 0033:0x7f350f3a7ea7 [ 1193.632850] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1193.651734] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1193.659437] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f3a7ea7 17:56:50 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08026b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 16) [ 1193.666698] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1193.673951] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1193.681207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1193.688467] R13: 0000000000000004 R14: 0000000020000058 R15: 0000000000000001 17:56:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0600a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:50 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000180), 0x80c002000104082, 0x0) open(0x0, 0x0, 0x6) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000002040)={0x0, 0xfffffffffffffff7}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) ioctl$BLKRRPART(r0, 0x125f, 0x8ed40200) 17:56:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:50 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r5}) [ 1193.817670] FAULT_INJECTION: forcing a failure. [ 1193.817670] name failslab, interval 1, probability 0, space 0, times 0 [ 1193.829062] CPU: 0 PID: 21232 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1193.836953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1193.846312] Call Trace: [ 1193.848907] dump_stack+0x1fc/0x2ef [ 1193.852543] should_fail.cold+0xa/0xf [ 1193.856354] ? setup_fault_attr+0x200/0x200 [ 1193.860686] ? lock_acquire+0x170/0x3c0 [ 1193.864667] __should_failslab+0x115/0x180 [ 1193.868893] should_failslab+0x5/0x10 [ 1193.872780] kmem_cache_alloc+0x277/0x370 [ 1193.877100] __kernfs_new_node+0xd2/0x680 [ 1193.881253] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1193.886018] ? __mutex_unlock_slowpath+0xea/0x610 [ 1193.890863] ? wait_for_completion_io+0x10/0x10 [ 1193.895522] ? kernfs_next_descendant_post+0x19c/0x290 [ 1193.900788] kernfs_new_node+0x92/0x120 [ 1193.904753] __kernfs_create_file+0x51/0x340 [ 1193.909149] sysfs_add_file_mode_ns+0x226/0x540 [ 1193.913804] internal_create_group+0x355/0xb20 [ 1193.918386] ? sysfs_remove_link_from_group+0x70/0x70 [ 1193.923569] ? lock_downgrade+0x720/0x720 [ 1193.927730] lo_ioctl+0xf7c/0x20e0 [ 1193.931266] ? loop_set_status64+0x110/0x110 [ 1193.935670] blkdev_ioctl+0x5cb/0x1a80 [ 1193.939557] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1193.944926] ? blkpg_ioctl+0x9d0/0x9d0 [ 1193.948813] ? mark_held_locks+0xf0/0xf0 [ 1193.952859] ? mark_held_locks+0xf0/0xf0 [ 1193.956920] ? debug_check_no_obj_freed+0x201/0x490 [ 1193.961933] ? lock_downgrade+0x720/0x720 [ 1193.966077] block_ioctl+0xe9/0x130 [ 1193.969699] ? blkdev_fallocate+0x3f0/0x3f0 [ 1193.974120] do_vfs_ioctl+0xcdb/0x12e0 [ 1193.978009] ? lock_downgrade+0x720/0x720 [ 1193.982151] ? check_preemption_disabled+0x41/0x280 [ 1193.987168] ? ioctl_preallocate+0x200/0x200 [ 1193.991597] ? __fget+0x356/0x510 [ 1193.995048] ? do_dup2+0x450/0x450 [ 1193.998590] ? do_sys_open+0x2bf/0x520 [ 1194.002480] ksys_ioctl+0x9b/0xc0 [ 1194.005944] __x64_sys_ioctl+0x6f/0xb0 [ 1194.009836] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1194.014404] do_syscall_64+0xf9/0x620 [ 1194.018204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1194.023381] RIP: 0033:0x7f350f3a7ea7 [ 1194.027084] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1194.045986] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1194.053688] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f3a7ea7 [ 1194.060939] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 17:56:50 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08036b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1194.068192] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1194.075442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1194.082697] R13: 0000000000000004 R14: 0000000020000058 R15: 0000000000000001 17:56:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 17) 17:56:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0402a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:50 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, '\x00', 0x28}, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x1, 0x0, 0x0, 0x24e20086, r2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r5}) 17:56:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:50 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08046b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:50 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000180), 0x80c002000104082, 0x0) (async) open(0x0, 0x0, 0x6) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000002040)={0x0, 0xfffffffffffffff7}) (async, rerun: 32) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) (async, rerun: 64) ioctl$BLKRRPART(r0, 0x125f, 0x8ed40200) (rerun: 64) [ 1194.276743] FAULT_INJECTION: forcing a failure. [ 1194.276743] name failslab, interval 1, probability 0, space 0, times 0 [ 1194.311298] CPU: 1 PID: 21252 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 17:56:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0404a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:50 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r4}) [ 1194.319205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1194.328561] Call Trace: [ 1194.331162] dump_stack+0x1fc/0x2ef [ 1194.334803] should_fail.cold+0xa/0xf [ 1194.338629] ? setup_fault_attr+0x200/0x200 [ 1194.342959] ? lock_acquire+0x170/0x3c0 [ 1194.346958] __should_failslab+0x115/0x180 [ 1194.351209] should_failslab+0x5/0x10 [ 1194.355018] kmem_cache_alloc+0x277/0x370 [ 1194.359167] __kernfs_new_node+0xd2/0x680 [ 1194.363319] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1194.368085] ? __mutex_unlock_slowpath+0xea/0x610 17:56:50 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r4}) [ 1194.372941] ? wait_for_completion_io+0x10/0x10 [ 1194.377639] ? kernfs_next_descendant_post+0x19c/0x290 [ 1194.382948] kernfs_new_node+0x92/0x120 [ 1194.386942] __kernfs_create_file+0x51/0x340 [ 1194.391365] sysfs_add_file_mode_ns+0x226/0x540 [ 1194.396050] internal_create_group+0x355/0xb20 [ 1194.400658] ? sysfs_remove_link_from_group+0x70/0x70 [ 1194.405850] ? lock_downgrade+0x720/0x720 [ 1194.410002] lo_ioctl+0xf7c/0x20e0 [ 1194.413556] ? loop_set_status64+0x110/0x110 [ 1194.417974] blkdev_ioctl+0x5cb/0x1a80 [ 1194.421867] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 17:56:50 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r4}) [ 1194.427250] ? blkpg_ioctl+0x9d0/0x9d0 [ 1194.431145] ? mark_held_locks+0xf0/0xf0 [ 1194.435211] ? mark_held_locks+0xf0/0xf0 [ 1194.439283] ? debug_check_no_obj_freed+0x201/0x490 [ 1194.444309] ? lock_downgrade+0x720/0x720 [ 1194.448461] block_ioctl+0xe9/0x130 [ 1194.452089] ? blkdev_fallocate+0x3f0/0x3f0 [ 1194.456415] do_vfs_ioctl+0xcdb/0x12e0 [ 1194.460314] ? lock_downgrade+0x720/0x720 [ 1194.464472] ? check_preemption_disabled+0x41/0x280 [ 1194.469483] ? ioctl_preallocate+0x200/0x200 [ 1194.473884] ? __fget+0x356/0x510 17:56:50 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r4}) [ 1194.477337] ? do_dup2+0x450/0x450 [ 1194.480882] ? do_sys_open+0x2bf/0x520 [ 1194.484779] ksys_ioctl+0x9b/0xc0 [ 1194.488243] __x64_sys_ioctl+0x6f/0xb0 [ 1194.492134] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1194.496713] do_syscall_64+0xf9/0x620 [ 1194.500514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1194.505724] RIP: 0033:0x7f350f3a7ea7 [ 1194.509433] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1194.528328] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1194.536043] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f3a7ea7 [ 1194.543317] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1194.550584] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1194.557854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1194.565120] R13: 0000000000000004 R14: 0000000020000058 R15: 0000000000000001 17:56:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 18) 17:56:51 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r4}) 17:56:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08056b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0405a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:51 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000180), 0x80c002000104082, 0x0) (async) open(0x0, 0x0, 0x6) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000002040)={0x0, 0xfffffffffffffff7}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) (async) ioctl$BLKRRPART(r0, 0x125f, 0x8ed40200) 17:56:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08116b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:51 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r4}) 17:56:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0406a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:51 executing program 1: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r4}) [ 1194.790891] FAULT_INJECTION: forcing a failure. [ 1194.790891] name failslab, interval 1, probability 0, space 0, times 0 [ 1194.830756] CPU: 1 PID: 21301 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 17:56:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1194.838662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1194.848027] Call Trace: [ 1194.850628] dump_stack+0x1fc/0x2ef [ 1194.854269] should_fail.cold+0xa/0xf [ 1194.858081] ? setup_fault_attr+0x200/0x200 [ 1194.862413] ? lock_acquire+0x170/0x3c0 [ 1194.866403] __should_failslab+0x115/0x180 [ 1194.870650] should_failslab+0x5/0x10 [ 1194.874448] kmem_cache_alloc+0x277/0x370 [ 1194.878587] __kernfs_new_node+0xd2/0x680 [ 1194.882726] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1194.887469] ? __mutex_unlock_slowpath+0xea/0x610 [ 1194.892302] ? wait_for_completion_io+0x10/0x10 [ 1194.896988] ? kernfs_next_descendant_post+0x19c/0x290 [ 1194.902283] kernfs_new_node+0x92/0x120 [ 1194.906257] __kernfs_create_file+0x51/0x340 [ 1194.910656] sysfs_add_file_mode_ns+0x226/0x540 [ 1194.915315] internal_create_group+0x355/0xb20 [ 1194.919880] ? sysfs_remove_link_from_group+0x70/0x70 [ 1194.925049] ? lock_downgrade+0x720/0x720 [ 1194.929273] lo_ioctl+0xf7c/0x20e0 [ 1194.932800] ? loop_set_status64+0x110/0x110 [ 1194.937189] blkdev_ioctl+0x5cb/0x1a80 [ 1194.941057] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1194.946400] ? blkpg_ioctl+0x9d0/0x9d0 [ 1194.950269] ? mark_held_locks+0xf0/0xf0 [ 1194.954309] ? mark_held_locks+0xf0/0xf0 [ 1194.958365] ? debug_check_no_obj_freed+0x201/0x490 [ 1194.963369] ? lock_downgrade+0x720/0x720 [ 1194.967501] block_ioctl+0xe9/0x130 [ 1194.971114] ? blkdev_fallocate+0x3f0/0x3f0 [ 1194.975424] do_vfs_ioctl+0xcdb/0x12e0 [ 1194.979294] ? lock_downgrade+0x720/0x720 [ 1194.983426] ? check_preemption_disabled+0x41/0x280 [ 1194.988426] ? ioctl_preallocate+0x200/0x200 [ 1194.992819] ? __fget+0x356/0x510 [ 1194.996256] ? do_dup2+0x450/0x450 [ 1194.999778] ? do_sys_open+0x2bf/0x520 [ 1195.003650] ksys_ioctl+0x9b/0xc0 [ 1195.007088] __x64_sys_ioctl+0x6f/0xb0 [ 1195.010957] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1195.015543] do_syscall_64+0xf9/0x620 [ 1195.019328] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1195.024499] RIP: 0033:0x7f350f3a7ea7 [ 1195.028194] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1195.047078] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1195.054770] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f3a7ea7 [ 1195.062046] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1195.069296] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1195.076545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1195.083798] R13: 0000000000000004 R14: 0000000020000058 R15: 0000000000000001 17:56:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 19) 17:56:51 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r4}) 17:56:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816136478f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0408a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:51 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x6, 0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0xcba0, 0x0, 0x4, 0x0, 0x100}, 0x0, 0xf, r0, 0x1) r1 = perf_event_open$cgroup(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x9, 0x3f, 0x6, 0x0, 0x0, 0x80000, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000180), 0x9}, 0x0, 0xffff, 0x0, 0x6, 0x7, 0x7, 0x100, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x80, 0xf7, 0x3, 0x8, 0x1, 0x0, 0x2, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7668, 0x1, @perf_config_ext={0x10001, 0x8}, 0x10900, 0x6, 0xf53, 0x6, 0x5, 0x5, 0x20, 0x0, 0x2, 0x0, 0x6}, 0xffffffffffffffff, 0x3, r1, 0xc11bae0cb8d261e6) r3 = syz_clone(0x89200800, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x8, 0x6, 0x5b, 0x9, 0x0, 0x400, 0x4a082, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000340), 0xb}, 0x4, 0x0, 0x6, 0x7, 0x2, 0x825, 0xd5e, 0x0, 0x1f, 0x0, 0xf7}, 0xffffffffffffffff, 0x8, r2, 0x2) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x6, 0xb8, 0x3f, 0x4, 0x0, 0x67, 0x8408a, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x5, @perf_config_ext={0x3fb, 0x22}, 0x100, 0x9, 0x3, 0x7, 0x20, 0x80000000, 0x5d, 0x0, 0x7fff, 0x0, 0x6}, r3, 0x0, r4, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x8, 0x1f, 0x1, 0x3, 0x0, 0x337f, 0x0, 0xc, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x88, 0x1, @perf_bp={&(0x7f0000000200), 0x4}, 0x10a, 0x7f, 0x41, 0x6, 0xfffffffffffffffc, 0xe99c61, 0x5, 0x0, 0x5, 0x0, 0x7fa}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x1f, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x5}, 0x101, 0x0, 0x0, 0x6, 0x8, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0xff7ffffffffffffd}, r3, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r3, 0x5, r0, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='^\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 17:56:51 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r4}) 17:56:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b0598f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1195.268086] FAULT_INJECTION: forcing a failure. [ 1195.268086] name failslab, interval 1, probability 0, space 0, times 0 [ 1195.280880] CPU: 0 PID: 21327 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1195.288767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1195.298109] Call Trace: [ 1195.300718] dump_stack+0x1fc/0x2ef [ 1195.304335] should_fail.cold+0xa/0xf [ 1195.308122] ? setup_fault_attr+0x200/0x200 [ 1195.312427] ? lock_acquire+0x170/0x3c0 [ 1195.316401] __should_failslab+0x115/0x180 [ 1195.320629] should_failslab+0x5/0x10 [ 1195.324423] kmem_cache_alloc+0x277/0x370 [ 1195.328562] __kernfs_new_node+0xd2/0x680 [ 1195.332706] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1195.337475] ? __mutex_unlock_slowpath+0xea/0x610 [ 1195.342314] ? wait_for_completion_io+0x10/0x10 [ 1195.346985] ? kernfs_next_descendant_post+0x19c/0x290 [ 1195.352261] kernfs_new_node+0x92/0x120 [ 1195.356239] __kernfs_create_file+0x51/0x340 [ 1195.360646] sysfs_add_file_mode_ns+0x226/0x540 [ 1195.365306] internal_create_group+0x355/0xb20 [ 1195.369885] ? sysfs_remove_link_from_group+0x70/0x70 [ 1195.375058] ? lock_downgrade+0x720/0x720 [ 1195.379211] lo_ioctl+0xf7c/0x20e0 [ 1195.382757] ? loop_set_status64+0x110/0x110 [ 1195.387150] blkdev_ioctl+0x5cb/0x1a80 [ 1195.391023] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1195.396383] ? blkpg_ioctl+0x9d0/0x9d0 [ 1195.400263] ? mark_held_locks+0xf0/0xf0 [ 1195.404307] ? mark_held_locks+0xf0/0xf0 [ 1195.408356] ? debug_check_no_obj_freed+0x201/0x490 [ 1195.413362] ? lock_downgrade+0x720/0x720 [ 1195.417516] block_ioctl+0xe9/0x130 [ 1195.421133] ? blkdev_fallocate+0x3f0/0x3f0 [ 1195.425450] do_vfs_ioctl+0xcdb/0x12e0 [ 1195.429328] ? lock_downgrade+0x720/0x720 [ 1195.433458] ? check_preemption_disabled+0x41/0x280 [ 1195.438467] ? ioctl_preallocate+0x200/0x200 [ 1195.442868] ? __fget+0x356/0x510 [ 1195.446316] ? do_dup2+0x450/0x450 [ 1195.449857] ? do_sys_open+0x2bf/0x520 [ 1195.453737] ksys_ioctl+0x9b/0xc0 [ 1195.457186] __x64_sys_ioctl+0x6f/0xb0 [ 1195.461064] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1195.465639] do_syscall_64+0xf9/0x620 [ 1195.469433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1195.474607] RIP: 0033:0x7f350f3a7ea7 [ 1195.478312] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1195.497215] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1195.504916] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f3a7ea7 17:56:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e040ea00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1195.512168] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1195.519428] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1195.526701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1195.533963] R13: 0000000000000004 R14: 0000000020000058 R15: 0000000000000001 17:56:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 20) 17:56:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0410a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:52 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:52 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816106a48f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1195.661898] FAULT_INJECTION: forcing a failure. [ 1195.661898] name failslab, interval 1, probability 0, space 0, times 0 [ 1195.715219] CPU: 0 PID: 21348 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1195.723114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1195.732452] Call Trace: [ 1195.735025] dump_stack+0x1fc/0x2ef [ 1195.738637] should_fail.cold+0xa/0xf [ 1195.742419] ? setup_fault_attr+0x200/0x200 [ 1195.746725] ? lock_acquire+0x170/0x3c0 [ 1195.750681] ? dev_uevent_filter+0xd0/0xd0 [ 1195.754895] __should_failslab+0x115/0x180 [ 1195.759111] should_failslab+0x5/0x10 [ 1195.762892] kmem_cache_alloc_trace+0x284/0x380 [ 1195.767646] ? dev_uevent_filter+0xd0/0xd0 [ 1195.771860] kobject_uevent_env+0x236/0x1480 [ 1195.776255] lo_ioctl+0xff9/0x20e0 [ 1195.779776] ? loop_set_status64+0x110/0x110 [ 1195.784162] blkdev_ioctl+0x5cb/0x1a80 [ 1195.788035] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1195.793376] ? blkpg_ioctl+0x9d0/0x9d0 [ 1195.797245] ? mark_held_locks+0xf0/0xf0 [ 1195.801285] ? mark_held_locks+0xf0/0xf0 [ 1195.805326] ? debug_check_no_obj_freed+0x201/0x490 [ 1195.810324] ? lock_downgrade+0x720/0x720 [ 1195.814453] block_ioctl+0xe9/0x130 [ 1195.818063] ? blkdev_fallocate+0x3f0/0x3f0 [ 1195.822363] do_vfs_ioctl+0xcdb/0x12e0 [ 1195.826233] ? lock_downgrade+0x720/0x720 [ 1195.830367] ? check_preemption_disabled+0x41/0x280 [ 1195.835363] ? ioctl_preallocate+0x200/0x200 [ 1195.839752] ? __fget+0x356/0x510 [ 1195.843185] ? do_dup2+0x450/0x450 [ 1195.846709] ? do_sys_open+0x2bf/0x520 [ 1195.850598] ksys_ioctl+0x9b/0xc0 [ 1195.854038] __x64_sys_ioctl+0x6f/0xb0 [ 1195.857906] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1195.862470] do_syscall_64+0xf9/0x620 [ 1195.866259] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1195.871427] RIP: 0033:0x7f350f3a7ea7 [ 1195.875124] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1195.894017] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1195.901707] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f3a7ea7 [ 1195.908956] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 17:56:52 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x6, 0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0xcba0, 0x0, 0x4, 0x0, 0x100}, 0x0, 0xf, r0, 0x1) (async) r1 = perf_event_open$cgroup(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x9, 0x3f, 0x6, 0x0, 0x0, 0x80000, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000180), 0x9}, 0x0, 0xffff, 0x0, 0x6, 0x7, 0x7, 0x100, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x80, 0xf7, 0x3, 0x8, 0x1, 0x0, 0x2, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7668, 0x1, @perf_config_ext={0x10001, 0x8}, 0x10900, 0x6, 0xf53, 0x6, 0x5, 0x5, 0x20, 0x0, 0x2, 0x0, 0x6}, 0xffffffffffffffff, 0x3, r1, 0xc11bae0cb8d261e6) r3 = syz_clone(0x89200800, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r4 = perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x8, 0x6, 0x5b, 0x9, 0x0, 0x400, 0x4a082, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000340), 0xb}, 0x4, 0x0, 0x6, 0x7, 0x2, 0x825, 0xd5e, 0x0, 0x1f, 0x0, 0xf7}, 0xffffffffffffffff, 0x8, r2, 0x2) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x6, 0xb8, 0x3f, 0x4, 0x0, 0x67, 0x8408a, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x5, @perf_config_ext={0x3fb, 0x22}, 0x100, 0x9, 0x3, 0x7, 0x20, 0x80000000, 0x5d, 0x0, 0x7fff, 0x0, 0x6}, r3, 0x0, r4, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x8, 0x1f, 0x1, 0x3, 0x0, 0x337f, 0x0, 0xc, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x88, 0x1, @perf_bp={&(0x7f0000000200), 0x4}, 0x10a, 0x7f, 0x41, 0x6, 0xfffffffffffffffc, 0xe99c61, 0x5, 0x0, 0x5, 0x0, 0x7fa}, r3, 0x4, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x1f, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x5}, 0x101, 0x0, 0x0, 0x6, 0x8, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0xff7ffffffffffffd}, r3, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) perf_event_open(0x0, r3, 0x5, r0, 0x3) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='^\x00') (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000040)) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) [ 1195.916203] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1195.923450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1195.930697] R13: 0000000000000004 R14: 0000000020000058 R15: 0000000000000001 17:56:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:52 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 21) 17:56:52 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816106b48f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e043ea00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:52 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:52 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x6, 0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0xcba0, 0x0, 0x4, 0x0, 0x100}, 0x0, 0xf, r0, 0x1) (async) r1 = perf_event_open$cgroup(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x9, 0x3f, 0x6, 0x0, 0x0, 0x80000, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000180), 0x9}, 0x0, 0xffff, 0x0, 0x6, 0x7, 0x7, 0x100, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x80, 0xf7, 0x3, 0x8, 0x1, 0x0, 0x2, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7668, 0x1, @perf_config_ext={0x10001, 0x8}, 0x10900, 0x6, 0xf53, 0x6, 0x5, 0x5, 0x20, 0x0, 0x2, 0x0, 0x6}, 0xffffffffffffffff, 0x3, r1, 0xc11bae0cb8d261e6) (async) r3 = syz_clone(0x89200800, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x8, 0x6, 0x5b, 0x9, 0x0, 0x400, 0x4a082, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000340), 0xb}, 0x4, 0x0, 0x6, 0x7, 0x2, 0x825, 0xd5e, 0x0, 0x1f, 0x0, 0xf7}, 0xffffffffffffffff, 0x8, r2, 0x2) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x6, 0xb8, 0x3f, 0x4, 0x0, 0x67, 0x8408a, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x5, @perf_config_ext={0x3fb, 0x22}, 0x100, 0x9, 0x3, 0x7, 0x20, 0x80000000, 0x5d, 0x0, 0x7fff, 0x0, 0x6}, r3, 0x0, r4, 0x0) (async) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x8, 0x1f, 0x1, 0x3, 0x0, 0x337f, 0x0, 0xc, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x88, 0x1, @perf_bp={&(0x7f0000000200), 0x4}, 0x10a, 0x7f, 0x41, 0x6, 0xfffffffffffffffc, 0xe99c61, 0x5, 0x0, 0x5, 0x0, 0x7fa}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x1f, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x5}, 0x101, 0x0, 0x0, 0x6, 0x8, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0xff7ffffffffffffd}, r3, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open(0x0, r3, 0x5, r0, 0x3) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='^\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000040)) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) [ 1196.162921] FAULT_INJECTION: forcing a failure. [ 1196.162921] name failslab, interval 1, probability 0, space 0, times 0 [ 1196.174422] CPU: 0 PID: 21375 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1196.182301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1196.191639] Call Trace: [ 1196.194224] dump_stack+0x1fc/0x2ef [ 1196.197854] should_fail.cold+0xa/0xf [ 1196.201649] ? setup_fault_attr+0x200/0x200 [ 1196.205963] ? lock_acquire+0x170/0x3c0 [ 1196.209931] ? dev_uevent_filter+0xd0/0xd0 [ 1196.214148] __should_failslab+0x115/0x180 [ 1196.218378] should_failslab+0x5/0x10 [ 1196.222172] kmem_cache_alloc_trace+0x284/0x380 [ 1196.226837] ? dev_uevent_filter+0xd0/0xd0 [ 1196.231074] kobject_uevent_env+0x236/0x1480 [ 1196.235500] lo_ioctl+0xff9/0x20e0 [ 1196.239033] ? loop_set_status64+0x110/0x110 [ 1196.243423] blkdev_ioctl+0x5cb/0x1a80 [ 1196.247301] ? blkpg_ioctl+0x9d0/0x9d0 [ 1196.251182] ? rcu_read_unlock_special+0x7ce/0xfc0 [ 1196.256106] ? lock_downgrade+0x720/0x720 [ 1196.260244] ? rcu_read_unlock_special+0x4ce/0xfc0 [ 1196.265165] block_ioctl+0xe9/0x130 [ 1196.268792] ? blkdev_fallocate+0x3f0/0x3f0 [ 1196.273117] do_vfs_ioctl+0xcdb/0x12e0 [ 1196.277009] ? lock_downgrade+0x720/0x720 [ 1196.281148] ? ioctl_preallocate+0x200/0x200 [ 1196.285553] ? __fget+0x356/0x510 [ 1196.288998] ? do_dup2+0x450/0x450 [ 1196.292522] ? do_sys_open+0x2bf/0x520 [ 1196.296407] ksys_ioctl+0x9b/0xc0 [ 1196.299853] __x64_sys_ioctl+0x6f/0xb0 [ 1196.303737] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1196.308319] do_syscall_64+0xf9/0x620 [ 1196.312112] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1196.317288] RIP: 0033:0x7f350f3a7ea7 [ 1196.320991] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1196.339871] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1196.347569] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f3a7ea7 [ 1196.354827] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 17:56:52 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816106c48f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1196.362078] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1196.369336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1196.376597] R13: 0000000000000004 R14: 0000000020000058 R15: 0000000000000001 17:56:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 22) 17:56:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:52 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00200c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:53 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x2, 0x80, 0x8, 0x9, 0x0, 0x400, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_config_ext={0x1, 0x6}, 0x4, 0x111f8f5c, 0x0, 0xb524ddb2d93ffcd2, 0x7ff, 0x7, 0x5, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xd, r0, 0x1) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x1f8) perf_event_open(&(0x7f00000007c0)={0x0, 0x80, 0x0, 0x0, 0x81, 0x7, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000440), 0x8}, 0x1202, 0x740, 0xc, 0x3, 0x0, 0x0, 0x40, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r1, 0xb) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x7, 0x2, 0x1, 0x20, 0x0, 0x3, 0x400, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x10000, 0x4, 0x8000, 0x7, 0x9e, 0x5d, 0xc000, 0x0, 0x9, 0x0, 0xffffffffffffffaa}, 0xffffffffffffffff, 0x9, r1, 0x11) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001b80)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x48, &(0x7f0000001a00)='(', &(0x7f0000001b00)="c37b17529a65fe2a1dafdd981eab864da466fc8cc82464be7ca5d49a92a4d8c3cf93e8f011df881785499ac67c5c642257201f88f4235aee0e589f1b8a367fc3b7e68c2a201248d0"}, 0x48) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) 17:56:53 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816106d48f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1196.554421] FAULT_INJECTION: forcing a failure. [ 1196.554421] name failslab, interval 1, probability 0, space 0, times 0 [ 1196.567846] CPU: 1 PID: 21398 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1196.575752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1196.585103] Call Trace: [ 1196.587702] dump_stack+0x1fc/0x2ef [ 1196.591338] should_fail.cold+0xa/0xf [ 1196.595147] ? setup_fault_attr+0x200/0x200 [ 1196.599476] ? lock_acquire+0x170/0x3c0 17:56:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:53 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:53 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) [ 1196.603460] __should_failslab+0x115/0x180 [ 1196.607695] should_failslab+0x5/0x10 [ 1196.611492] __kmalloc+0x2ab/0x3c0 [ 1196.615036] ? kobject_get_path+0xbf/0x240 [ 1196.619290] kobject_get_path+0xbf/0x240 [ 1196.623351] kobject_uevent_env+0x25c/0x1480 [ 1196.627757] lo_ioctl+0xff9/0x20e0 [ 1196.631305] ? loop_set_status64+0x110/0x110 [ 1196.635742] blkdev_ioctl+0x5cb/0x1a80 [ 1196.639635] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1196.645015] ? blkpg_ioctl+0x9d0/0x9d0 [ 1196.648911] ? mark_held_locks+0xf0/0xf0 17:56:53 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) [ 1196.653327] ? mark_held_locks+0xf0/0xf0 [ 1196.657386] ? debug_check_no_obj_freed+0x201/0x490 [ 1196.662394] ? lock_downgrade+0x720/0x720 [ 1196.666629] block_ioctl+0xe9/0x130 [ 1196.670256] ? blkdev_fallocate+0x3f0/0x3f0 [ 1196.674575] do_vfs_ioctl+0xcdb/0x12e0 [ 1196.678451] ? lock_downgrade+0x720/0x720 [ 1196.682596] ? check_preemption_disabled+0x41/0x280 [ 1196.687615] ? ioctl_preallocate+0x200/0x200 [ 1196.692038] ? __fget+0x356/0x510 [ 1196.695503] ? do_dup2+0x450/0x450 [ 1196.699053] ? do_sys_open+0x2bf/0x520 17:56:53 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:53 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) [ 1196.702962] ksys_ioctl+0x9b/0xc0 [ 1196.706425] __x64_sys_ioctl+0x6f/0xb0 [ 1196.710310] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1196.714921] do_syscall_64+0xf9/0x620 [ 1196.718746] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1196.723956] RIP: 0033:0x7f350f3a7ea7 [ 1196.727674] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1196.746581] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1196.754295] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f3a7ea7 [ 1196.761562] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1196.768835] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1196.776106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1196.783376] R13: 0000000000000004 R14: 0000000020000058 R15: 0000000000000001 17:56:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 23) 17:56:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00400c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:53 executing program 3: syz_mount_image$nfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2072000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1196.959223] FAULT_INJECTION: forcing a failure. [ 1196.959223] name failslab, interval 1, probability 0, space 0, times 0 [ 1196.971634] CPU: 1 PID: 21431 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1196.979526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1196.988883] Call Trace: [ 1196.991483] dump_stack+0x1fc/0x2ef [ 1196.995124] should_fail.cold+0xa/0xf [ 1196.998936] ? setup_fault_attr+0x200/0x200 [ 1197.003261] ? lock_acquire+0x170/0x3c0 [ 1197.007250] __should_failslab+0x115/0x180 [ 1197.011493] should_failslab+0x5/0x10 [ 1197.015300] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1197.020413] __kmalloc_node_track_caller+0x38/0x70 [ 1197.025340] __alloc_skb+0xae/0x560 [ 1197.028960] alloc_uevent_skb+0x7b/0x210 [ 1197.033008] kobject_uevent_env+0xa90/0x1480 [ 1197.037404] lo_ioctl+0xff9/0x20e0 [ 1197.040931] ? loop_set_status64+0x110/0x110 [ 1197.045320] blkdev_ioctl+0x5cb/0x1a80 [ 1197.049192] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1197.054546] ? blkpg_ioctl+0x9d0/0x9d0 [ 1197.058416] ? mark_held_locks+0xf0/0xf0 [ 1197.062461] ? mark_held_locks+0xf0/0xf0 [ 1197.066504] ? debug_check_no_obj_freed+0x201/0x490 [ 1197.071512] ? lock_downgrade+0x720/0x720 [ 1197.075640] block_ioctl+0xe9/0x130 [ 1197.079255] ? blkdev_fallocate+0x3f0/0x3f0 [ 1197.083559] do_vfs_ioctl+0xcdb/0x12e0 [ 1197.087428] ? lock_downgrade+0x720/0x720 [ 1197.091562] ? check_preemption_disabled+0x41/0x280 [ 1197.096558] ? ioctl_preallocate+0x200/0x200 [ 1197.100949] ? __fget+0x356/0x510 [ 1197.104384] ? do_dup2+0x450/0x450 [ 1197.107908] ? do_sys_open+0x2bf/0x520 [ 1197.111804] ksys_ioctl+0x9b/0xc0 [ 1197.115258] __x64_sys_ioctl+0x6f/0xb0 [ 1197.119127] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1197.123688] do_syscall_64+0xf9/0x620 [ 1197.127476] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1197.132645] RIP: 0033:0x7f350f3a7ea7 [ 1197.136341] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 17:56:53 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x2, 0x80, 0x8, 0x9, 0x0, 0x400, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_config_ext={0x1, 0x6}, 0x4, 0x111f8f5c, 0x0, 0xb524ddb2d93ffcd2, 0x7ff, 0x7, 0x5, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xd, r0, 0x1) (async) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x1f8) perf_event_open(&(0x7f00000007c0)={0x0, 0x80, 0x0, 0x0, 0x81, 0x7, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000440), 0x8}, 0x1202, 0x740, 0xc, 0x3, 0x0, 0x0, 0x40, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r1, 0xb) (async) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x7, 0x2, 0x1, 0x20, 0x0, 0x3, 0x400, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x10000, 0x4, 0x8000, 0x7, 0x9e, 0x5d, 0xc000, 0x0, 0x9, 0x0, 0xffffffffffffffaa}, 0xffffffffffffffff, 0x9, r1, 0x11) (async) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001b80)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x48, &(0x7f0000001a00)='(', &(0x7f0000001b00)="c37b17529a65fe2a1dafdd981eab864da466fc8cc82464be7ca5d49a92a4d8c3cf93e8f011df881785499ac67c5c642257201f88f4235aee0e589f1b8a367fc3b7e68c2a201248d0"}, 0x48) (async) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) 17:56:53 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816106e48f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:53 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00500c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1197.155223] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1197.162921] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f3a7ea7 [ 1197.170173] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1197.177423] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1197.184675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1197.192374] R13: 0000000000000004 R14: 0000000020000058 R15: 0000000000000001 17:56:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 24) 17:56:53 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816106f48f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1197.311842] FAULT_INJECTION: forcing a failure. [ 1197.311842] name failslab, interval 1, probability 0, space 0, times 0 [ 1197.323647] CPU: 1 PID: 21445 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1197.331548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1197.341076] Call Trace: [ 1197.343682] dump_stack+0x1fc/0x2ef [ 1197.347335] should_fail.cold+0xa/0xf [ 1197.351137] ? setup_fault_attr+0x200/0x200 [ 1197.355464] ? lock_acquire+0x170/0x3c0 17:56:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1197.359442] __should_failslab+0x115/0x180 [ 1197.363686] should_failslab+0x5/0x10 [ 1197.367498] kmem_cache_alloc+0x277/0x370 [ 1197.371660] skb_clone+0x151/0x3d0 [ 1197.375328] netlink_broadcast_filtered+0x8e5/0xbc0 [ 1197.380356] netlink_broadcast+0x35/0x40 [ 1197.384412] kobject_uevent_env+0xa56/0x1480 [ 1197.388832] lo_ioctl+0xff9/0x20e0 [ 1197.392385] ? loop_set_status64+0x110/0x110 [ 1197.396811] blkdev_ioctl+0x5cb/0x1a80 [ 1197.400709] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1197.406076] ? blkpg_ioctl+0x9d0/0x9d0 17:56:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1197.409961] ? mark_held_locks+0xf0/0xf0 [ 1197.414022] ? mark_held_locks+0xf0/0xf0 [ 1197.418089] ? debug_check_no_obj_freed+0x201/0x490 [ 1197.423130] ? lock_downgrade+0x720/0x720 [ 1197.427285] block_ioctl+0xe9/0x130 [ 1197.430914] ? blkdev_fallocate+0x3f0/0x3f0 [ 1197.435231] do_vfs_ioctl+0xcdb/0x12e0 [ 1197.439236] ? lock_downgrade+0x720/0x720 [ 1197.443391] ? check_preemption_disabled+0x41/0x280 [ 1197.448413] ? ioctl_preallocate+0x200/0x200 [ 1197.452839] ? __fget+0x356/0x510 [ 1197.456304] ? do_dup2+0x450/0x450 [ 1197.459956] ? do_sys_open+0x2bf/0x520 [ 1197.463845] ksys_ioctl+0x9b/0xc0 [ 1197.467310] __x64_sys_ioctl+0x6f/0xb0 [ 1197.471189] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1197.475753] do_syscall_64+0xf9/0x620 [ 1197.479542] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1197.484715] RIP: 0033:0x7f350f3a7ea7 [ 1197.488413] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 17:56:54 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x2, 0x80, 0x8, 0x9, 0x0, 0x400, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_config_ext={0x1, 0x6}, 0x4, 0x111f8f5c, 0x0, 0xb524ddb2d93ffcd2, 0x7ff, 0x7, 0x5, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xd, r0, 0x1) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x1f8) perf_event_open(&(0x7f00000007c0)={0x0, 0x80, 0x0, 0x0, 0x81, 0x7, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000440), 0x8}, 0x1202, 0x740, 0xc, 0x3, 0x0, 0x0, 0x40, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r1, 0xb) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x7, 0x2, 0x1, 0x20, 0x0, 0x3, 0x400, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x10000, 0x4, 0x8000, 0x7, 0x9e, 0x5d, 0xc000, 0x0, 0x9, 0x0, 0xffffffffffffffaa}, 0xffffffffffffffff, 0x9, r1, 0x11) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001b80)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x48, &(0x7f0000001a00)='(', &(0x7f0000001b00)="c37b17529a65fe2a1dafdd981eab864da466fc8cc82464be7ca5d49a92a4d8c3cf93e8f011df881785499ac67c5c642257201f88f4235aee0e589f1b8a367fc3b7e68c2a201248d0"}, 0x48) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x2, 0x80, 0x8, 0x9, 0x0, 0x400, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_config_ext={0x1, 0x6}, 0x4, 0x111f8f5c, 0x0, 0xb524ddb2d93ffcd2, 0x7ff, 0x7, 0x5, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xd, r0, 0x1) (async) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x1f8) (async) perf_event_open(&(0x7f00000007c0)={0x0, 0x80, 0x0, 0x0, 0x81, 0x7, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000440), 0x8}, 0x1202, 0x740, 0xc, 0x3, 0x0, 0x0, 0x40, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r1, 0xb) (async) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x7, 0x2, 0x1, 0x20, 0x0, 0x3, 0x400, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x10000, 0x4, 0x8000, 0x7, 0x9e, 0x5d, 0xc000, 0x0, 0x9, 0x0, 0xffffffffffffffaa}, 0xffffffffffffffff, 0x9, r1, 0x11) (async) socket$inet6(0xa, 0x3, 0x3c) (async) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) (async) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001b80)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x48, &(0x7f0000001a00)='(', &(0x7f0000001b00)="c37b17529a65fe2a1dafdd981eab864da466fc8cc82464be7ca5d49a92a4d8c3cf93e8f011df881785499ac67c5c642257201f88f4235aee0e589f1b8a367fc3b7e68c2a201248d0"}, 0x48) (async) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000480)="a9772d9bea4824cc3854a62ffb84c4fb114d80fe462fd727b6f682cf0f9ccfe45f46ed18fc8af0505df86b4230370bfac91f7266fae5859a3608357c69f51cfa473ef19a9dc2aeb43f9ed68acc034cf841229fbbe3f57130fe2ad707c56a92dbe64e59aa78e24db8e9b50597ab0024ca2564fbdb50e7b8cfa5c7028d556977ad6a90adf768a5ac0505ab07f8256368c6e71dd4b5a1c2e3c9946b610ab2b324099beb706b6a510c134ad18c928be3af6cf20e5016c9a050e35e30716e4913c882272bbfc8f0e1ee9c31484af6953e7d967640eff8accacee6daf3f98051a3ee281555a41340273dcb0bd8cc8cd549676f3ec23cbca42d4b76a178376eefb3da036d60cb88b5cb9c0ae0135be1d4f598c564fbe97ad4b691f59ba4063b898482d9cde4497009884d75b1965874e9c4d5a7cf8a640433c02acd340a98eff73e5948611184c7c60da3b233367d58aaf4e407e2e2c506b871fd822ec231389734d23a2aa5dc197831d8fee19361e5b99d0b51e5b1f0cadf296b91aa9477fa72879b4a3a3040777cf778cee1de32619701d71cb5316c7234a910b497b5f1b2cd2a0d39e92b6b92e091b470da2cec0e1b1fd3ce1a15d559b3733b97b2ddb1dd2aa73c9e03f189b8dd48c9093daddcd2c3fd0e1a9d16046d85c8934d2f9094aa5fa7b8ff061cb753dea2637ac2a8d523c9791ae454ea2e8cb10ce4a3ad8937ed583cd653bdb05b965e658f9c5f06a43bb1e61cfa4cb9be2cb4ef264d10f37e5292576bfdc97b2e1f8b692f0b64f76287e67805df914273677a9c39bd1e4f73d3c1afd99ad18a210caee42ab5c87969f6f99d7423dbb72d436ef3a3dead8eda03274d2e8e7f107eb04fdc3e36d6d4022dbc5c2fe388aaa3234950588ef56362708189826b98d3c9ed4dabcb33582a7e55327e82686aac973a5d0292afd7175a9c57b4fc1e5ba7cb0a34e35e50526d40bdb51a224e5b89e74e8752c1b39ab250b178adfab91c73c04d3c012b244cb7745dde4f716203ffcddaa096186ed0403b323c3aaa79aa4a0e6d1231ce99f83788ba0dc86da01cdad25816c26bf8e523b287d7ee83b5d0c55599ddbd202f743a1bc3d107a9c9610dc62537af48eecdd174ee4e796943250b81af0da28c57955aea149010ede13eb973dbe959500afe5e77b32ad5a11a353555b48eb7684596eadc481c291f185d0d47c639fa5bcb2dffe859a9d4a0e184a640e30f0afe83f2096faef9c0129289688a5267e0d2dadadd0f8cb13f35827f0337d2edf6220a244dd8c135563051f6fcd7fdad7879ff3ef01975938bc6e47aee745d4701cfc5e5546f05903bbcde0120ad847c32658c1384a6d8f188544df337a25f806051a346fb980a4e84fee06b0d367bc81161e96072b2e7e47999ac93437749d11864fa4c03a2d333135660aa17bd421623e6654eeae956e51a0157cb876db3e9cb324641d132cda7aabd9dcaa51f090c1955d20c2618466a0ea5acbaeac5a46e00b8869ca9a337eb5d9406592a790678a1f0bbe729054abb4810f4fdf50c517d4dd312b2d382412d45b9f60464c107c0735b16ceced73484f37cdcc8b9a4a62bc997bbd1d23b993fc5cfed9a43d2f4d335570e76715b020664bedb0db88816bc97ec37d13d64f604b71fc73f3c38954ae554e45997209afb0ff102dc170986e2d72e4178a7e6131308afa29ba732e251ebdf6254c0589752bfca3bef7fd0fc60ba683c6016b16234216bdcf8975bebafd8ee4606a96c1993d1f096b435fa84279344b914dec8e56566e103592a7ed44c63c8b5c18e01fa873032b1087622f225747339d38fa89e7008695ce0b3d6f505ab7ecdf99182ab7aa264d9108af35b0a373da18a8183f696dc70a8ac88c5663a866e89c7d7dbdf7296d63e5167978b38463ae9f36fe4121229e92cced04e", 0xffe4}], 0x1) (async) 17:56:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:54 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) [ 1197.507298] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1197.514988] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f3a7ea7 [ 1197.522239] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1197.529488] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1197.536745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1197.544001] R13: 0000000000000004 R14: 0000000020000058 R15: 0000000000000001 17:56:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 25) 17:56:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00600c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0x9, 0x0, 0x0, 0x0) 17:56:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:54 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xa, 0x0, 0x0, 0x0) 17:56:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1197.738327] FAULT_INJECTION: forcing a failure. [ 1197.738327] name failslab, interval 1, probability 0, space 0, times 0 [ 1197.760356] CPU: 1 PID: 21479 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1197.768253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1197.777604] Call Trace: [ 1197.780198] dump_stack+0x1fc/0x2ef [ 1197.783848] should_fail.cold+0xa/0xf 17:56:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1197.787650] ? setup_fault_attr+0x200/0x200 [ 1197.791973] ? lock_acquire+0x170/0x3c0 [ 1197.795966] __should_failslab+0x115/0x180 [ 1197.800212] should_failslab+0x5/0x10 [ 1197.804031] kmem_cache_alloc+0x277/0x370 [ 1197.808188] skb_clone+0x151/0x3d0 [ 1197.811734] netlink_broadcast_filtered+0x8e5/0xbc0 [ 1197.816748] netlink_broadcast+0x35/0x40 [ 1197.820810] kobject_uevent_env+0xa56/0x1480 [ 1197.825236] lo_ioctl+0xff9/0x20e0 [ 1197.828776] ? loop_set_status64+0x110/0x110 [ 1197.833165] blkdev_ioctl+0x5cb/0x1a80 [ 1197.837033] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1197.842386] ? blkpg_ioctl+0x9d0/0x9d0 [ 1197.846265] ? mark_held_locks+0xf0/0xf0 [ 1197.850309] ? mark_held_locks+0xf0/0xf0 [ 1197.854354] ? debug_check_no_obj_freed+0x201/0x490 [ 1197.859354] ? lock_downgrade+0x720/0x720 [ 1197.863492] block_ioctl+0xe9/0x130 [ 1197.867109] ? blkdev_fallocate+0x3f0/0x3f0 [ 1197.871414] do_vfs_ioctl+0xcdb/0x12e0 [ 1197.875284] ? lock_downgrade+0x720/0x720 [ 1197.879419] ? check_preemption_disabled+0x41/0x280 [ 1197.884415] ? ioctl_preallocate+0x200/0x200 [ 1197.888807] ? __fget+0x356/0x510 [ 1197.892251] ? do_dup2+0x450/0x450 [ 1197.895783] ? do_sys_open+0x2bf/0x520 [ 1197.899653] ksys_ioctl+0x9b/0xc0 [ 1197.903087] __x64_sys_ioctl+0x6f/0xb0 [ 1197.906958] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1197.911522] do_syscall_64+0xf9/0x620 [ 1197.915307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1197.920477] RIP: 0033:0x7f350f3a7ea7 17:56:54 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) [ 1197.924170] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1197.943049] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1197.950739] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f3a7ea7 [ 1197.957988] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1197.965238] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1197.972487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1197.979736] R13: 0000000000000004 R14: 0000000020000058 R15: 0000000000000001 17:56:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00800c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 26) 17:56:54 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xa44a, 0x0, 0x0, 0x0) 17:56:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00e00c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1198.172851] FAULT_INJECTION: forcing a failure. [ 1198.172851] name failslab, interval 1, probability 0, space 0, times 0 [ 1198.193588] CPU: 1 PID: 21518 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1198.201491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1198.210844] Call Trace: [ 1198.213444] dump_stack+0x1fc/0x2ef [ 1198.217076] should_fail.cold+0xa/0xf [ 1198.220869] ? setup_fault_attr+0x200/0x200 [ 1198.225195] ? lock_acquire+0x170/0x3c0 [ 1198.229161] __should_failslab+0x115/0x180 [ 1198.233380] should_failslab+0x5/0x10 [ 1198.237165] kmem_cache_alloc+0x277/0x370 [ 1198.241298] skb_clone+0x151/0x3d0 [ 1198.244822] netlink_broadcast_filtered+0x8e5/0xbc0 [ 1198.249825] netlink_broadcast+0x35/0x40 [ 1198.253886] kobject_uevent_env+0xa56/0x1480 [ 1198.258290] lo_ioctl+0xff9/0x20e0 [ 1198.261819] ? loop_set_status64+0x110/0x110 [ 1198.266208] blkdev_ioctl+0x5cb/0x1a80 [ 1198.270083] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1198.275424] ? blkpg_ioctl+0x9d0/0x9d0 [ 1198.279292] ? mark_held_locks+0xf0/0xf0 [ 1198.283345] ? mark_held_locks+0xf0/0xf0 [ 1198.287452] ? debug_check_no_obj_freed+0x201/0x490 [ 1198.292452] ? lock_downgrade+0x720/0x720 [ 1198.296582] block_ioctl+0xe9/0x130 [ 1198.300198] ? blkdev_fallocate+0x3f0/0x3f0 [ 1198.304506] do_vfs_ioctl+0xcdb/0x12e0 [ 1198.308376] ? lock_downgrade+0x720/0x720 [ 1198.312513] ? check_preemption_disabled+0x41/0x280 [ 1198.317514] ? ioctl_preallocate+0x200/0x200 [ 1198.321909] ? __fget+0x356/0x510 [ 1198.325343] ? do_dup2+0x450/0x450 [ 1198.328865] ? do_sys_open+0x2bf/0x520 [ 1198.332739] ksys_ioctl+0x9b/0xc0 [ 1198.336172] __x64_sys_ioctl+0x6f/0xb0 [ 1198.340047] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1198.344625] do_syscall_64+0xf9/0x620 [ 1198.348416] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1198.353584] RIP: 0033:0x7f350f3a7ea7 17:56:54 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:54 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) [ 1198.357278] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1198.376508] RSP: 002b:00007f350dd1cf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1198.384199] RAX: ffffffffffffffda RBX: 00007f350f3f1a20 RCX: 00007f350f3a7ea7 [ 1198.391445] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1198.398801] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1198.406049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1198.413298] R13: 0000000000000004 R14: 0000000020000058 R15: 0000000000000001 17:56:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xb44a, 0x0, 0x0, 0x0) 17:56:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 27) 17:56:55 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a01000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:55 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x2, 0x80, 0x8, 0x9, 0x0, 0x400, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_config_ext={0x1, 0x6}, 0x4, 0x111f8f5c, 0x0, 0xb524ddb2d93ffcd2, 0x7ff, 0x7, 0x5, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xd, r0, 0x1) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x1f8) perf_event_open(&(0x7f00000007c0)={0x0, 0x80, 0x0, 0x0, 0x81, 0x7, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000440), 0x8}, 0x1202, 0x740, 0xc, 0x3, 0x0, 0x0, 0x40, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r1, 0xb) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x7, 0x2, 0x1, 0x20, 0x0, 0x3, 0x400, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x10000, 0x4, 0x8000, 0x7, 0x9e, 0x5d, 0xc000, 0x0, 0x9, 0x0, 0xffffffffffffffaa}, 0xffffffffffffffff, 0x9, r1, 0x11) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001b80)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x48, &(0x7f0000001a00)='(', &(0x7f0000001b00)="c37b17529a65fe2a1dafdd981eab864da466fc8cc82464be7ca5d49a92a4d8c3cf93e8f011df881785499ac67c5c642257201f88f4235aee0e589f1b8a367fc3b7e68c2a201248d0"}, 0x48) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) 17:56:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xc44a, 0x0, 0x0, 0x0) [ 1198.625761] FAULT_INJECTION: forcing a failure. [ 1198.625761] name failslab, interval 1, probability 0, space 0, times 0 [ 1198.647530] CPU: 0 PID: 21544 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1198.655430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1198.664788] Call Trace: [ 1198.667385] dump_stack+0x1fc/0x2ef [ 1198.671026] should_fail.cold+0xa/0xf 17:56:55 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r2 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @bcast}, [@netrom, @bcast, @remote, @netrom, @netrom, @bcast, @default, @rose]}, &(0x7f0000000040)=0x48, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000300)={'veth1_to_bond\x00', &(0x7f00000003c0)=@ethtool_regs={0x4, 0x401, 0xf6, "f5d1501cd4fb44fad91d1a80c94cb101b9c65fdaaa7ebbfa42bf72b827d060c42a7f0f1505fa54e0ec77bf88a68d045de4bd3db8c8c7b9507c42519540eb3524f7538ed12f57997c732ca16c0e67e9cc832dc67bb72151b3380106271bf9ff20538c9558571ad87fd0d882a53fcaf47be099b48a18205b60c70567d5c6618a2ec6db855798e69bc58c45b0f9d8be7197cc76457b854b4dd93af0c796836624da89ad4b2db84e5e3a608e2d140f5be639554d078ebcbba795d66cd00ebdde314dde95f486bab66c05d7af5dfa616c265aebc5fe719dd54318b26ceb9c712329f24a96e3cac90df60f597ae561d6ab54be4451e6dd9720"}}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x6}]}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) socket$nl_sock_diag(0x10, 0x3, 0x4) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 1198.674839] ? setup_fault_attr+0x200/0x200 [ 1198.679169] ? lock_acquire+0x170/0x3c0 [ 1198.683163] __should_failslab+0x115/0x180 [ 1198.687410] should_failslab+0x5/0x10 [ 1198.691227] kmem_cache_alloc+0x277/0x370 [ 1198.695383] getname_flags+0xce/0x590 [ 1198.699193] do_mkdirat+0x8d/0x2d0 [ 1198.702738] ? __ia32_sys_mknod+0x120/0x120 [ 1198.707069] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1198.712438] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1198.717459] ? do_syscall_64+0x21/0x620 [ 1198.721443] do_syscall_64+0xf9/0x620 [ 1198.725259] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1198.730450] RIP: 0033:0x7f350f3a71f7 [ 1198.734165] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1198.753073] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1198.760783] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a71f7 [ 1198.768056] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c 17:56:55 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) [ 1198.775327] RBP: 00007f350dd1d1d0 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1198.782597] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1198.789869] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:56:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a03e00c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xd44a, 0x0, 0x0, 0x0) 17:56:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 28) 17:56:55 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xe44a, 0x0, 0x0, 0x0) [ 1198.997188] FAULT_INJECTION: forcing a failure. [ 1198.997188] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1199.009882] CPU: 1 PID: 21576 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1199.017770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1199.027125] Call Trace: [ 1199.029722] dump_stack+0x1fc/0x2ef [ 1199.033367] should_fail.cold+0xa/0xf [ 1199.037182] ? setup_fault_attr+0x200/0x200 [ 1199.041512] ? __mutex_unlock_slowpath+0xea/0x610 [ 1199.046365] __alloc_pages_nodemask+0x239/0x2890 [ 1199.051133] ? __lock_acquire+0x6de/0x3ff0 [ 1199.055380] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1199.060227] ? blkdev_ioctl+0x11a/0x1a80 [ 1199.064294] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1199.069664] ? blkpg_ioctl+0x9d0/0x9d0 [ 1199.073565] ? debug_check_no_obj_freed+0x201/0x490 [ 1199.078588] ? lock_downgrade+0x720/0x720 [ 1199.082740] cache_grow_begin+0xa4/0x8a0 [ 1199.086807] ? setup_fault_attr+0x200/0x200 [ 1199.091130] ? lock_acquire+0x170/0x3c0 [ 1199.095104] cache_alloc_refill+0x273/0x340 [ 1199.099437] kmem_cache_alloc+0x346/0x370 [ 1199.103595] getname_flags+0xce/0x590 [ 1199.107404] do_mkdirat+0x8d/0x2d0 [ 1199.110948] ? __ia32_sys_mknod+0x120/0x120 [ 1199.115274] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1199.120727] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1199.125749] ? do_syscall_64+0x21/0x620 [ 1199.129730] do_syscall_64+0xf9/0x620 [ 1199.133543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1199.138732] RIP: 0033:0x7f350f3a71f7 [ 1199.142447] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1199.161346] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1199.169062] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a71f7 [ 1199.176338] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1199.183607] RBP: 00007f350dd1d1d0 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1199.190879] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 17:56:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00005c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xf44a, 0x0, 0x0, 0x0) [ 1199.198149] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:56:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:55 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0x200100fa, 0x0, 0x0, 0x0) 17:56:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00006c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:55 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) (async) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r2 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @bcast}, [@netrom, @bcast, @remote, @netrom, @netrom, @bcast, @default, @rose]}, &(0x7f0000000040)=0x48, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000300)={'veth1_to_bond\x00', &(0x7f00000003c0)=@ethtool_regs={0x4, 0x401, 0xf6, "f5d1501cd4fb44fad91d1a80c94cb101b9c65fdaaa7ebbfa42bf72b827d060c42a7f0f1505fa54e0ec77bf88a68d045de4bd3db8c8c7b9507c42519540eb3524f7538ed12f57997c732ca16c0e67e9cc832dc67bb72151b3380106271bf9ff20538c9558571ad87fd0d882a53fcaf47be099b48a18205b60c70567d5c6618a2ec6db855798e69bc58c45b0f9d8be7197cc76457b854b4dd93af0c796836624da89ad4b2db84e5e3a608e2d140f5be639554d078ebcbba795d66cd00ebdde314dde95f486bab66c05d7af5dfa616c265aebc5fe719dd54318b26ceb9c712329f24a96e3cac90df60f597ae561d6ab54be4451e6dd9720"}}) (async) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) (async) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x6}]}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00010000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a7f24df41dc10d1e8bf076d83923dd29c034055b67dafe6c8dc3d5d78c084a1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f93781965f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbce841f8a97be6148ba532e6ea09c346dfebd31a08b32808b80200000000009dd27080e81113610e10d858e8327ef01fb6c86adac1223301a1fb9c2aec61ce63a3462fd50117b89a9ab359b4eea0c6435767d42b4e54861d0227dbfd2ed8576a3f7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0180aabc18cae2ed4b4390af9a9ceafd07e500b0000002cab154ad029a119ca3c972780870014601c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f4b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398605211bbae3e2ed0a5483c0000bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae2faffd4f5c06a960fd37c10223fdae7ed04935c3c90d3add8eebce6adcda2130f5011e48455b588b90dfae158b94f50adab988dd8e12baf5cc9398c88607a08009c2977aab37d9a44cfc1c7b4000000000000fa47762f6c5bbc4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef06854797f2000000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf29f517d90bdc01e73835d5a387a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1c8bc15038debd64cbe359454a3f2239cfe35f81b7aded448859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b20428d6474a0a91ee90b8de802c6b538622a6bbcb8f786b415263c401e64ed69a2f75409000000000000001d695c4559b82cabac3cccadc1e1c19af4e03020abf5ff0433d660f20898d2a045d009a0ffb20a77c9af2b80c05184a66d30bbea2ca45a4d6d00587b603306a5af8d867d80a07f10d82eafb03062e95196d5e3b854b1c8c768c001496fa99ce5b5040be959096ea948cfa8e7194123e918914a71ad5a8539fb956dbc60f7d9719b55b3abb6bba3d113a680a8d46fe074c83fbe378a3889e8145b2eaceab05ef932c6e4f8ef0ed0d818a7b76d8380b1680000000049563cfee3a7f0fc10bfa32c418cef875fb49e299d177a1bcd1e309b921be763e9280bc586e79a5dd8076c248e7d6e97b3ce267dd4e27b6ef206660090bb216447d0f69351306b80bef8bc4cef378f97ca33fccf363361dcdba10c154705341896d10cc20009dd182453d0c9aec91a24079b21d52fb5516bf0c28ef37aa76442f6083dc99cd61afaf6be45d7b00d3639f2f10ac2d5c759c3e5468f5874c24411d415b6b085fb73a2c7c3852e0e658ffeb4e863428a792bee94f6cd895424360e0464f9d7ea425f2fa6aac029d15af607ad83532ff181c985f54b39370c06e63055b4d6a36fa98a44e379210971f8a33e5c84d2bccf977c3e88538f406b598307c99113cd919d156bb496b002d645a5013f88a2ca6fd1f9320cfe7fc8e9f7f15f02e177ce23f43a154b42e26f037e8b01377cbd3f509e6e540c9ba9c2a589ac5d8ad67a65e9cfd61aa17f96471214dd68a44c576dc24452eaa9d819e2b04bdd1c5faae549a216d6156cc7a54be90dbd24f0434723eabcb1e6b9463041164feced93fba98d611aaea9ec2cd8cabbfa3705158803220f021e3de721e9d47c85ed0bd8424c3cd5242e1dbd859993e277d05b00bca7af687bbed847faf6446ff9f88af43d7b7efd790ad7fc2d71f99959699cc683ae5325874dc34b5939e3822e0943d559e15996632e9f52c323210e68bcbd2876d2d42efb884cc7ef1f237d86be76050000000000fd35d5f93eef4c7c6bf021e743d28aba637c99745b038df9162de873d6cebd8a9fcb26a5e696a6167d07f351243e51ce74b1bd1be55d117a21d7e3924bee0eef4ce8a100d5da4da83f05efa0c09e9884fe68854b4f3c7ce1a38bbb137220f2a806b406bcbab259c3ae00000000000000246540fdea0d76b175a9b61f3de6b3687655371a659bf109cc0a3cc02203acd28ac2948c717a9d9ebc974d3a6b1129ffdde7c88fae329673ec4b04c2c0994d3fae9210c1"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) (async) socket$nl_sock_diag(0x10, 0x3, 0x4) dup2(0xffffffffffffffff, 0xffffffffffffffff) 17:56:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 29) [ 1199.566728] FAULT_INJECTION: forcing a failure. [ 1199.566728] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1199.578565] CPU: 0 PID: 21612 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1199.586463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1199.595818] Call Trace: [ 1199.598422] dump_stack+0x1fc/0x2ef [ 1199.602063] should_fail.cold+0xa/0xf [ 1199.605881] ? setup_fault_attr+0x200/0x200 [ 1199.610207] ? wake_up_q+0x93/0xe0 17:56:56 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) [ 1199.613759] ? __mutex_unlock_slowpath+0x2be/0x610 [ 1199.618708] __alloc_pages_nodemask+0x239/0x2890 [ 1199.623482] ? __lock_acquire+0x6de/0x3ff0 [ 1199.627731] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1199.632576] ? blkdev_ioctl+0x11a/0x1a80 [ 1199.636644] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1199.642015] ? blkpg_ioctl+0x9d0/0x9d0 [ 1199.645915] ? debug_check_no_obj_freed+0x201/0x490 [ 1199.650941] ? lock_downgrade+0x720/0x720 [ 1199.655101] cache_grow_begin+0xa4/0x8a0 [ 1199.659157] ? setup_fault_attr+0x200/0x200 [ 1199.663462] ? lock_acquire+0x170/0x3c0 [ 1199.667435] cache_alloc_refill+0x273/0x340 [ 1199.671752] kmem_cache_alloc+0x346/0x370 [ 1199.675904] getname_flags+0xce/0x590 [ 1199.679700] do_mkdirat+0x8d/0x2d0 [ 1199.683224] ? __ia32_sys_mknod+0x120/0x120 [ 1199.687542] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1199.692902] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1199.697902] ? do_syscall_64+0x21/0x620 [ 1199.701868] do_syscall_64+0xf9/0x620 [ 1199.705678] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1199.710944] RIP: 0033:0x7f350f3a71f7 [ 1199.714646] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1199.733538] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1199.741231] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a71f7 [ 1199.748489] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1199.755840] RBP: 00007f350dd1d1d0 R08: 0000000000000000 R09: 00007f350dd1d1d0 17:56:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:56 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfffffdef, 0x0, 0x0, 0x0) 17:56:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a0000ec513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1199.763183] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1199.770435] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:56:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 30) 17:56:56 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x2, 0x0, 0x0) 17:56:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a02814c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1199.915210] FAULT_INJECTION: forcing a failure. [ 1199.915210] name failslab, interval 1, probability 0, space 0, times 0 [ 1199.980888] CPU: 1 PID: 21637 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1199.988790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1199.998142] Call Trace: [ 1200.000738] dump_stack+0x1fc/0x2ef [ 1200.004379] should_fail.cold+0xa/0xf [ 1200.008187] ? setup_fault_attr+0x200/0x200 [ 1200.012520] __should_failslab+0x115/0x180 [ 1200.016768] should_failslab+0x5/0x10 [ 1200.020574] kmem_cache_alloc+0x277/0x370 [ 1200.024725] ? ext4_sync_fs+0x8d0/0x8d0 [ 1200.028705] ext4_alloc_inode+0x1a/0x630 [ 1200.032782] ? ext4_sync_fs+0x8d0/0x8d0 [ 1200.036761] alloc_inode+0x5d/0x180 [ 1200.040389] new_inode+0x1d/0xf0 [ 1200.043760] __ext4_new_inode+0x400/0x5a20 [ 1200.048007] ? putname+0xe1/0x120 [ 1200.051461] ? do_mkdirat+0xa0/0x2d0 [ 1200.055189] ? ext4_free_inode+0x1780/0x1780 [ 1200.059595] ? debug_check_no_obj_freed+0x201/0x490 [ 1200.064623] ? __dquot_initialize+0x298/0xb70 [ 1200.069127] ? lock_acquire+0x170/0x3c0 [ 1200.073108] ? dquot_initialize_needed+0x290/0x290 [ 1200.078042] ? trace_hardirqs_off+0x64/0x200 [ 1200.082459] ? common_perm+0x4be/0x800 [ 1200.086354] ext4_mkdir+0x396/0xe10 [ 1200.089987] ? putname+0xe1/0x120 [ 1200.093451] ? ext4_init_dot_dotdot+0x600/0x600 [ 1200.098211] ? generic_permission+0x116/0x4d0 [ 1200.102711] ? security_inode_permission+0xc5/0xf0 [ 1200.107653] ? inode_permission.part.0+0x10c/0x450 [ 1200.112587] vfs_mkdir+0x508/0x7a0 [ 1200.116131] do_mkdirat+0x262/0x2d0 [ 1200.119764] ? __ia32_sys_mknod+0x120/0x120 [ 1200.124119] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1200.129135] ? do_syscall_64+0x21/0x620 [ 1200.133113] do_syscall_64+0xf9/0x620 [ 1200.136919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1200.142105] RIP: 0033:0x7f350f3a71f7 [ 1200.145817] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1200.164716] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1200.172426] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a71f7 17:56:56 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) [ 1200.179694] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1200.186960] RBP: 00007f350dd1d1d0 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1200.194229] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1200.201496] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:56:56 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x4, 0x0, 0x0) 17:56:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:56 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r0 = socket$packet(0x11, 0x2, 0x300) (async, rerun: 32) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) (async, rerun: 64) r2 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @bcast}, [@netrom, @bcast, @remote, @netrom, @netrom, @bcast, @default, @rose]}, &(0x7f0000000040)=0x48, 0x0) (rerun: 64) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000300)={'veth1_to_bond\x00', &(0x7f00000003c0)=@ethtool_regs={0x4, 0x401, 0xf6, "f5d1501cd4fb44fad91d1a80c94cb101b9c65fdaaa7ebbfa42bf72b827d060c42a7f0f1505fa54e0ec77bf88a68d045de4bd3db8c8c7b9507c42519540eb3524f7538ed12f57997c732ca16c0e67e9cc832dc67bb72151b3380106271bf9ff20538c9558571ad87fd0d882a53fcaf47be099b48a18205b60c70567d5c6618a2ec6db855798e69bc58c45b0f9d8be7197cc76457b854b4dd93af0c796836624da89ad4b2db84e5e3a608e2d140f5be639554d078ebcbba795d66cd00ebdde314dde95f486bab66c05d7af5dfa616c265aebc5fe719dd54318b26ceb9c712329f24a96e3cac90df60f597ae561d6ab54be4451e6dd9720"}}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) (async) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x6}]}, 0x10) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="b9fffe006044238cb89e14f088a81bffffff00004000632977fbac141431e934a0a662079f4b4d2f06e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) (async) socket$nl_sock_diag(0x10, 0x3, 0x4) dup2(0xffffffffffffffff, 0xffffffffffffffff) 17:56:56 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a01428c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:56 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x5, 0x0, 0x0) 17:56:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 31) 17:56:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x6, 0x0, 0x0) 17:56:57 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a0003ec513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1200.598790] FAULT_INJECTION: forcing a failure. [ 1200.598790] name failslab, interval 1, probability 0, space 0, times 0 [ 1200.610946] CPU: 0 PID: 21679 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1200.618845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1200.628195] Call Trace: [ 1200.630794] dump_stack+0x1fc/0x2ef [ 1200.634436] should_fail.cold+0xa/0xf [ 1200.638245] ? setup_fault_attr+0x200/0x200 [ 1200.642579] ? __es_tree_search.isra.0+0x1af/0x210 17:56:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x7, 0x0, 0x0) 17:56:57 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) [ 1200.647520] __should_failslab+0x115/0x180 [ 1200.651787] should_failslab+0x5/0x10 [ 1200.655594] kmem_cache_alloc+0x3f/0x370 [ 1200.659658] __es_insert_extent+0x39b/0x13b0 [ 1200.664076] ? lock_acquire+0x170/0x3c0 [ 1200.668058] ? ext4_es_insert_extent+0x17e/0x5e0 [ 1200.672848] ext4_es_insert_extent+0x22e/0x5e0 [ 1200.677439] ? lock_downgrade+0x720/0x720 [ 1200.681600] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 1200.687406] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1200.692430] ? ext4_es_find_delayed_extent_range+0x7d9/0x9f0 [ 1200.698329] ext4_ext_map_blocks+0x2129/0x7390 [ 1200.702920] ? __lock_acquire+0x6de/0x3ff0 [ 1200.707164] ? __lock_acquire+0x6de/0x3ff0 [ 1200.711404] ? mark_held_locks+0xf0/0xf0 [ 1200.715473] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1200.720842] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1200.726034] ? mark_held_locks+0xf0/0xf0 [ 1200.730096] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1200.734946] ? ext4_es_lookup_extent+0x375/0xb60 [ 1200.739715] ? check_preemption_disabled+0x41/0x280 [ 1200.744741] ? lock_acquire+0x170/0x3c0 [ 1200.748719] ? ext4_map_blocks+0x33e/0x1a50 [ 1200.753051] ext4_map_blocks+0xd88/0x1a50 [ 1200.757210] ? check_preemption_disabled+0x41/0x280 [ 1200.762229] ? ext4_issue_zeroout+0x160/0x160 [ 1200.766728] ? __brelse+0x84/0xa0 [ 1200.770184] ? __ext4_new_inode+0x2eb/0x5a20 [ 1200.774605] ext4_getblk+0xad/0x4f0 [ 1200.778231] ? ext4_iomap_begin+0xe00/0xe00 [ 1200.782567] ? ext4_free_inode+0x1780/0x1780 [ 1200.786983] ? debug_check_no_obj_freed+0x201/0x490 [ 1200.792006] ? __dquot_initialize+0x298/0xb70 [ 1200.796511] ext4_bread+0x7c/0x210 [ 1200.800055] ? ext4_getblk+0x4f0/0x4f0 [ 1200.803946] ? dquot_initialize_needed+0x290/0x290 [ 1200.808886] ? trace_hardirqs_off+0x64/0x200 [ 1200.813303] ext4_append+0x155/0x370 [ 1200.817028] ext4_mkdir+0x5bd/0xe10 [ 1200.820670] ? ext4_init_dot_dotdot+0x600/0x600 [ 1200.825350] ? generic_permission+0x116/0x4d0 [ 1200.829851] ? inode_permission.part.0+0x10c/0x450 [ 1200.834789] vfs_mkdir+0x508/0x7a0 [ 1200.838336] do_mkdirat+0x262/0x2d0 [ 1200.841966] ? __ia32_sys_mknod+0x120/0x120 [ 1200.846290] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1200.851310] ? do_syscall_64+0x21/0x620 [ 1200.855290] do_syscall_64+0xf9/0x620 [ 1200.859094] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1200.864285] RIP: 0033:0x7f350f3a71f7 [ 1200.868002] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1200.886990] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1200.894697] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a71f7 [ 1200.901964] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1200.909235] RBP: 00007f350dd1d1d0 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1200.916504] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1200.923773] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:56:57 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:57 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a06247c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x8, 0x0, 0x0) 17:56:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 32) 17:56:57 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a04762c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0xe, 0x0, 0x0) 17:56:57 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) [ 1201.248129] FAULT_INJECTION: forcing a failure. [ 1201.248129] name failslab, interval 1, probability 0, space 0, times 0 [ 1201.259805] CPU: 0 PID: 21717 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1201.267698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1201.277055] Call Trace: [ 1201.279651] dump_stack+0x1fc/0x2ef [ 1201.283302] should_fail.cold+0xa/0xf [ 1201.287112] ? setup_fault_attr+0x200/0x200 [ 1201.291439] ? __es_tree_search.isra.0+0x1af/0x210 [ 1201.296383] __should_failslab+0x115/0x180 [ 1201.300625] should_failslab+0x5/0x10 [ 1201.304432] kmem_cache_alloc+0x3f/0x370 [ 1201.308501] __es_insert_extent+0x39b/0x13b0 [ 1201.312916] ? lock_acquire+0x170/0x3c0 [ 1201.316902] ? ext4_es_insert_extent+0x17e/0x5e0 [ 1201.321664] ext4_es_insert_extent+0x22e/0x5e0 [ 1201.326253] ? lock_downgrade+0x720/0x720 [ 1201.330410] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 1201.336219] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1201.341244] ? ext4_es_find_delayed_extent_range+0x7d9/0x9f0 [ 1201.347054] ext4_ext_map_blocks+0x2129/0x7390 [ 1201.351646] ? __lock_acquire+0x6de/0x3ff0 [ 1201.355896] ? __lock_acquire+0x6de/0x3ff0 [ 1201.360142] ? mark_held_locks+0xf0/0xf0 [ 1201.364205] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1201.369580] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1201.374774] ? mark_held_locks+0xf0/0xf0 [ 1201.378849] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1201.383706] ? ext4_es_lookup_extent+0x375/0xb60 [ 1201.388476] ? check_preemption_disabled+0x41/0x280 [ 1201.393507] ? lock_acquire+0x170/0x3c0 17:56:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000000)=ANY=[], 0x30}, 0x1, 0x0, 0x0, 0x4004800}, 0x844) [ 1201.397487] ? ext4_map_blocks+0x33e/0x1a50 [ 1201.401820] ext4_map_blocks+0xd88/0x1a50 [ 1201.405980] ? check_preemption_disabled+0x41/0x280 [ 1201.411010] ? ext4_issue_zeroout+0x160/0x160 [ 1201.415510] ? __brelse+0x84/0xa0 [ 1201.418967] ? __ext4_new_inode+0x2eb/0x5a20 [ 1201.423390] ext4_getblk+0xad/0x4f0 [ 1201.427025] ? ext4_iomap_begin+0xe00/0xe00 [ 1201.431447] ? ext4_free_inode+0x1780/0x1780 [ 1201.435864] ? debug_check_no_obj_freed+0x201/0x490 [ 1201.440884] ? __dquot_initialize+0x298/0xb70 [ 1201.445393] ext4_bread+0x7c/0x210 [ 1201.448932] ? ext4_getblk+0x4f0/0x4f0 [ 1201.452807] ? dquot_initialize_needed+0x290/0x290 [ 1201.457738] ? trace_hardirqs_off+0x64/0x200 [ 1201.462142] ext4_append+0x155/0x370 [ 1201.465852] ext4_mkdir+0x5bd/0xe10 [ 1201.469503] ? ext4_init_dot_dotdot+0x600/0x600 [ 1201.474168] ? generic_permission+0x116/0x4d0 [ 1201.478672] ? inode_permission.part.0+0x10c/0x450 [ 1201.483596] vfs_mkdir+0x508/0x7a0 [ 1201.487123] do_mkdirat+0x262/0x2d0 [ 1201.490732] ? __ia32_sys_mknod+0x120/0x120 [ 1201.495046] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1201.500055] ? do_syscall_64+0x21/0x620 [ 1201.504028] do_syscall_64+0xf9/0x620 [ 1201.507947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1201.513129] RIP: 0033:0x7f350f3a71f7 [ 1201.516848] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1201.535747] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 17:56:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00002c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1201.543456] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a71f7 [ 1201.550710] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1201.557971] RBP: 00007f350dd1d1d0 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1201.565242] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1201.572503] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:56:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x10, 0x0, 0x0) 17:56:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 33) 17:56:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:58 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00004c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000000)=ANY=[], 0x30}, 0x1, 0x0, 0x0, 0x4004800}, 0x844) [ 1201.752258] FAULT_INJECTION: forcing a failure. [ 1201.752258] name failslab, interval 1, probability 0, space 0, times 0 [ 1201.772568] CPU: 0 PID: 21743 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1201.780476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1201.789832] Call Trace: [ 1201.792425] dump_stack+0x1fc/0x2ef [ 1201.796062] should_fail.cold+0xa/0xf [ 1201.799883] ? setup_fault_attr+0x200/0x200 [ 1201.804212] ? lock_downgrade+0x720/0x720 [ 1201.808368] __should_failslab+0x115/0x180 [ 1201.812611] should_failslab+0x5/0x10 [ 1201.816414] __kmalloc+0x2ab/0x3c0 [ 1201.819955] ? ext4_find_extent+0x9bb/0xc70 [ 1201.824289] ext4_find_extent+0x9bb/0xc70 [ 1201.828447] ext4_ext_map_blocks+0x1c0/0x7390 [ 1201.832956] ? __lock_acquire+0x6de/0x3ff0 [ 1201.837208] ? mark_held_locks+0xf0/0xf0 [ 1201.841275] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1201.846645] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1201.851841] ? mark_held_locks+0xf0/0xf0 [ 1201.855906] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1201.860754] ? ext4_es_lookup_extent+0x375/0xb60 [ 1201.865523] ? ext4_map_blocks+0x59f/0x1a50 [ 1201.869852] ? lock_acquire+0x170/0x3c0 [ 1201.873860] ? ext4_map_blocks+0x740/0x1a50 [ 1201.878191] ext4_map_blocks+0x7a2/0x1a50 [ 1201.882348] ? check_preemption_disabled+0x41/0x280 [ 1201.887380] ? ext4_issue_zeroout+0x160/0x160 [ 1201.891878] ? __brelse+0x84/0xa0 [ 1201.895335] ? __ext4_new_inode+0x2eb/0x5a20 [ 1201.899748] ? switch_mm_irqs_off+0x764/0x1340 [ 1201.904338] ext4_getblk+0xad/0x4f0 [ 1201.907972] ? ext4_iomap_begin+0xe00/0xe00 [ 1201.912300] ? ext4_free_inode+0x1780/0x1780 [ 1201.916718] ext4_bread+0x7c/0x210 [ 1201.920269] ? ext4_getblk+0x4f0/0x4f0 [ 1201.924168] ext4_append+0x155/0x370 [ 1201.927892] ext4_mkdir+0x5bd/0xe10 [ 1201.931523] ? ext4_init_dot_dotdot+0x600/0x600 [ 1201.936197] ? generic_permission+0x116/0x4d0 [ 1201.940684] ? inode_permission.part.0+0x10c/0x450 [ 1201.945606] vfs_mkdir+0x508/0x7a0 [ 1201.949136] do_mkdirat+0x262/0x2d0 [ 1201.952741] ? __ia32_sys_mknod+0x120/0x120 [ 1201.957062] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1201.962069] ? do_syscall_64+0x21/0x620 [ 1201.966043] do_syscall_64+0xf9/0x620 [ 1201.969836] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1201.975013] RIP: 0033:0x7f350f3a71f7 [ 1201.978711] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1201.997589] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 17:56:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x3e, 0x0, 0x0) 17:56:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:58 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) [ 1202.005283] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a71f7 [ 1202.012540] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1202.019790] RBP: 00007f350dd1d1d0 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1202.027044] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1202.034306] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:56:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00005c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000000)=ANY=[], 0x30}, 0x1, 0x0, 0x0, 0x4004800}, 0x844) 17:56:58 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 34) 17:56:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x500, 0x0, 0x0) 17:56:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00006c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:58 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_procfs(r0, &(0x7f0000000000)='gid_map\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x7, 0xc4, 0x0, 0x6, 0x0, 0x8, 0x8905, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x1000, 0xfffffffffffff9b4}, 0x800, 0x835, 0x6, 0x9, 0xffff, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x80000001}, r1, 0x10, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) preadv(r2, &(0x7f0000000300)=[{&(0x7f0000000040)=""/214, 0xd6}, {&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000000280)=""/125, 0x7d}], 0x4, 0x3, 0x1) writev(r2, &(0x7f0000000340)=[{&(0x7f00000003c0)="6499f67d8f9a24133b3f7ad6f75f84449a5073eb54326d1cb1d64e2e06e99924af71ba7be6b58e5628558ddccce2c288fed825b9f503184e0afe6992906f8e9a27d819e9017e8ef1036e56f66bfc98c563558396b4d31ea01ad61f2e0d9327a0234350c835c202c4b04c40bd443e9dcf84cebce0a88a12cdc3a802571d479e3087d512d4eeb8e01934cd4de7d801eada40e2a716c73b5e50e53775955a4f912f5c077d6f1613f4ae43d415acdc77d06014d3905982fc3f712e540951f0d16ac482d25147e8", 0xc5}], 0x1) 17:56:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x600, 0x0, 0x0) 17:56:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:58 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) [ 1202.298131] FAULT_INJECTION: forcing a failure. [ 1202.298131] name failslab, interval 1, probability 0, space 0, times 0 [ 1202.349875] CPU: 0 PID: 21787 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1202.357781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1202.367133] Call Trace: [ 1202.369725] dump_stack+0x1fc/0x2ef [ 1202.373364] should_fail.cold+0xa/0xf [ 1202.377170] ? setup_fault_attr+0x200/0x200 [ 1202.381497] ? lock_downgrade+0x720/0x720 [ 1202.385657] __should_failslab+0x115/0x180 [ 1202.389899] should_failslab+0x5/0x10 [ 1202.393703] __kmalloc+0x2ab/0x3c0 [ 1202.397240] ? ext4_find_extent+0x9bb/0xc70 [ 1202.401555] ext4_find_extent+0x9bb/0xc70 [ 1202.405700] ext4_ext_map_blocks+0x1c0/0x7390 [ 1202.410195] ? __lock_acquire+0x6de/0x3ff0 [ 1202.414426] ? mark_held_locks+0xf0/0xf0 [ 1202.418485] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1202.423845] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1202.429023] ? mark_held_locks+0xf0/0xf0 [ 1202.433066] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1202.437906] ? ext4_es_lookup_extent+0x375/0xb60 [ 1202.442670] ? ext4_map_blocks+0x59f/0x1a50 [ 1202.447002] ? lock_acquire+0x170/0x3c0 [ 1202.450967] ? ext4_map_blocks+0x740/0x1a50 [ 1202.455290] ext4_map_blocks+0x7a2/0x1a50 [ 1202.459435] ? check_preemption_disabled+0x41/0x280 [ 1202.464444] ? ext4_issue_zeroout+0x160/0x160 [ 1202.468934] ? __brelse+0x84/0xa0 [ 1202.472442] ? __ext4_new_inode+0x2eb/0x5a20 [ 1202.476842] ext4_getblk+0xad/0x4f0 [ 1202.480452] ? ext4_iomap_begin+0xe00/0xe00 [ 1202.484770] ? ext4_free_inode+0x1780/0x1780 [ 1202.489168] ? debug_check_no_obj_freed+0x201/0x490 [ 1202.494181] ? __dquot_initialize+0x298/0xb70 [ 1202.498701] ext4_bread+0x7c/0x210 [ 1202.502223] ? ext4_getblk+0x4f0/0x4f0 [ 1202.506102] ? dquot_initialize_needed+0x290/0x290 [ 1202.511022] ? trace_hardirqs_off+0x64/0x200 [ 1202.515425] ext4_append+0x155/0x370 [ 1202.519130] ext4_mkdir+0x5bd/0xe10 [ 1202.522741] ? ext4_init_dot_dotdot+0x600/0x600 [ 1202.527408] ? generic_permission+0x116/0x4d0 [ 1202.531895] ? inode_permission.part.0+0x10c/0x450 [ 1202.536808] vfs_mkdir+0x508/0x7a0 [ 1202.540329] do_mkdirat+0x262/0x2d0 [ 1202.543951] ? __ia32_sys_mknod+0x120/0x120 [ 1202.548267] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1202.553267] ? do_syscall_64+0x21/0x620 [ 1202.557234] do_syscall_64+0xf9/0x620 [ 1202.561024] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1202.566204] RIP: 0033:0x7f350f3a71f7 [ 1202.569910] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1202.588803] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 17:56:59 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_procfs(r0, &(0x7f0000000000)='gid_map\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x7, 0xc4, 0x0, 0x6, 0x0, 0x8, 0x8905, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x1000, 0xfffffffffffff9b4}, 0x800, 0x835, 0x6, 0x9, 0xffff, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x80000001}, r1, 0x10, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) preadv(r2, &(0x7f0000000300)=[{&(0x7f0000000040)=""/214, 0xd6}, {&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000000280)=""/125, 0x7d}], 0x4, 0x3, 0x1) writev(r2, &(0x7f0000000340)=[{&(0x7f00000003c0)="6499f67d8f9a24133b3f7ad6f75f84449a5073eb54326d1cb1d64e2e06e99924af71ba7be6b58e5628558ddccce2c288fed825b9f503184e0afe6992906f8e9a27d819e9017e8ef1036e56f66bfc98c563558396b4d31ea01ad61f2e0d9327a0234350c835c202c4b04c40bd443e9dcf84cebce0a88a12cdc3a802571d479e3087d512d4eeb8e01934cd4de7d801eada40e2a716c73b5e50e53775955a4f912f5c077d6f1613f4ae43d415acdc77d06014d3905982fc3f712e540951f0d16ac482d25147e8", 0xc5}], 0x1) getpid() (async) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) (async) syz_open_procfs(r0, &(0x7f0000000000)='gid_map\x00') (async) getpid() (async) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) (async) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x7, 0xc4, 0x0, 0x6, 0x0, 0x8, 0x8905, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x1000, 0xfffffffffffff9b4}, 0x800, 0x835, 0x6, 0x9, 0xffff, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x80000001}, r1, 0x10, 0xffffffffffffffff, 0x8) (async) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) (async) preadv(r2, &(0x7f0000000300)=[{&(0x7f0000000040)=""/214, 0xd6}, {&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000000280)=""/125, 0x7d}], 0x4, 0x3, 0x1) (async) writev(r2, &(0x7f0000000340)=[{&(0x7f00000003c0)="6499f67d8f9a24133b3f7ad6f75f84449a5073eb54326d1cb1d64e2e06e99924af71ba7be6b58e5628558ddccce2c288fed825b9f503184e0afe6992906f8e9a27d819e9017e8ef1036e56f66bfc98c563558396b4d31ea01ad61f2e0d9327a0234350c835c202c4b04c40bd443e9dcf84cebce0a88a12cdc3a802571d479e3087d512d4eeb8e01934cd4de7d801eada40e2a716c73b5e50e53775955a4f912f5c077d6f1613f4ae43d415acdc77d06014d3905982fc3f712e540951f0d16ac482d25147e8", 0xc5}], 0x1) (async) [ 1202.596512] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a71f7 [ 1202.603778] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1202.611042] RBP: 00007f350dd1d1d0 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1202.618557] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1202.625820] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:56:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00008c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x700, 0x0, 0x0) 17:56:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 35) 17:56:59 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0xe00, 0x0, 0x0) 17:56:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a0000ec513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:59 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_procfs(r0, &(0x7f0000000000)='gid_map\x00') (async) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) (async) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x7, 0xc4, 0x0, 0x6, 0x0, 0x8, 0x8905, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x1000, 0xfffffffffffff9b4}, 0x800, 0x835, 0x6, 0x9, 0xffff, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x80000001}, r1, 0x10, 0xffffffffffffffff, 0x8) (async) r2 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) (async) preadv(r2, &(0x7f0000000300)=[{&(0x7f0000000040)=""/214, 0xd6}, {&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000000280)=""/125, 0x7d}], 0x4, 0x3, 0x1) (async) writev(r2, &(0x7f0000000340)=[{&(0x7f00000003c0)="6499f67d8f9a24133b3f7ad6f75f84449a5073eb54326d1cb1d64e2e06e99924af71ba7be6b58e5628558ddccce2c288fed825b9f503184e0afe6992906f8e9a27d819e9017e8ef1036e56f66bfc98c563558396b4d31ea01ad61f2e0d9327a0234350c835c202c4b04c40bd443e9dcf84cebce0a88a12cdc3a802571d479e3087d512d4eeb8e01934cd4de7d801eada40e2a716c73b5e50e53775955a4f912f5c077d6f1613f4ae43d415acdc77d06014d3905982fc3f712e540951f0d16ac482d25147e8", 0xc5}], 0x1) 17:56:59 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) [ 1202.954635] FAULT_INJECTION: forcing a failure. [ 1202.954635] name failslab, interval 1, probability 0, space 0, times 0 [ 1202.979425] CPU: 1 PID: 21832 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1202.987338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1202.996691] Call Trace: [ 1202.999297] dump_stack+0x1fc/0x2ef [ 1203.002938] should_fail.cold+0xa/0xf [ 1203.006752] ? setup_fault_attr+0x200/0x200 [ 1203.011106] ? lock_downgrade+0x720/0x720 [ 1203.015277] __should_failslab+0x115/0x180 [ 1203.019521] should_failslab+0x5/0x10 [ 1203.023343] __kmalloc+0x2ab/0x3c0 [ 1203.026888] ? ext4_find_extent+0x9bb/0xc70 [ 1203.031217] ext4_find_extent+0x9bb/0xc70 [ 1203.035377] ext4_ext_map_blocks+0x1c0/0x7390 [ 1203.039890] ? __lock_acquire+0x6de/0x3ff0 [ 1203.044138] ? mark_held_locks+0xf0/0xf0 [ 1203.048204] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1203.053575] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1203.058769] ? mark_held_locks+0xf0/0xf0 [ 1203.062836] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1203.067691] ? ext4_es_lookup_extent+0x375/0xb60 [ 1203.072461] ? ext4_map_blocks+0x59f/0x1a50 [ 1203.076791] ? lock_acquire+0x170/0x3c0 [ 1203.080769] ? ext4_map_blocks+0x740/0x1a50 [ 1203.085096] ext4_map_blocks+0x7a2/0x1a50 [ 1203.089250] ? check_preemption_disabled+0x41/0x280 [ 1203.094285] ? ext4_issue_zeroout+0x160/0x160 [ 1203.098786] ? __brelse+0x84/0xa0 [ 1203.102243] ? __ext4_new_inode+0x2eb/0x5a20 [ 1203.106665] ext4_getblk+0xad/0x4f0 [ 1203.110302] ? ext4_iomap_begin+0xe00/0xe00 [ 1203.114631] ? ext4_free_inode+0x1780/0x1780 [ 1203.119045] ? debug_check_no_obj_freed+0x201/0x490 [ 1203.124063] ? __dquot_initialize+0x298/0xb70 [ 1203.128568] ext4_bread+0x7c/0x210 [ 1203.132115] ? ext4_getblk+0x4f0/0x4f0 [ 1203.136006] ? dquot_initialize_needed+0x290/0x290 [ 1203.140943] ? trace_hardirqs_off+0x64/0x200 [ 1203.145360] ext4_append+0x155/0x370 [ 1203.149083] ext4_mkdir+0x5bd/0xe10 [ 1203.152725] ? ext4_init_dot_dotdot+0x600/0x600 [ 1203.157404] ? generic_permission+0x116/0x4d0 [ 1203.161911] ? inode_permission.part.0+0x10c/0x450 [ 1203.166849] vfs_mkdir+0x508/0x7a0 [ 1203.170396] do_mkdirat+0x262/0x2d0 [ 1203.174031] ? __ia32_sys_mknod+0x120/0x120 [ 1203.178358] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1203.183378] ? do_syscall_64+0x21/0x620 [ 1203.187358] do_syscall_64+0xf9/0x620 [ 1203.191170] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1203.196362] RIP: 0033:0x7f350f3a71f7 17:56:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x1428, 0x0, 0x0) 17:56:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00010c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x300, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) [ 1203.200081] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1203.218980] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1203.226697] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a71f7 [ 1203.233973] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1203.241332] RBP: 00007f350dd1d1d0 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1203.248604] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 17:56:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 36) 17:56:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x124b1f, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:56:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) 17:56:59 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:56:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a0003ec513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1203.255877] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:56:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x2814, 0x0, 0x0) 17:56:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) 17:56:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x3e00, 0x0, 0x0) 17:56:59 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r2}) 17:56:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08026b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:56:59 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r2}) 17:56:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x0, 0x0, 0x6, 0x3, 0x0, 0x8, 0x8a060, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x10001, 0x91e46d0e8a77d7af, 0x2, 0x1000, 0x0, 0x0, 0x4, 0x0, 0x17}, 0x0, 0xd, 0xffffffffffffffff, 0x3) fcntl$lock(r2, 0x5, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000040)=0x2) r3 = dup(r1) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, &(0x7f0000000000)="d33c0f2c7500260f07660f3a1491000005baa100b000eeb8f3000f00d8f08229000f01b97d160f001a66b80500000066b949457c010f01d9", 0x38}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 1203.492316] FAULT_INJECTION: forcing a failure. [ 1203.492316] name failslab, interval 1, probability 0, space 0, times 0 [ 1203.565047] CPU: 0 PID: 21873 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1203.572952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1203.582312] Call Trace: [ 1203.584920] dump_stack+0x1fc/0x2ef [ 1203.588562] should_fail.cold+0xa/0xf [ 1203.592369] ? setup_fault_attr+0x200/0x200 [ 1203.596700] ? __lock_acquire+0x6de/0x3ff0 [ 1203.600943] __should_failslab+0x115/0x180 [ 1203.605183] should_failslab+0x5/0x10 [ 1203.608983] kmem_cache_alloc+0x3f/0x370 [ 1203.613043] ? mempool_alloc+0x350/0x350 [ 1203.617104] mempool_alloc+0x146/0x350 [ 1203.620995] ? mempool_resize+0x790/0x790 [ 1203.625141] ? mark_held_locks+0xf0/0xf0 [ 1203.629199] ? mark_held_locks+0xf0/0xf0 [ 1203.633263] ? check_preemption_disabled+0x41/0x280 [ 1203.638290] ? find_get_entry+0x4f4/0x8a0 [ 1203.642442] bio_alloc_bioset+0x389/0x5e0 [ 1203.646597] ? bvec_alloc+0x2f0/0x2f0 [ 1203.650401] ? lock_downgrade+0x720/0x720 [ 1203.654549] ? lock_acquire+0x170/0x3c0 [ 1203.658526] ? mark_buffer_dirty_inode+0x12c/0x3c0 [ 1203.663461] submit_bh_wbc+0x141/0x760 [ 1203.667363] __sync_dirty_buffer+0x14e/0x320 [ 1203.671784] __ext4_handle_dirty_metadata+0x234/0x590 [ 1203.676985] ext4_getblk+0x32d/0x4f0 [ 1203.680714] ? ext4_iomap_begin+0xe00/0xe00 [ 1203.685049] ? ext4_free_inode+0x1780/0x1780 [ 1203.689460] ? debug_check_no_obj_freed+0x201/0x490 [ 1203.694479] ? __dquot_initialize+0x298/0xb70 [ 1203.698983] ext4_bread+0x7c/0x210 [ 1203.702529] ? ext4_getblk+0x4f0/0x4f0 [ 1203.706420] ? dquot_initialize_needed+0x290/0x290 [ 1203.711358] ? trace_hardirqs_off+0x64/0x200 [ 1203.715774] ext4_append+0x155/0x370 [ 1203.719499] ext4_mkdir+0x5bd/0xe10 [ 1203.723141] ? ext4_init_dot_dotdot+0x600/0x600 [ 1203.727816] ? generic_permission+0x116/0x4d0 [ 1203.732321] ? inode_permission.part.0+0x10c/0x450 [ 1203.737258] vfs_mkdir+0x508/0x7a0 [ 1203.740803] do_mkdirat+0x262/0x2d0 [ 1203.744437] ? __ia32_sys_mknod+0x120/0x120 [ 1203.748768] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1203.753790] ? do_syscall_64+0x21/0x620 [ 1203.757770] do_syscall_64+0xf9/0x620 [ 1203.761579] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1203.766771] RIP: 0033:0x7f350f3a71f7 [ 1203.770483] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1203.789386] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1203.797097] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a71f7 [ 1203.804366] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1203.811633] RBP: 00007f350dd1d1d0 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1203.818910] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1203.826180] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 37) [ 1204.139886] FAULT_INJECTION: forcing a failure. [ 1204.139886] name failslab, interval 1, probability 0, space 0, times 0 [ 1204.160267] CPU: 1 PID: 21906 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1204.168175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1204.177533] Call Trace: [ 1204.180132] dump_stack+0x1fc/0x2ef [ 1204.183768] should_fail.cold+0xa/0xf [ 1204.187571] ? setup_fault_attr+0x200/0x200 [ 1204.191895] ? check_preemption_disabled+0x41/0x280 [ 1204.196922] __should_failslab+0x115/0x180 [ 1204.201157] should_failslab+0x5/0x10 [ 1204.204955] kmem_cache_alloc_node+0x54/0x3b0 [ 1204.209454] create_task_io_context+0x2c/0x430 [ 1204.214037] generic_make_request_checks+0x1c4f/0x22e0 [ 1204.219325] ? should_fail_bio.isra.0+0xa0/0xa0 [ 1204.224001] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1204.229016] ? kmem_cache_alloc+0x315/0x370 [ 1204.233352] generic_make_request+0x23f/0xdf0 [ 1204.237850] ? blk_put_request+0x110/0x110 [ 1204.242085] ? check_preemption_disabled+0x41/0x280 [ 1204.247117] submit_bio+0xb1/0x430 [ 1204.250672] ? generic_make_request+0xdf0/0xdf0 [ 1204.255358] ? check_preemption_disabled+0x41/0x280 [ 1204.260386] ? guard_bio_eod+0x2a0/0x650 [ 1204.264452] submit_bh_wbc+0x5a7/0x760 [ 1204.268361] __sync_dirty_buffer+0x14e/0x320 [ 1204.272770] __ext4_handle_dirty_metadata+0x234/0x590 [ 1204.277967] ext4_getblk+0x32d/0x4f0 [ 1204.281685] ? ext4_iomap_begin+0xe00/0xe00 [ 1204.286016] ? ext4_free_inode+0x1780/0x1780 [ 1204.290425] ? debug_check_no_obj_freed+0x201/0x490 [ 1204.295443] ? __dquot_initialize+0x298/0xb70 [ 1204.299947] ext4_bread+0x7c/0x210 [ 1204.303492] ? ext4_getblk+0x4f0/0x4f0 [ 1204.307382] ? dquot_initialize_needed+0x290/0x290 [ 1204.312315] ? trace_hardirqs_off+0x64/0x200 [ 1204.316732] ext4_append+0x155/0x370 [ 1204.320454] ext4_mkdir+0x5bd/0xe10 [ 1204.324091] ? ext4_init_dot_dotdot+0x600/0x600 [ 1204.328767] ? generic_permission+0x116/0x4d0 [ 1204.333268] ? inode_permission.part.0+0x10c/0x450 [ 1204.338205] vfs_mkdir+0x508/0x7a0 [ 1204.341750] do_mkdirat+0x262/0x2d0 [ 1204.345382] ? __ia32_sys_mknod+0x120/0x120 [ 1204.349709] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1204.354729] ? do_syscall_64+0x21/0x620 [ 1204.358705] do_syscall_64+0xf9/0x620 [ 1204.362511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1204.367700] RIP: 0033:0x7f350f3a71f7 [ 1204.371414] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 17:57:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff1f, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x4762, 0x0, 0x0) 17:57:00 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r2}) 17:57:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08036b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:57:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x0, 0x0, 0x6, 0x3, 0x0, 0x8, 0x8a060, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x10001, 0x91e46d0e8a77d7af, 0x2, 0x1000, 0x0, 0x0, 0x4, 0x0, 0x17}, 0x0, 0xd, 0xffffffffffffffff, 0x3) fcntl$lock(r2, 0x5, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000040)=0x2) r3 = dup(r1) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, &(0x7f0000000000)="d33c0f2c7500260f07660f3a1491000005baa100b000eeb8f3000f00d8f08229000f01b97d160f001a66b80500000066b949457c010f01d9", 0x38}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (async) perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x0, 0x0, 0x6, 0x3, 0x0, 0x8, 0x8a060, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x10001, 0x91e46d0e8a77d7af, 0x2, 0x1000, 0x0, 0x0, 0x4, 0x0, 0x17}, 0x0, 0xd, 0xffffffffffffffff, 0x3) (async) fcntl$lock(r2, 0x5, 0x0) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000040)=0x2) (async) dup(r1) (async) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) (async) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) (async) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) (async) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, &(0x7f0000000000)="d33c0f2c7500260f07660f3a1491000005baa100b000eeb8f3000f00d8f08229000f01b97d160f001a66b80500000066b949457c010f01d9", 0x38}], 0x1, 0x0, 0x0, 0x0) (async) ioctl$KVM_RUN(r4, 0xae80, 0x0) (async) [ 1204.390315] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1204.398028] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a71f7 [ 1204.405298] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1204.412568] RBP: 00007f350dd1d1d0 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1204.419834] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1204.427101] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 38) 17:57:01 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffffff) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r2}) 17:57:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08046b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:57:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x6247, 0x0, 0x0) 17:57:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x0, 0x0, 0x6, 0x3, 0x0, 0x8, 0x8a060, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x10001, 0x91e46d0e8a77d7af, 0x2, 0x1000, 0x0, 0x0, 0x4, 0x0, 0x17}, 0x0, 0xd, 0xffffffffffffffff, 0x3) fcntl$lock(r2, 0x5, 0x0) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000040)=0x2) (async) r3 = dup(r1) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) (async) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) (async) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, &(0x7f0000000000)="d33c0f2c7500260f07660f3a1491000005baa100b000eeb8f3000f00d8f08229000f01b97d160f001a66b80500000066b949457c010f01d9", 0x38}], 0x1, 0x0, 0x0, 0x0) (async) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 1204.647644] FAULT_INJECTION: forcing a failure. [ 1204.647644] name failslab, interval 1, probability 0, space 0, times 0 [ 1204.707463] CPU: 1 PID: 21937 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1204.715371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1204.724731] Call Trace: [ 1204.727331] dump_stack+0x1fc/0x2ef [ 1204.730982] should_fail.cold+0xa/0xf [ 1204.734798] ? setup_fault_attr+0x200/0x200 [ 1204.739132] ? __lock_acquire+0x6de/0x3ff0 [ 1204.743383] __should_failslab+0x115/0x180 [ 1204.747633] should_failslab+0x5/0x10 [ 1204.751441] kmem_cache_alloc+0x3f/0x370 17:57:01 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffffff) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r2}) [ 1204.755508] ? mempool_alloc+0x350/0x350 [ 1204.759589] mempool_alloc+0x146/0x350 [ 1204.763487] ? mempool_resize+0x790/0x790 [ 1204.767643] ? __sync_dirty_buffer+0x1ef/0x320 [ 1204.772236] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1204.777608] ? kernel_fpu_enable+0x1f/0x40 [ 1204.781854] ? kernel_fpu_end+0x11b/0x170 [ 1204.786007] ? kernel_fpu_enable+0x40/0x40 [ 1204.790262] bio_alloc_bioset+0x389/0x5e0 [ 1204.794419] ? bvec_alloc+0x2f0/0x2f0 [ 1204.798228] ? lock_downgrade+0x720/0x720 [ 1204.802382] ? check_preemption_disabled+0x41/0x280 [ 1204.807417] submit_bh_wbc+0x141/0x760 [ 1204.811326] __sync_dirty_buffer+0x14e/0x320 [ 1204.815748] __ext4_handle_dirty_metadata+0x234/0x590 [ 1204.820931] ? ext4_dirent_csum_set+0x1e1/0x2c0 [ 1204.825594] ext4_mkdir+0x689/0xe10 [ 1204.829216] ? ext4_init_dot_dotdot+0x600/0x600 [ 1204.833878] ? generic_permission+0x116/0x4d0 [ 1204.838367] ? inode_permission.part.0+0x10c/0x450 [ 1204.843292] vfs_mkdir+0x508/0x7a0 [ 1204.846821] do_mkdirat+0x262/0x2d0 [ 1204.850438] ? __ia32_sys_mknod+0x120/0x120 [ 1204.854750] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1204.859760] ? do_syscall_64+0x21/0x620 [ 1204.863724] do_syscall_64+0xf9/0x620 [ 1204.867519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1204.872696] RIP: 0033:0x7f350f3a71f7 [ 1204.876396] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1204.895283] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1204.902977] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a71f7 [ 1204.910232] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1204.917486] RBP: 00007f350dd1d1d0 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1204.924743] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1204.931999] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 39) [ 1205.102353] FAULT_INJECTION: forcing a failure. [ 1205.102353] name failslab, interval 1, probability 0, space 0, times 0 [ 1205.129489] CPU: 1 PID: 21967 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1205.137392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1205.146761] Call Trace: [ 1205.149344] dump_stack+0x1fc/0x2ef [ 1205.152965] should_fail.cold+0xa/0xf [ 1205.156756] ? setup_fault_attr+0x200/0x200 [ 1205.161068] ? __lock_acquire+0x6de/0x3ff0 [ 1205.165293] __should_failslab+0x115/0x180 [ 1205.169520] should_failslab+0x5/0x10 [ 1205.173309] kmem_cache_alloc+0x3f/0x370 [ 1205.177359] ? mempool_alloc+0x350/0x350 [ 1205.181406] mempool_alloc+0x146/0x350 [ 1205.185285] ? mempool_resize+0x790/0x790 [ 1205.189424] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1205.194257] ? kernel_fpu_enable+0x1f/0x40 [ 1205.198480] ? kernel_fpu_end+0x11b/0x170 [ 1205.202617] ? kernel_fpu_enable+0x40/0x40 [ 1205.206843] bio_alloc_bioset+0x389/0x5e0 [ 1205.210983] ? bvec_alloc+0x2f0/0x2f0 [ 1205.214770] ? lock_downgrade+0x720/0x720 [ 1205.218907] ? check_preemption_disabled+0x41/0x280 [ 1205.223917] submit_bh_wbc+0x141/0x760 [ 1205.227798] __sync_dirty_buffer+0x14e/0x320 [ 1205.232195] __ext4_handle_dirty_metadata+0x234/0x590 [ 1205.237372] ? ext4_dirent_csum_set+0x1e1/0x2c0 [ 1205.242031] add_dirent_to_buf+0x44a/0x770 [ 1205.246256] ? ext4_insert_dentry+0x490/0x490 [ 1205.250738] ? __ext4_read_dirblock+0x3cd/0x9d0 [ 1205.255397] ext4_add_entry+0x508/0xbb0 [ 1205.259365] ? make_indexed_dir+0xee0/0xee0 [ 1205.263677] ? __sync_dirty_buffer+0x1ef/0x320 [ 1205.268252] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1205.273625] ext4_mkdir+0x6f5/0xe10 [ 1205.277244] ? ext4_init_dot_dotdot+0x600/0x600 [ 1205.281902] ? generic_permission+0x116/0x4d0 [ 1205.286388] ? inode_permission.part.0+0x10c/0x450 [ 1205.291307] vfs_mkdir+0x508/0x7a0 [ 1205.294835] do_mkdirat+0x262/0x2d0 [ 1205.298450] ? __ia32_sys_mknod+0x120/0x120 [ 1205.302761] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1205.307766] ? do_syscall_64+0x21/0x620 [ 1205.311727] do_syscall_64+0xf9/0x620 [ 1205.315516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1205.320693] RIP: 0033:0x7f350f3a71f7 [ 1205.324393] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1205.343282] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1205.350978] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a71f7 [ 1205.358231] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1205.365485] RBP: 00007f350dd1d1d0 R08: 0000000000000000 R09: 00007f350dd1d1d0 [ 1205.372741] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1205.379994] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10785e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x34000, 0x0, 0x0) 17:57:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08056b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:57:01 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffffff) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r2}) 17:57:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget(0x2, 0x4, 0x0) r2 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r2, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) semctl$IPC_RMID(r2, 0x0, 0x0) openat(r0, &(0x7f0000000240)='./file0\x00', 0x84842, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000440)="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", 0x1000, 0x7}, {&(0x7f0000000300)="33714254210ae81ae7dc420ab575a2", 0xf, 0xc01}, {&(0x7f0000001440)="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", 0xc00, 0x3}], 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="696f636896210de67a5ae527e4ee9b881f95dea6212e6f38383546b3202c6e6e6f5e756c7461696c3d312c5c707072616973655f747970653d696d61736b672c87000000"]) semop(0x0, &(0x7f00000020c0)=[{0x0, 0x3ff}, {0x4, 0x9ec, 0x1800}, {0x3, 0x4, 0x800}, {0x3, 0x1, 0x1000}, {0x3, 0x3, 0x800}, {0x1}, {0x0, 0x2, 0x1800}], 0x7) semtimedop(r1, &(0x7f0000000180), 0x0, &(0x7f00000003c0)={0x77359400}) 17:57:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 40) 17:57:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x400300, 0x0, 0x0) 17:57:01 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r2}) 17:57:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08116b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:57:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10f85e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:02 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) (async, rerun: 32) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) (rerun: 32) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) (async) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget(0x2, 0x4, 0x0) (async, rerun: 64) r2 = semget(0x3, 0x3, 0x0) (async, rerun: 64) semget$private(0x0, 0x20000000102, 0x0) (async) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) (async) semop(r2, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) (async) semctl$IPC_RMID(r2, 0x0, 0x0) (async) openat(r0, &(0x7f0000000240)='./file0\x00', 0x84842, 0x0) (async, rerun: 32) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000440)="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", 0x1000, 0x7}, {&(0x7f0000000300)="33714254210ae81ae7dc420ab575a2", 0xf, 0xc01}, {&(0x7f0000001440)="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", 0xc00, 0x3}], 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="696f636896210de67a5ae527e4ee9b881f95dea6212e6f38383546b3202c6e6e6f5e756c7461696c3d312c5c707072616973655f747970653d696d61736b672c87000000"]) (async, rerun: 32) semop(0x0, &(0x7f00000020c0)=[{0x0, 0x3ff}, {0x4, 0x9ec, 0x1800}, {0x3, 0x4, 0x800}, {0x3, 0x1, 0x1000}, {0x3, 0x3, 0x800}, {0x1}, {0x0, 0x2, 0x1800}], 0x7) (async, rerun: 32) semtimedop(r1, &(0x7f0000000180), 0x0, &(0x7f00000003c0)={0x77359400}) (rerun: 32) [ 1205.566824] audit: type=1800 audit(1650995822.036:816): pid=21990 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=73 res=0 17:57:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x1000000, 0x0, 0x0) 17:57:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143b301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:57:02 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r2}) [ 1205.699459] FAULT_INJECTION: forcing a failure. [ 1205.699459] name failslab, interval 1, probability 0, space 0, times 0 17:57:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1205.743665] CPU: 1 PID: 22005 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1205.751574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1205.760934] Call Trace: [ 1205.763537] dump_stack+0x1fc/0x2ef [ 1205.767190] should_fail.cold+0xa/0xf [ 1205.771006] ? setup_fault_attr+0x200/0x200 [ 1205.775345] ? lock_acquire+0x170/0x3c0 [ 1205.779345] __should_failslab+0x115/0x180 [ 1205.783598] should_failslab+0x5/0x10 [ 1205.787410] __kmalloc_track_caller+0x2a6/0x3c0 17:57:02 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r2}) [ 1205.792087] ? strndup_user+0x70/0x120 [ 1205.795981] ? _copy_from_user+0xd2/0x130 [ 1205.800143] memdup_user+0x22/0xb0 [ 1205.803701] strndup_user+0x70/0x120 [ 1205.807430] ksys_mount+0x6f/0x130 [ 1205.810985] __x64_sys_mount+0xba/0x150 [ 1205.814981] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1205.819857] do_syscall_64+0xf9/0x620 [ 1205.823676] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1205.828870] RIP: 0033:0x7f350f3a961a 17:57:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1205.832588] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1205.851496] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1205.859204] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1205.866469] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1205.873733] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1205.881005] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1205.888276] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 41) 17:57:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x2000000, 0x0, 0x0) 17:57:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816136478f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:57:02 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, 0x0, &(0x7f0000000040)) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086}) 17:57:02 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget(0x2, 0x4, 0x0) r2 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r2, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) semctl$IPC_RMID(r2, 0x0, 0x0) openat(r0, &(0x7f0000000240)='./file0\x00', 0x84842, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000440)="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", 0x1000, 0x7}, {&(0x7f0000000300)="33714254210ae81ae7dc420ab575a2", 0xf, 0xc01}, {&(0x7f0000001440)="dbbc5d4d7e2bbb0fd67659db1df066af87c8e90090bf7e3ded095fe79cb1364846b0da8efd3a7158750d70b2c28d90478202872e4bb5e588c9ddea3f93f2b3136bad827306ccd5ea4cb4f945be5d50548ad8a8626ffaa1807af3ddf0695a8cb3b130a8e1f2ec17639ce37a5c19f6c04667cfe2fb08eacdb5b88e976859b53de003b2cfa31c8c2529c7936a70fd9e6ad67a752b52546829468644298bf497dd1b9666f06692fb19db7a3a9e75a13e7f397efaa09e282c7322cdf31aba420673c39c12ee711d04e698b8a555d1d801b29f5df46bb884e39c997a15aeadc91ab730d2ec83625cde2ccc187de9b77ee5dc2e08ea60f58d750c0d3bafde06e9996b7de82c111768f4e1e9b338d7dba40caae0d117fd563d21a251261f4780b4ac944d1a9c484f44b21d2b944139bcdc735a819ccdd9a63f9d980a445fbb47415920e38ad17a9bdcc7c2d2b2de62dfc97fca7a8981bae5d43e76d1e8dd0917a7c29fef4fcb638dcba5602de43756607d2104e425f24cf19aef8a6de1ce0df1b1bf5ebf062248e1a2c02dfa2ced984663e68423b8329d1ec5d4ac766e39985f15c9f718414cdc70682281c8849c43371625f5c8d0328e2f124bc099b1d827909fb266bb0433a3f81832358b750378645d27ff1e296f00c17bee898b85fc14c25ef72414dac1429b2de83e49335d18202567769689d5d7ab8ba0da81ab5d2b5dc19b6bca16c7d43d1bf5eb8c7f606c3fffffe5919d702534c39ae354fe222a1efe80d1934d790fdfe5748653a5ea79935503d2dc193433ee03bb3f76d19b8a9491f8e8681d7e4137175cadcb7c87b4dd52297407c0ccdc2f107fa63c0b2b131e8df0e0a537e7ce38118f4d4d4741b927080d7126b839ccf44d4ae34e37441ef212b36a4a9500804a2b0b48ff7b5181cf7f4106e0c18e5093978748f6d7162c2b3916f9efd03ba5a3eb9abef92b687f57bd651d82f1eaae4b6b0aa3fbbb628cad91a3d8a7f97913801c2aae5c7d2b3440865ff9ce8ae62eabe3e5e7ee1a0c6bd2199a0803d0f9121c4da118511eef6c1261c9cd9f8906149703572fc58e5de90db702820cfc793b69a6a47c54bb49d3cc9c41d5eac5b766fc6a8e17b980991baf4573c381a48ce24238aa329bfa54f3021fb11f2f87b83294c2810e0068549742ad0c34a4c99d968fcd308857f3bb5209796e27f1537d73cead236ae87b5a8d9d76bda75d34d2e44524f2685a75e206b82b37d0b2bc343e0c59b3e1746c8fc26dd39d5b8cc3008910a66a75778f7100fb666c3506186ea6c0e8c3168c5f3699c329a02590b23c292d5b595afad539f6f6ab039183708b217ae1626ca7d6347f26195d556d4e54777af1cb38873212c20acf9588fe99466bae70a7978f2b8a1de6ffe51ffff0d2c8d16c10df13dcb353ceb89ebdc1356d18d8f1fa17878bb74f82db59e20fec65767cb9851fb361d1940032adcb533f8aa94eb4673e2d2de2da727f03fcda1d68af7e2ea01a8cbcf8fd78d64591edf1a54d5e31c236b7980f1752fa44c5faf0ca54607d01cb415e8074bca923a2bd79a0482230a7b134b51e1814a5e5383db927bb8ec398b0e949e79a8d9d5b4f45cd5906a8df0746677c9f010438fdcb1d2ccc132381e006875ee5221771a57974c1f6ef8ccbe5e047131a0592f44fd5528559a5be1d958f92131313ebed9da8e65d8e6c39ac01966525e85884e68ca8c86a3fc332092fafb4e98f5b88348b830da61a48c5c4d41a6fcc5105d4bd39e01efe1a9096b9b8a612e1ad5a9c2805c5e08e40665f58b407b72a09de8ce5b28d8efcdb110372b0f342ef0a0e0de8f9dcd3f99ab1e2875c80db15ed7f25a30b54c5cd530bc67863c3bc59622260d278d186c14c149264168f359928ca1713df4962e603c29bff4a1454a70422781cc8e34e00046158b7acc6599e478d2cbf2c309e37b40aefc6acfc6c7e88ebb5557acffef51f24251ddb5131836496e00060ddf3d1b09c3f5311a341bb70a221b6582c52d65e60d6a58fe16edbf627d023a54942115886bcbc533cd40266237e001b4028cff92852e1877e0beda1b18aa995fadcb841d3902b155c0b482ca084bcb73e64fda84b1de5eba31b43abfd2e258f18470e302aef2f3a4ca9e1cd4d6b41f240f88ca5db795ad04406497b70833c4e95781db76ec1b8b3afdcf020ff8a8f7635fe191e55f265de57ca776f31286a3d662a287115a3aebfe4b3edd8f84eba2c09ee0b38017b6d10f3ef4776482246f178c159891d80a3442a6be8ecf683b5d0a07fd0ffdbb39617d19f0cf787fdd1fed7d0b477811bddd75f272b3247bfd98b807029e102be5605da294f58fa6ab85154ec67a59e52c638680e2981dd6d25924dce981f0ecd0289c93b50d2c29d667b521c1d2bbfddd771d03fef50b2d1f4c663c2e35a7ab6646d88f1f21b7ac9643959f94f8a87eceb9271c7f2872e4ee5f8dac836bfeab398727cd8ab4a31d98187d56b3011ccccfeec72020066c36ed49e04d93dfdbcf6d410815fc4e65f41ba1745c5523263f80eea6258195d675d21e535f20689f11ac24e18d5c549a5e616373f9f3edc505f2115934159d3f765b4ee4a0d457136d978c82fb104f3adb5879b4a08089ccebb331423d59ca11271270bd20602bfe87635aafb5574c778dc35435e9d5ae1034e638a5ac1aa1a056ff7aed2d16a665908785eb27515aa58ebcb2d504dc334a77a211ac2338b72b9cde389d815397b370269556d0136f498f04c6ff534d25abb0d1716de7140724adf654aca53217e83768a9dca6f877c7c72fe24649b77ed49416360da0679ddd0d04333374e1974b0a5c83dc3f42c89672fafc3ecac78d2ff3ec43cb337484e6ce731addaabc991e7715cdf5b4df82836e7141de11632c4b9794a11e484c6e765605cfb3f14be7a8545808df54ff9cae710f21bc1ed34da1a1d2f1f5a610166cd619d559c3c4889fa364ac430d6ec57011df5cc35583d6f606614c471107e515eeea8c893d7ade415298b781a6c500c254fc0bc83efbe7080a129e486ec76745107536b4278bbafd3692dbb54d131db436fac5dd8fa437f0907c75d11a04d0df81217d51b5c85c5af148a150909aad494ffbe5b4b319f56fcdb4694c155ee2d774ec1eceec534ad0e5125e9b5ea68c7701cdd3d1a7fcba39a614deac4f6a2cf3c56fd7f958d7c79aba0463d8a295e7448892298209ff3b7c676dd304bed7609f68dc2fd9185cb86a001c78e7704090bebd26384caf7d6896fbee22d1e4a9eabfa2bad77e0c470ac7a1de6d203d79f41b0c999b5f58f9f466670d7f154e8d72819cd09cde4f7ad1f8db390abf706ac333f4ee872c0cd4e1456f823bcc6313db0c5d6bbf9a67355fa663577962436f6de931906ed8ee50911dd2413eed034cab86a4635f5af8a79b08b43f041b94c351b5a683f920b80540b0ef57ec0fcaea42941f75ef66a1d6b795981cff70e1693fac280ae62dd24f95480e228adeaa6aabd46bb0b91624ef188cc318542e9351c660aad92208a48a737fc71db7faa60056d3667caaf0e84e524ab12bf005fd9a1faba07834ecc59c223f4cdba0971159b17412b13fbae591b2bb930cc4a3282e10ef943fcb73263e08694b818a6ffb87654ea511c2dd7ec755afff95bad9ca6c71b1df94f121257b2baeddd7ec0d87db47011f4fcd1040e034feb2ead9be680713f58c990f6795ccaac5d52ef43e34054181b70fcc21e8a5f3586b2d87e0abf5a7397daf49d10d8370f73b0465b1aeb1d5c3eef1546024d608e565db1093ecaffb2c85d62f6e3e46594cdba624aa3bbb2027cf7bddccf530a4f4258baaf97e905a64637c4944fa88dcce06e4641078d68f2e96b4942398b080e7d0c5b431a3bb3d00c06788f8121be7129f5150c2e60a96e6d5d18d49845f87aa02a2d2f51db3b49dde2c5a3aa5104ef2c736fd0a0ade69a0dd2dc9fab511e71377ee3c4121bea301600875e2d4daf170600c48da020b0595dba30eb7c6611eed8baa1cd916780e771c88f37aca28f0fbb4de320a43f7503711b78e5a08ed15d5a341b08ea37f1fcf9348d1c70f7c5cac5c85ff9885c8968cd1ac6227b45e36aad24e06747ed4c40eb7ef4c6b9f513cef469dff7c9a86a559e4551d4618085b22c59834a32ba2cce25d7a50ad5a193c7ff2e4e06f115f3187fd22b46ee9003f2475d665a514feff151656a7eaa1d676048651581e1d499cb7d02316b08a5a2f30157046b78fe6bfb0bf058d728429de63391fa2b77e4f31d1642fb2819fad14ab51a37cf58647b04d6adef2354ed5106701fea29def6047d403cd92fc015cb5e71fc6a7ee734a8a91bbb34bac3a4", 0xc00, 0x3}], 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="696f636896210de67a5ae527e4ee9b881f95dea6212e6f38383546b3202c6e6e6f5e756c7461696c3d312c5c707072616973655f747970653d696d61736b672c87000000"]) semop(0x0, &(0x7f00000020c0)=[{0x0, 0x3ff}, {0x4, 0x9ec, 0x1800}, {0x3, 0x4, 0x800}, {0x3, 0x1, 0x1000}, {0x3, 0x3, 0x800}, {0x1}, {0x0, 0x2, 0x1800}], 0x7) semtimedop(r1, &(0x7f0000000180), 0x0, &(0x7f00000003c0)={0x77359400}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) (async) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) (async) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) semget(0x2, 0x4, 0x0) (async) semget(0x3, 0x3, 0x0) (async) semget$private(0x0, 0x20000000102, 0x0) (async) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) (async) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) (async) semop(r2, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) (async) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) (async) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) (async) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) (async) semctl$IPC_RMID(r2, 0x0, 0x0) (async) openat(r0, &(0x7f0000000240)='./file0\x00', 0x84842, 0x0) (async) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000440)="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", 0x1000, 0x7}, {&(0x7f0000000300)="33714254210ae81ae7dc420ab575a2", 0xf, 0xc01}, {&(0x7f0000001440)="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", 0xc00, 0x3}], 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="696f636896210de67a5ae527e4ee9b881f95dea6212e6f38383546b3202c6e6e6f5e756c7461696c3d312c5c707072616973655f747970653d696d61736b672c87000000"]) (async) semop(0x0, &(0x7f00000020c0)=[{0x0, 0x3ff}, {0x4, 0x9ec, 0x1800}, {0x3, 0x4, 0x800}, {0x3, 0x1, 0x1000}, {0x3, 0x3, 0x800}, {0x1}, {0x0, 0x2, 0x1800}], 0x7) (async) semtimedop(r1, &(0x7f0000000180), 0x0, &(0x7f00000003c0)={0x77359400}) (async) 17:57:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x4000000, 0x0, 0x0) 17:57:02 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, 0x0, &(0x7f0000000040)) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086}) 17:57:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b0598f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:57:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59ddf70e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1206.162836] FAULT_INJECTION: forcing a failure. [ 1206.162836] name failslab, interval 1, probability 0, space 0, times 0 17:57:02 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, 0x0, &(0x7f0000000040)) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086}) [ 1206.217196] audit: type=1800 audit(1650995822.686:817): pid=22059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=74 res=0 [ 1206.261925] CPU: 1 PID: 22049 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1206.269838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1206.279195] Call Trace: [ 1206.281794] dump_stack+0x1fc/0x2ef [ 1206.285442] should_fail.cold+0xa/0xf [ 1206.289241] ? setup_fault_attr+0x200/0x200 [ 1206.293555] ? lock_acquire+0x170/0x3c0 [ 1206.297528] __should_failslab+0x115/0x180 [ 1206.301759] should_failslab+0x5/0x10 [ 1206.305549] __kmalloc_track_caller+0x2a6/0x3c0 [ 1206.310211] ? strndup_user+0x70/0x120 [ 1206.314087] ? _copy_from_user+0xd2/0x130 [ 1206.318231] memdup_user+0x22/0xb0 [ 1206.321768] strndup_user+0x70/0x120 [ 1206.325479] ksys_mount+0x6f/0x130 [ 1206.329014] __x64_sys_mount+0xba/0x150 [ 1206.332983] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1206.337561] do_syscall_64+0xf9/0x620 [ 1206.341357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1206.346537] RIP: 0033:0x7f350f3a961a [ 1206.350241] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1206.369130] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1206.376829] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1206.384085] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1206.391344] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1206.398615] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 17:57:02 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget(0x2, 0x4, 0x0) r2 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r2, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) semctl$IPC_RMID(r2, 0x0, 0x0) openat(r0, &(0x7f0000000240)='./file0\x00', 0x84842, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000440)="31d4ee8c0598f2153b749ac51cce0774c62cb7ac5996180f906fe8addd19bf2b5e7a5148ae361dbe918223c11ff1353c2bbeeea8434e3282a6e9e56fcf51de252ca08b587162aeb10b65b6d39486d05a623471cb28302d9d4b0d9856ad13fd0d83b93b5488fba2fdf699e7a2bd97bc10fa529d9a19b4a29e7a11d938e964b22366876893310b2764fa835ca2083cb4132ed8dfbd2eed03d8ef3badd1a9ec5f249646fea52b3d6566d1b2a429277c2163b120d8830446deadd86318332cc3c38c81f94f96fcc557f9cec7bf49a72bf3d636331e0970bb5df95b0d016877018932d0a33e469884b5c60a61f496579f025490cd14f73ef89e6b0e512d34cb420472c7934e1e440aa56bf0fd6ee01cffc6c7d17e08233d3e5c3779c84035e72c0e5707b58578c346ba1188e42ea408c90a428491034574233653e64c7c694e63f160dee5e95d1406caf8ff814c5a0706b0e09d0c36ca64babb0cb6e156cbd0af630d61f394d256c3286ff65a10cd3f6c2573922ed8a5bad4c86d3b6656562f58cab4ccd7947efaad8082d033cb45bc6a9d0b33f367dfccc56c8b3413a61647dcee4917eb535760891a34ce803766bd58465785b599243421d34d4f817a215ba066416cd1901adc3642f383d685f29c8167b9e788e9e33053ad7c36d2fce80177a0649d17ebeecee778065e0acad1e602b8cf1ca58a92a5e616e85d672c8fe546c0b415f383e5c5f08fbd9eac8ac873e7f9964a3c392f7c99536ad5afaf5961b90522da57f6d40b3c09613106d715bc39cc107e950613e36c0a12170964dc73f84aa5fed36b681e172afe04457863114f33b1a0817a714d34787d88c4a791c6958de2b58b983c6357d0f78051a77299d7242a39199fed696ed3b9dfdf08eee6fe9884eee37786dcd7925af05f2775476595f573ba7fd8cd2d2f276cb6a29a969a90caabbf4bd8417a7777f1eae63a9c1837507e88b67c878d27664166d7e47aba65c911c10a211fd61ecae6372337b917b06094096baacf7ed4bd045c0f6e574ea4ce41501b1aee57b7a80092750424b58bce3c7cd41adcd1c067410bdb74be45264e161a4ab6d00a4de89a0290530c07aa72d5ed77882ba49d6720b6dfb78c37747b909ad335f4d493213294f95784548f3b56f960668f6836656e336e4f17466c9db3bcdc9e97983315740b9fbb7c764dda7313caaa60bc823950317944a515c1fa44ef9fbe7cf3a0697af7a5c3908d5d5f61bdafd57abf8e4abfc0868e9ea82f2be0be91633423805b9d0e8310b7f0411c16f129ebaa122b78a66cc875d939c574da5c1893de97252ea9b811aaa1477a2dd6e28ab093fd872d5947b6b6ea00259944125b0d40b0fd1ec0523416519f2ef8f8e966c5f6e8445a303c8d539083cc7d37298866575001a5f1cfa2ccd9f55ad8c1a830e8e05be3ecbba6a9bce113ffa2b990d334a3f7068ee8797299cc059dac04af3f7fd7a3579d6a1424ebf372491743660853be6e97203ea6a97c38f4f05b03797e0388a250c9f32e7dfbcf25b82c5342e82e4e086e946f39055552cf1588423e4f8185ae80907ca09b85023c2a62cef6f9909af07a20e6dafaed2b9fac0c377e1e1c57cf5d75182a51077dc0af38b75891ba128420c05197d642c86bb8adc1e7d174cf3f35986401eaf709029640f081594702d51030be1fd0dac50ceb66f554ce66c85715aef35049d7402f2a30b96e1eee0764f4087e00ba4f8e0e2b5fb2e300c57b136addfec8401a14e9241cdc6f70429d894234ba58b2d5b825783f38b601559387786d5b946a396669bf06980d81716357d3d5d6a2e145d518637e2b702c5bc2cb5d48f5bf5dec5432ceae6d0ed05f55f66e3dd48e4cdd03a4d2dd20af10d7d2922c9c7d4e1401cadcc231ac1f946d5b404a505c6832a1b15af4f5a9275cc4000e70b0a04badc39b781e2ca28cf41f8bd3971b920cf3a78cadae004f457e243537579bd7c69186249f1a3ca60bb312f1eaf08f0a1281d55c0dd2063117be212348ea8ff3bfe7ed8934086c6a9d85690d0254aaa303bd676d56dd0a53ba2cba04850f6161386376ef87072f5595134a5969c090a69914da649e8e8bed684499ad96aeb3c9048f59f7be3a0b1e444735e9fc6e07eb81d9f80b56063a0e055b1b55c801e9a183ce8c0f7e9a539c504ae0ecb9b621256c3f0b81e19695e822bd146eea842c1d8d59cb46fab1a891877d4d0cc0e91d9a2ad5af8c832ac798d4d4c7479a519e7a62e1dd60cf220a06a9156828d3381e6c1f1aedf625b584dadc0774c83f2c06f7052514b5b1fdae857d5c00bb079d582912e47ac8382523dbe20bccc3e270012fb7f7e719d5c4f26657993d93cd5796418142ca7b15fb1db6250f3cb541b4e4be870d51fb153a254819460d2991dd59c8f81439bc9ebc4aaab91e0b178d93d1003f88c0a398b9ab014d4bc6aa7ea6f63b5c258f159b933fad73b16b19b7dfd9baf7a1917014d645e37e22571ece56ff4b9f4757c4b06bfbf2f0b816751f94d209d679e2faa296f6bc674c5ef066f9c009725d9498fae48fa86ab713380267aa726f437f3aab114f040711c47862f3022dd7dce8da715a648c924df961769de7e6db44ea98b0a00737081671508acf0bf72d379903d90f5ac008fea8efa14093b2d6598056b52b4d915b4e6acb9b1403a9d84bfa2c192f291e92d81ecb1850921887ff38ac97e79232ac4161c33120448f7c94fa8cecb3e5a1772f6bd0c069d5e455820da63e47a83c4b926b7c0092104cf029bfabef0ae34ca4dd471b99417ea476bbb0b1dbcb5fd79fd8a9deafa926dd3ee6156d529808f1807180fd01197dbccde3492f2fd83a4a6186a2560a47eaec3ccdfd9f421a075da2a0459f085d49bf328cd08bcc1cd6987859c519cac938d6c73de639d7aceab1e82150e300c75bf86de84c1ba02a3a24bbb5117cf8920e438749a81ec937feb749a1be5b2716bc07bc30d4a6147d78a8d3c836f6d07e8869bfd450409feaae0c92236b3a5274718ec5b947189d2dabab0be8eb61a5c365fff2e2da62ed4b0000000040000000319002a391f5dec1c1b09cdfe5dfb536eabdee368bbbd75e7f66067389fc14cf9aa67059f5caaef6ba8eb6df583e08ded6f5fe4278325cc2218444bf5baaa90689167204de70a99d8f60a8a5994fb8f26b9089f083e8d7fea641e26b9c8c4eb0d9ddd52500eb3244ff608abd054e55985afefe975e5f2b4d8f5f5a9d3be40aee0572f98dc813d9676221a3afc9d77d622642d46b496f4716c78fb7847153ac9b13775f87e17ff283ad37fcaecbcf89f603b71dfcfee8afe0d8add626cfc85bd24c05e419b9bcf40f1a7ddaa0bf8db126615b4f13f485120f6f6961ea3d558aa3875ee2a2cef2d700000000f114d233127de3eb595241fc2dd516621e20eec94f35d543711d85733c501b8113e81f4852f5096deb7e034f424d53fd95405b7c9c1cc601d8cf3c5bde96887d77c313cb1fc6c7de0a5ccfd908b7c28d5fcff97f9b91ac4e7f992e5da9537cd2af8bf7bfacaf62616c31f79fd2bc2139c770b19f4b0af28fc19d1ad069315382442ecdac93405571d0b2ed9f18e67790f68dc5b82a7cb0800b3e9ca6d38adaf2c51a3b771b3af69bb839b71dbdb407feebcb6319fb079cfe841d243ba6ed6768606220fcd279515e75f53418fb742da97daccde807b2d09a672c2dc1ea2b3934797cd90f45be89d2e2b8fcd7fb6cbd1d2040c8eafbe694e8209fc1a2e8a8e8c32704071ec3794f9cc9dca69ec1478f36aad415998e0aeacc3875f26b365191cc739b1980d793bd1eec8fe6bc72f499bd406e0f36045ab13a42919280c8ea201b338b11d90406dc9a51196e2609eb28ace9b116883cae8c812522f9fc85b4c2ab79c074bde59b838f28e18679711aa2ec8f04dbbff13db206f3610fb9608258011ea625e88a08f8281b7d747950d037c70c40439d473ab1af6b9b60e359a79c57e83595a48e207bf2f93d9a5ec757ce9a4d6fc3420131acfb7a29e255ad1d5cac983a8355848c908c816df423e1e8d0d204edb1d1d5b04e775e612879175cffeaaecc02654305b068f8c6577b514a85d6705e87c715b7b8179bf59163391c106de7f7bd2b103ebaff3190e6d869785f6c347ab0a3323ad9d67d48ce294cf8443e02795d0b9c4528e7ca2124d343e428b79b3cf6ebcddc77d6d8a984f6d7f0cf397dcd20369860aac52fc7a4a2f0314b0a598916b46163e97f6943f004ce1f441ac0bbe428052099e6d3661f27d19c17e1cc6889c4f2badff5acae55c2c98d9cb5d5af012eb5faaa9d84f7b15206b480ee427a23c205500ad1f757d8530fd84eae8b1f0c62640f18bc0b3674699a1b34fb26e2b430363b6efa8b279b44b2442a7d25442f6ff26392192c72c8b411cf57241d4ad9cf60771c512a9c3d5e54356b1501d29944112b211f294c00405f8fecf57774842de2f386bca6946d2a052b3c4af1abd5a2020b53715053124e17411bfc384a11b932ad3c3f1c56cb8dc6d0e0c0cf5577831c83994fccb160ca9e79a1c2eacf6265be6ddf8f13f7e30efe7d18a134744c3caa56af5a8ed4808063950eef7945b81c1c2c48ca64f0698d4bd9f4730e61a8d92eb000b25b0fe2b14c5d56eeeed6547333f0ecd25bc6d2567863688b7ce6e86057b0d8cb85936ac8b7634adc24e4e552886635ed2f1677793c26d0b379535428c8e1ea5bea667ee23e38843860a1a84911f0903edf0532fa1d5dc6aebc9b9f99ccb9ca96dc12a10d5f5431ba82010420ada46a867b3c2b293769d176cb433263d7599f37cf9e168d2e8cfc7756446fe17ec2da89ba892f59e7fce6d52b0d19124d5de680f941f33582d3c68abab4eed6d3af06ce9a32a8c06c74edb437bca09646c23abdac117aad7696a3e5ae81274d336bfaf8b0f52a78269d64508eec35a66a6fd5d8566a723459835488ffbb3c61f3626d4b4f2038ba9d7403f5e73770c95ad72c7a5b4bc8d305aa4529edbf05da1407877dfb2a382fa9909c58684ce1f1b85bd7b6f38099163ba11a03c772d1b53dcf86b074098942b8869cc7aa441b7db3322c64b4d3b968aa8831293d9007b58bb161539fda6b4c02835245f345c9ad6aaad763a4fe2c0496353e931646609254abaf764432d56b9afb090669cf2fb91b5842ee7d2c8e32ddb75713f0ee0537b4e22b978fa8f126667d3b879763a7d4f0977ee6bf2ff3ca751cf80cb8df3e4f4dbb5872a89585a579ac50eccee924e03a66c9324063e7b990c4990bfe108c010d6214645ae96fcfe2e1aca5b748c53879558b2444b0358a071293dcc41319179af12b7b6dc494786095cd4534d55d3f6c46d4be9e626f4ffbb9703b40f8f0a276961748d127d88ea3e66b157f6543215dad56542f5cf5d7a94b538628cbb1a05e98ebeaaed68f979353434f7813ae7c0ced291584f48aecd8c676150d626137aafbfd90541d6104419ffb408be56936668b64bc63828cb7aa5872411b48b8fd9d567d32297755a567fec0bb79ffa7b8422c763509affa8ccee5d82eeb4e22b72050457105f5a5cb59ae6bd1674516ce199f3e15fe0d8a305eebb59b283facb8c580d55decf22911283bcbb4a857790a08185235844aa2e4f9ab66d3edd20ad185a4ed446f6c8c1e23613a644e3074645bad9ae30271779e5bde5802ea272944fb54de45ae730a1d86eee8bee9dd256775807125bd60f9164b261f88f923ac31ef72156ef14722dbc4e96da7f8e18f3665b054c3594bd44f2547cc1996a6b3778d58a506495ad51b750d", 0x1000, 0x7}, {&(0x7f0000000300)="33714254210ae81ae7dc420ab575a2", 0xf, 0xc01}, {&(0x7f0000001440)="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", 0xc00, 0x3}], 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="696f636896210de67a5ae527e4ee9b881f95dea6212e6f38383546b3202c6e6e6f5e756c7461696c3d312c5c707072616973655f747970653d696d61736b672c87000000"]) semop(0x0, &(0x7f00000020c0)=[{0x0, 0x3ff}, {0x4, 0x9ec, 0x1800}, {0x3, 0x4, 0x800}, {0x3, 0x1, 0x1000}, {0x3, 0x3, 0x800}, {0x1}, {0x0, 0x2, 0x1800}], 0x7) semtimedop(r1, &(0x7f0000000180), 0x0, &(0x7f00000003c0)={0x77359400}) [ 1206.405880] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 42) 17:57:03 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:57:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816106a48f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:57:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:03 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x5000000, 0x0, 0x0) 17:57:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816106b48f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1206.696359] audit: type=1800 audit(1650995823.167:818): pid=22100 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=75 res=0 [ 1206.729380] FAULT_INJECTION: forcing a failure. [ 1206.729380] name failslab, interval 1, probability 0, space 0, times 0 [ 1206.751014] CPU: 0 PID: 22108 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1206.758916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1206.768276] Call Trace: [ 1206.770881] dump_stack+0x1fc/0x2ef [ 1206.774534] should_fail.cold+0xa/0xf [ 1206.778353] ? setup_fault_attr+0x200/0x200 [ 1206.782687] ? lock_acquire+0x170/0x3c0 [ 1206.786680] __should_failslab+0x115/0x180 [ 1206.790929] should_failslab+0x5/0x10 [ 1206.794734] kmem_cache_alloc+0x277/0x370 [ 1206.798896] alloc_vfsmnt+0x23/0x780 [ 1206.802620] ? _raw_read_unlock+0x29/0x40 [ 1206.806778] vfs_kern_mount.part.0+0x27/0x470 [ 1206.811275] do_mount+0x115c/0x2f50 [ 1206.814888] ? cmp_ex_sort+0xc0/0xc0 [ 1206.818584] ? __do_page_fault+0x180/0xd60 [ 1206.822800] ? copy_mount_string+0x40/0x40 [ 1206.827023] ? memset+0x20/0x40 [ 1206.830288] ? copy_mount_options+0x26f/0x380 [ 1206.834767] ksys_mount+0xcf/0x130 [ 1206.838294] __x64_sys_mount+0xba/0x150 [ 1206.842263] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1206.846949] do_syscall_64+0xf9/0x620 [ 1206.850743] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1206.855913] RIP: 0033:0x7f350f3a961a [ 1206.859605] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1206.878499] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1206.886200] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1206.893460] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 17:57:03 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:57:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget(0x2, 0x4, 0x0) r2 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r2, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) semctl$IPC_RMID(r2, 0x0, 0x0) openat(r0, &(0x7f0000000240)='./file0\x00', 0x84842, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000440)="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", 0x1000, 0x7}, {&(0x7f0000000300)="33714254210ae81ae7dc420ab575a2", 0xf, 0xc01}, {&(0x7f0000001440)="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", 0xc00, 0x3}], 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="696f636896210de67a5ae527e4ee9b881f95dea6212e6f38383546b3202c6e6e6f5e756c7461696c3d312c5c707072616973655f747970653d696d61736b672c87000000"]) semop(0x0, &(0x7f00000020c0)=[{0x0, 0x3ff}, {0x4, 0x9ec, 0x1800}, {0x3, 0x4, 0x800}, {0x3, 0x1, 0x1000}, {0x3, 0x3, 0x800}, {0x1}, {0x0, 0x2, 0x1800}], 0x7) semtimedop(r1, &(0x7f0000000180), 0x0, &(0x7f00000003c0)={0x77359400}) 17:57:03 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x6000000, 0x0, 0x0) [ 1206.900727] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1206.907998] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1206.915256] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 43) 17:57:03 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r3}) 17:57:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:03 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x7000000, 0x0, 0x0) 17:57:03 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r2}) 17:57:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816106c48f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 1207.172631] FAULT_INJECTION: forcing a failure. [ 1207.172631] name failslab, interval 1, probability 0, space 0, times 0 [ 1207.207482] audit: type=1800 audit(1650995823.677:819): pid=22132 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=76 res=0 [ 1207.223679] CPU: 0 PID: 22130 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1207.234896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1207.244253] Call Trace: [ 1207.246852] dump_stack+0x1fc/0x2ef [ 1207.250490] should_fail.cold+0xa/0xf [ 1207.254286] ? setup_fault_attr+0x200/0x200 [ 1207.258605] ? __should_failslab+0x81/0x180 [ 1207.262926] __should_failslab+0x115/0x180 [ 1207.267157] should_failslab+0x5/0x10 [ 1207.270953] kmem_cache_alloc_trace+0x284/0x380 [ 1207.275614] ? _copy_from_user+0xd2/0x130 [ 1207.279756] copy_mount_options+0x59/0x380 [ 1207.283987] ksys_mount+0x9b/0x130 [ 1207.287524] __x64_sys_mount+0xba/0x150 [ 1207.291492] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1207.296066] do_syscall_64+0xf9/0x620 [ 1207.299863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1207.305042] RIP: 0033:0x7f350f3a961a 17:57:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget(0x2, 0x4, 0x0) r2 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r2, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) semctl$IPC_RMID(r2, 0x0, 0x0) openat(r0, &(0x7f0000000240)='./file0\x00', 0x84842, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000440)="31d4ee8c0598f2153b749ac51cce0774c62cb7ac5996180f906fe8addd19bf2b5e7a5148ae361dbe918223c11ff1353c2bbeeea8434e3282a6e9e56fcf51de252ca08b587162aeb10b65b6d39486d05a623471cb28302d9d4b0d9856ad13fd0d83b93b5488fba2fdf699e7a2bd97bc10fa529d9a19b4a29e7a11d938e964b22366876893310b2764fa835ca2083cb4132ed8dfbd2eed03d8ef3badd1a9ec5f249646fea52b3d6566d1b2a429277c2163b120d8830446deadd86318332cc3c38c81f94f96fcc557f9cec7bf49a72bf3d636331e0970bb5df95b0d016877018932d0a33e469884b5c60a61f496579f025490cd14f73ef89e6b0e512d34cb420472c7934e1e440aa56bf0fd6ee01cffc6c7d17e08233d3e5c3779c84035e72c0e5707b58578c346ba1188e42ea408c90a428491034574233653e64c7c694e63f160dee5e95d1406caf8ff814c5a0706b0e09d0c36ca64babb0cb6e156cbd0af630d61f394d256c3286ff65a10cd3f6c2573922ed8a5bad4c86d3b6656562f58cab4ccd7947efaad8082d033cb45bc6a9d0b33f367dfccc56c8b3413a61647dcee4917eb535760891a34ce803766bd58465785b599243421d34d4f817a215ba066416cd1901adc3642f383d685f29c8167b9e788e9e33053ad7c36d2fce80177a0649d17ebeecee778065e0acad1e602b8cf1ca58a92a5e616e85d672c8fe546c0b415f383e5c5f08fbd9eac8ac873e7f9964a3c392f7c99536ad5afaf5961b90522da57f6d40b3c09613106d715bc39cc107e950613e36c0a12170964dc73f84aa5fed36b681e172afe04457863114f33b1a0817a714d34787d88c4a791c6958de2b58b983c6357d0f78051a77299d7242a39199fed696ed3b9dfdf08eee6fe9884eee37786dcd7925af05f2775476595f573ba7fd8cd2d2f276cb6a29a969a90caabbf4bd8417a7777f1eae63a9c1837507e88b67c878d27664166d7e47aba65c911c10a211fd61ecae6372337b917b06094096baacf7ed4bd045c0f6e574ea4ce41501b1aee57b7a80092750424b58bce3c7cd41adcd1c067410bdb74be45264e161a4ab6d00a4de89a0290530c07aa72d5ed77882ba49d6720b6dfb78c37747b909ad335f4d493213294f95784548f3b56f960668f6836656e336e4f17466c9db3bcdc9e97983315740b9fbb7c764dda7313caaa60bc823950317944a515c1fa44ef9fbe7cf3a0697af7a5c3908d5d5f61bdafd57abf8e4abfc0868e9ea82f2be0be91633423805b9d0e8310b7f0411c16f129ebaa122b78a66cc875d939c574da5c1893de97252ea9b811aaa1477a2dd6e28ab093fd872d5947b6b6ea00259944125b0d40b0fd1ec0523416519f2ef8f8e966c5f6e8445a303c8d539083cc7d37298866575001a5f1cfa2ccd9f55ad8c1a830e8e05be3ecbba6a9bce113ffa2b990d334a3f7068ee8797299cc059dac04af3f7fd7a3579d6a1424ebf372491743660853be6e97203ea6a97c38f4f05b03797e0388a250c9f32e7dfbcf25b82c5342e82e4e086e946f39055552cf1588423e4f8185ae80907ca09b85023c2a62cef6f9909af07a20e6dafaed2b9fac0c377e1e1c57cf5d75182a51077dc0af38b75891ba128420c05197d642c86bb8adc1e7d174cf3f35986401eaf709029640f081594702d51030be1fd0dac50ceb66f554ce66c85715aef35049d7402f2a30b96e1eee0764f4087e00ba4f8e0e2b5fb2e300c57b136addfec8401a14e9241cdc6f70429d894234ba58b2d5b825783f38b601559387786d5b946a396669bf06980d81716357d3d5d6a2e145d518637e2b702c5bc2cb5d48f5bf5dec5432ceae6d0ed05f55f66e3dd48e4cdd03a4d2dd20af10d7d2922c9c7d4e1401cadcc231ac1f946d5b404a505c6832a1b15af4f5a9275cc4000e70b0a04badc39b781e2ca28cf41f8bd3971b920cf3a78cadae004f457e243537579bd7c69186249f1a3ca60bb312f1eaf08f0a1281d55c0dd2063117be212348ea8ff3bfe7ed8934086c6a9d85690d0254aaa303bd676d56dd0a53ba2cba04850f6161386376ef87072f5595134a5969c090a69914da649e8e8bed684499ad96aeb3c9048f59f7be3a0b1e444735e9fc6e07eb81d9f80b56063a0e055b1b55c801e9a183ce8c0f7e9a539c504ae0ecb9b621256c3f0b81e19695e822bd146eea842c1d8d59cb46fab1a891877d4d0cc0e91d9a2ad5af8c832ac798d4d4c7479a519e7a62e1dd60cf220a06a9156828d3381e6c1f1aedf625b584dadc0774c83f2c06f7052514b5b1fdae857d5c00bb079d582912e47ac8382523dbe20bccc3e270012fb7f7e719d5c4f26657993d93cd5796418142ca7b15fb1db6250f3cb541b4e4be870d51fb153a254819460d2991dd59c8f81439bc9ebc4aaab91e0b178d93d1003f88c0a398b9ab014d4bc6aa7ea6f63b5c258f159b933fad73b16b19b7dfd9baf7a1917014d645e37e22571ece56ff4b9f4757c4b06bfbf2f0b816751f94d209d679e2faa296f6bc674c5ef066f9c009725d9498fae48fa86ab713380267aa726f437f3aab114f040711c47862f3022dd7dce8da715a648c924df961769de7e6db44ea98b0a00737081671508acf0bf72d379903d90f5ac008fea8efa14093b2d6598056b52b4d915b4e6acb9b1403a9d84bfa2c192f291e92d81ecb1850921887ff38ac97e79232ac4161c33120448f7c94fa8cecb3e5a1772f6bd0c069d5e455820da63e47a83c4b926b7c0092104cf029bfabef0ae34ca4dd471b99417ea476bbb0b1dbcb5fd79fd8a9deafa926dd3ee6156d529808f1807180fd01197dbccde3492f2fd83a4a6186a2560a47eaec3ccdfd9f421a075da2a0459f085d49bf328cd08bcc1cd6987859c519cac938d6c73de639d7aceab1e82150e300c75bf86de84c1ba02a3a24bbb5117cf8920e438749a81ec937feb749a1be5b2716bc07bc30d4a6147d78a8d3c836f6d07e8869bfd450409feaae0c92236b3a5274718ec5b947189d2dabab0be8eb61a5c365fff2e2da62ed4b0000000040000000319002a391f5dec1c1b09cdfe5dfb536eabdee368bbbd75e7f66067389fc14cf9aa67059f5caaef6ba8eb6df583e08ded6f5fe4278325cc2218444bf5baaa90689167204de70a99d8f60a8a5994fb8f26b9089f083e8d7fea641e26b9c8c4eb0d9ddd52500eb3244ff608abd054e55985afefe975e5f2b4d8f5f5a9d3be40aee0572f98dc813d9676221a3afc9d77d622642d46b496f4716c78fb7847153ac9b13775f87e17ff283ad37fcaecbcf89f603b71dfcfee8afe0d8add626cfc85bd24c05e419b9bcf40f1a7ddaa0bf8db126615b4f13f485120f6f6961ea3d558aa3875ee2a2cef2d700000000f114d233127de3eb595241fc2dd516621e20eec94f35d543711d85733c501b8113e81f4852f5096deb7e034f424d53fd95405b7c9c1cc601d8cf3c5bde96887d77c313cb1fc6c7de0a5ccfd908b7c28d5fcff97f9b91ac4e7f992e5da9537cd2af8bf7bfacaf62616c31f79fd2bc2139c770b19f4b0af28fc19d1ad069315382442ecdac93405571d0b2ed9f18e67790f68dc5b82a7cb0800b3e9ca6d38adaf2c51a3b771b3af69bb839b71dbdb407feebcb6319fb079cfe841d243ba6ed6768606220fcd279515e75f53418fb742da97daccde807b2d09a672c2dc1ea2b3934797cd90f45be89d2e2b8fcd7fb6cbd1d2040c8eafbe694e8209fc1a2e8a8e8c32704071ec3794f9cc9dca69ec1478f36aad415998e0aeacc3875f26b365191cc739b1980d793bd1eec8fe6bc72f499bd406e0f36045ab13a42919280c8ea201b338b11d90406dc9a51196e2609eb28ace9b116883cae8c812522f9fc85b4c2ab79c074bde59b838f28e18679711aa2ec8f04dbbff13db206f3610fb9608258011ea625e88a08f8281b7d747950d037c70c40439d473ab1af6b9b60e359a79c57e83595a48e207bf2f93d9a5ec757ce9a4d6fc3420131acfb7a29e255ad1d5cac983a8355848c908c816df423e1e8d0d204edb1d1d5b04e775e612879175cffeaaecc02654305b068f8c6577b514a85d6705e87c715b7b8179bf59163391c106de7f7bd2b103ebaff3190e6d869785f6c347ab0a3323ad9d67d48ce294cf8443e02795d0b9c4528e7ca2124d343e428b79b3cf6ebcddc77d6d8a984f6d7f0cf397dcd20369860aac52fc7a4a2f0314b0a598916b46163e97f6943f004ce1f441ac0bbe428052099e6d3661f27d19c17e1cc6889c4f2badff5acae55c2c98d9cb5d5af012eb5faaa9d84f7b15206b480ee427a23c205500ad1f757d8530fd84eae8b1f0c62640f18bc0b3674699a1b34fb26e2b430363b6efa8b279b44b2442a7d25442f6ff26392192c72c8b411cf57241d4ad9cf60771c512a9c3d5e54356b1501d29944112b211f294c00405f8fecf57774842de2f386bca6946d2a052b3c4af1abd5a2020b53715053124e17411bfc384a11b932ad3c3f1c56cb8dc6d0e0c0cf5577831c83994fccb160ca9e79a1c2eacf6265be6ddf8f13f7e30efe7d18a134744c3caa56af5a8ed4808063950eef7945b81c1c2c48ca64f0698d4bd9f4730e61a8d92eb000b25b0fe2b14c5d56eeeed6547333f0ecd25bc6d2567863688b7ce6e86057b0d8cb85936ac8b7634adc24e4e552886635ed2f1677793c26d0b379535428c8e1ea5bea667ee23e38843860a1a84911f0903edf0532fa1d5dc6aebc9b9f99ccb9ca96dc12a10d5f5431ba82010420ada46a867b3c2b293769d176cb433263d7599f37cf9e168d2e8cfc7756446fe17ec2da89ba892f59e7fce6d52b0d19124d5de680f941f33582d3c68abab4eed6d3af06ce9a32a8c06c74edb437bca09646c23abdac117aad7696a3e5ae81274d336bfaf8b0f52a78269d64508eec35a66a6fd5d8566a723459835488ffbb3c61f3626d4b4f2038ba9d7403f5e73770c95ad72c7a5b4bc8d305aa4529edbf05da1407877dfb2a382fa9909c58684ce1f1b85bd7b6f38099163ba11a03c772d1b53dcf86b074098942b8869cc7aa441b7db3322c64b4d3b968aa8831293d9007b58bb161539fda6b4c02835245f345c9ad6aaad763a4fe2c0496353e931646609254abaf764432d56b9afb090669cf2fb91b5842ee7d2c8e32ddb75713f0ee0537b4e22b978fa8f126667d3b879763a7d4f0977ee6bf2ff3ca751cf80cb8df3e4f4dbb5872a89585a579ac50eccee924e03a66c9324063e7b990c4990bfe108c010d6214645ae96fcfe2e1aca5b748c53879558b2444b0358a071293dcc41319179af12b7b6dc494786095cd4534d55d3f6c46d4be9e626f4ffbb9703b40f8f0a276961748d127d88ea3e66b157f6543215dad56542f5cf5d7a94b538628cbb1a05e98ebeaaed68f979353434f7813ae7c0ced291584f48aecd8c676150d626137aafbfd90541d6104419ffb408be56936668b64bc63828cb7aa5872411b48b8fd9d567d32297755a567fec0bb79ffa7b8422c763509affa8ccee5d82eeb4e22b72050457105f5a5cb59ae6bd1674516ce199f3e15fe0d8a305eebb59b283facb8c580d55decf22911283bcbb4a857790a08185235844aa2e4f9ab66d3edd20ad185a4ed446f6c8c1e23613a644e3074645bad9ae30271779e5bde5802ea272944fb54de45ae730a1d86eee8bee9dd256775807125bd60f9164b261f88f923ac31ef72156ef14722dbc4e96da7f8e18f3665b054c3594bd44f2547cc1996a6b3778d58a506495ad51b750d", 0x1000, 0x7}, {&(0x7f0000000300)="33714254210ae81ae7dc420ab575a2", 0xf, 0xc01}, {&(0x7f0000001440)="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", 0xc00, 0x3}], 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="696f636896210de67a5ae527e4ee9b881f95dea6212e6f38383546b3202c6e6e6f5e756c7461696c3d312c5c707072616973655f747970653d696d61736b672c87000000"]) semop(0x0, &(0x7f00000020c0)=[{0x0, 0x3ff}, {0x4, 0x9ec, 0x1800}, {0x3, 0x4, 0x800}, {0x3, 0x1, 0x1000}, {0x3, 0x3, 0x800}, {0x1}, {0x0, 0x2, 0x1800}], 0x7) semtimedop(r1, &(0x7f0000000180), 0x0, &(0x7f00000003c0)={0x77359400}) [ 1207.308747] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1207.327640] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1207.335339] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1207.342598] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1207.349874] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1207.357163] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1207.364438] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:03 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x8000000, 0x0, 0x0) 17:57:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 44) 17:57:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816106d48f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:57:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:03 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r2}) 17:57:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816106e48f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:57:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e05e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:04 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r2}) [ 1207.630745] FAULT_INJECTION: forcing a failure. [ 1207.630745] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1207.642742] CPU: 0 PID: 22162 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1207.650624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1207.659980] Call Trace: [ 1207.662583] dump_stack+0x1fc/0x2ef [ 1207.666226] should_fail.cold+0xa/0xf [ 1207.670040] ? perf_trace_lock_acquire+0x530/0x530 [ 1207.674983] ? setup_fault_attr+0x200/0x200 [ 1207.679326] ? perf_trace_lock_acquire+0x530/0x530 [ 1207.684268] __alloc_pages_nodemask+0x239/0x2890 [ 1207.689038] ? cmp_ex_search+0x87/0xb0 [ 1207.692940] ? __lock_acquire+0x6de/0x3ff0 [ 1207.697188] ? copy_mount_options+0x1e9/0x380 [ 1207.701691] ? perf_trace_lock+0xe2/0x4b0 [ 1207.705850] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1207.710701] ? ex_handler_default+0x14/0x90 [ 1207.715026] ? check_preemption_disabled+0x41/0x280 [ 1207.720050] ? perf_trace_lock+0xe2/0x4b0 [ 1207.724204] ? no_context+0xce/0x940 [ 1207.727930] ? perf_trace_lock_acquire+0x530/0x530 [ 1207.732870] ? bad_area_access_error+0x23b/0x4a0 [ 1207.737642] cache_grow_begin+0xa4/0x8a0 [ 1207.740960] audit: type=1800 audit(1650995824.207:820): pid=22160 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=77 res=0 [ 1207.741709] ? setup_fault_attr+0x200/0x200 [ 1207.765523] ? lock_acquire+0x170/0x3c0 [ 1207.769521] cache_alloc_refill+0x273/0x340 [ 1207.773858] kmem_cache_alloc+0x346/0x370 [ 1207.778030] getname_flags+0xce/0x590 [ 1207.781847] user_path_at_empty+0x2a/0x50 [ 1207.786007] do_mount+0x147/0x2f50 [ 1207.789561] ? cmp_ex_sort+0xc0/0xc0 [ 1207.793287] ? __do_page_fault+0x180/0xd60 [ 1207.797536] ? copy_mount_string+0x40/0x40 [ 1207.801789] ? memset+0x20/0x40 [ 1207.805087] ? copy_mount_options+0x26f/0x380 [ 1207.809698] ksys_mount+0xcf/0x130 [ 1207.813252] __x64_sys_mount+0xba/0x150 [ 1207.817237] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1207.822265] do_syscall_64+0xf9/0x620 [ 1207.826080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1207.831272] RIP: 0033:0x7f350f3a961a [ 1207.835003] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1207.853899] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1207.861620] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1207.868881] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 17:57:04 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0xe000000, 0x0, 0x0) [ 1207.876142] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1207.883400] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1207.890661] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:04 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 17:57:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) r1 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r1, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) semctl$IPC_RMID(r1, 0x0, 0x0) openat(r0, &(0x7f0000000240)='./file0\x00', 0x84842, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000440)="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", 0x1000, 0x7}, {&(0x7f0000000300)="33714254210ae81ae7dc420ab575a2", 0xf, 0xc01}, {&(0x7f0000001440)="dbbc5d4d7e2bbb0fd67659db1df066af87c8e90090bf7e3ded095fe79cb1364846b0da8efd3a7158750d70b2c28d90478202872e4bb5e588c9ddea3f93f2b3136bad827306ccd5ea4cb4f945be5d50548ad8a8626ffaa1807af3ddf0695a8cb3b130a8e1f2ec17639ce37a5c19f6c04667cfe2fb08eacdb5b88e976859b53de003b2cfa31c8c2529c7936a70fd9e6ad67a752b52546829468644298bf497dd1b9666f06692fb19db7a3a9e75a13e7f397efaa09e282c7322cdf31aba420673c39c12ee711d04e698b8a555d1d801b29f5df46bb884e39c997a15aeadc91ab730d2ec83625cde2ccc187de9b77ee5dc2e08ea60f58d750c0d3bafde06e9996b7de82c111768f4e1e9b338d7dba40caae0d117fd563d21a251261f4780b4ac944d1a9c484f44b21d2b944139bcdc735a819ccdd9a63f9d980a445fbb47415920e38ad17a9bdcc7c2d2b2de62dfc97fca7a8981bae5d43e76d1e8dd0917a7c29fef4fcb638dcba5602de43756607d2104e425f24cf19aef8a6de1ce0df1b1bf5ebf062248e1a2c02dfa2ced984663e68423b8329d1ec5d4ac766e39985f15c9f718414cdc70682281c8849c43371625f5c8d0328e2f124bc099b1d827909fb266bb0433a3f81832358b750378645d27ff1e296f00c17bee898b85fc14c25ef72414dac1429b2de83e49335d18202567769689d5d7ab8ba0da81ab5d2b5dc19b6bca16c7d43d1bf5eb8c7f606c3fffffe5919d702534c39ae354fe222a1efe80d1934d790fdfe5748653a5ea79935503d2dc193433ee03bb3f76d19b8a9491f8e8681d7e4137175cadcb7c87b4dd52297407c0ccdc2f107fa63c0b2b131e8df0e0a537e7ce38118f4d4d4741b927080d7126b839ccf44d4ae34e37441ef212b36a4a9500804a2b0b48ff7b5181cf7f4106e0c18e5093978748f6d7162c2b3916f9efd03ba5a3eb9abef92b687f57bd651d82f1eaae4b6b0aa3fbbb628cad91a3d8a7f97913801c2aae5c7d2b3440865ff9ce8ae62eabe3e5e7ee1a0c6bd2199a0803d0f9121c4da118511eef6c1261c9cd9f8906149703572fc58e5de90db702820cfc793b69a6a47c54bb49d3cc9c41d5eac5b766fc6a8e17b980991baf4573c381a48ce24238aa329bfa54f3021fb11f2f87b83294c2810e0068549742ad0c34a4c99d968fcd308857f3bb5209796e27f1537d73cead236ae87b5a8d9d76bda75d34d2e44524f2685a75e206b82b37d0b2bc343e0c59b3e1746c8fc26dd39d5b8cc3008910a66a75778f7100fb666c3506186ea6c0e8c3168c5f3699c329a02590b23c292d5b595afad539f6f6ab039183708b217ae1626ca7d6347f26195d556d4e54777af1cb38873212c20acf9588fe99466bae70a7978f2b8a1de6ffe51ffff0d2c8d16c10df13dcb353ceb89ebdc1356d18d8f1fa17878bb74f82db59e20fec65767cb9851fb361d1940032adcb533f8aa94eb4673e2d2de2da727f03fcda1d68af7e2ea01a8cbcf8fd78d64591edf1a54d5e31c236b7980f1752fa44c5faf0ca54607d01cb415e8074bca923a2bd79a0482230a7b134b51e1814a5e5383db927bb8ec398b0e949e79a8d9d5b4f45cd5906a8df0746677c9f010438fdcb1d2ccc132381e006875ee5221771a57974c1f6ef8ccbe5e047131a0592f44fd5528559a5be1d958f92131313ebed9da8e65d8e6c39ac01966525e85884e68ca8c86a3fc332092fafb4e98f5b88348b830da61a48c5c4d41a6fcc5105d4bd39e01efe1a9096b9b8a612e1ad5a9c2805c5e08e40665f58b407b72a09de8ce5b28d8efcdb110372b0f342ef0a0e0de8f9dcd3f99ab1e2875c80db15ed7f25a30b54c5cd530bc67863c3bc59622260d278d186c14c149264168f359928ca1713df4962e603c29bff4a1454a70422781cc8e34e00046158b7acc6599e478d2cbf2c309e37b40aefc6acfc6c7e88ebb5557acffef51f24251ddb5131836496e00060ddf3d1b09c3f5311a341bb70a221b6582c52d65e60d6a58fe16edbf627d023a54942115886bcbc533cd40266237e001b4028cff92852e1877e0beda1b18aa995fadcb841d3902b155c0b482ca084bcb73e64fda84b1de5eba31b43abfd2e258f18470e302aef2f3a4ca9e1cd4d6b41f240f88ca5db795ad04406497b70833c4e95781db76ec1b8b3afdcf020ff8a8f7635fe191e55f265de57ca776f31286a3d662a287115a3aebfe4b3edd8f84eba2c09ee0b38017b6d10f3ef4776482246f178c159891d80a3442a6be8ecf683b5d0a07fd0ffdbb39617d19f0cf787fdd1fed7d0b477811bddd75f272b3247bfd98b807029e102be5605da294f58fa6ab85154ec67a59e52c638680e2981dd6d25924dce981f0ecd0289c93b50d2c29d667b521c1d2bbfddd771d03fef50b2d1f4c663c2e35a7ab6646d88f1f21b7ac9643959f94f8a87eceb9271c7f2872e4ee5f8dac836bfeab398727cd8ab4a31d98187d56b3011ccccfeec72020066c36ed49e04d93dfdbcf6d410815fc4e65f41ba1745c5523263f80eea6258195d675d21e535f20689f11ac24e18d5c549a5e616373f9f3edc505f2115934159d3f765b4ee4a0d457136d978c82fb104f3adb5879b4a08089ccebb331423d59ca11271270bd20602bfe87635aafb5574c778dc35435e9d5ae1034e638a5ac1aa1a056ff7aed2d16a665908785eb27515aa58ebcb2d504dc334a77a211ac2338b72b9cde389d815397b370269556d0136f498f04c6ff534d25abb0d1716de7140724adf654aca53217e83768a9dca6f877c7c72fe24649b77ed49416360da0679ddd0d04333374e1974b0a5c83dc3f42c89672fafc3ecac78d2ff3ec43cb337484e6ce731addaabc991e7715cdf5b4df82836e7141de11632c4b9794a11e484c6e765605cfb3f14be7a8545808df54ff9cae710f21bc1ed34da1a1d2f1f5a610166cd619d559c3c4889fa364ac430d6ec57011df5cc35583d6f606614c471107e515eeea8c893d7ade415298b781a6c500c254fc0bc83efbe7080a129e486ec76745107536b4278bbafd3692dbb54d131db436fac5dd8fa437f0907c75d11a04d0df81217d51b5c85c5af148a150909aad494ffbe5b4b319f56fcdb4694c155ee2d774ec1eceec534ad0e5125e9b5ea68c7701cdd3d1a7fcba39a614deac4f6a2cf3c56fd7f958d7c79aba0463d8a295e7448892298209ff3b7c676dd304bed7609f68dc2fd9185cb86a001c78e7704090bebd26384caf7d6896fbee22d1e4a9eabfa2bad77e0c470ac7a1de6d203d79f41b0c999b5f58f9f466670d7f154e8d72819cd09cde4f7ad1f8db390abf706ac333f4ee872c0cd4e1456f823bcc6313db0c5d6bbf9a67355fa663577962436f6de931906ed8ee50911dd2413eed034cab86a4635f5af8a79b08b43f041b94c351b5a683f920b80540b0ef57ec0fcaea42941f75ef66a1d6b795981cff70e1693fac280ae62dd24f95480e228adeaa6aabd46bb0b91624ef188cc318542e9351c660aad92208a48a737fc71db7faa60056d3667caaf0e84e524ab12bf005fd9a1faba07834ecc59c223f4cdba0971159b17412b13fbae591b2bb930cc4a3282e10ef943fcb73263e08694b818a6ffb87654ea511c2dd7ec755afff95bad9ca6c71b1df94f121257b2baeddd7ec0d87db47011f4fcd1040e034feb2ead9be680713f58c990f6795ccaac5d52ef43e34054181b70fcc21e8a5f3586b2d87e0abf5a7397daf49d10d8370f73b0465b1aeb1d5c3eef1546024d608e565db1093ecaffb2c85d62f6e3e46594cdba624aa3bbb2027cf7bddccf530a4f4258baaf97e905a64637c4944fa88dcce06e4641078d68f2e96b4942398b080e7d0c5b431a3bb3d00c06788f8121be7129f5150c2e60a96e6d5d18d49845f87aa02a2d2f51db3b49dde2c5a3aa5104ef2c736fd0a0ade69a0dd2dc9fab511e71377ee3c4121bea301600875e2d4daf170600c48da020b0595dba30eb7c6611eed8baa1cd916780e771c88f37aca28f0fbb4de320a43f7503711b78e5a08ed15d5a341b08ea37f1fcf9348d1c70f7c5cac5c85ff9885c8968cd1ac6227b45e36aad24e06747ed4c40eb7ef4c6b9f513cef469dff7c9a86a559e4551d4618085b22c59834a32ba2cce25d7a50ad5a193c7ff2e4e06f115f3187fd22b46ee9003f2475d665a514feff151656a7eaa1d676048651581e1d499cb7d02316b08a5a2f30157046b78fe6bfb0bf058d728429de63391fa2b77e4f31d1642fb2819fad14ab51a37cf58647b04d6adef2354ed5106701fea29def6047d403cd92fc015cb5e71fc6a7ee734a8a91bbb34bac3a4", 0xc00, 0x3}], 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="696f636896210de67a5ae527e4ee9b881f95dea6212e6f38383546b3202c6e6e6f5e756c7461696c3d312c5c707072616973655f747970653d696d61736b672c87000000"]) semop(0x0, &(0x7f00000020c0)=[{0x0, 0x3ff}, {0x4, 0x9ec, 0x1800}, {0x3, 0x4, 0x800}, {0x3, 0x1, 0x1000}, {0x3, 0x3, 0x800}, {0x1}, {0x0, 0x2, 0x1800}], 0x7) 17:57:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816106f48f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 17:57:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 45) 17:57:04 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x10000000, 0x0, 0x0) 17:57:04 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 17:57:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0x9, 0x0, 0x0, 0x0) 17:57:04 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x14280000, 0x0, 0x0) 17:57:04 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 17:57:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xa, 0x0, 0x0, 0x0) 17:57:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) r1 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r1, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) semctl$IPC_RMID(r1, 0x0, 0x0) openat(r0, &(0x7f0000000240)='./file0\x00', 0x84842, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000440)="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", 0x1000, 0x7}, {&(0x7f0000000300)="33714254210ae81ae7dc420ab575a2", 0xf, 0xc01}, {&(0x7f0000001440)="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", 0xc00, 0x3}], 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="696f636896210de67a5ae527e4ee9b881f95dea6212e6f38383546b3202c6e6e6f5e756c7461696c3d312c5c707072616973655f747970653d696d61736b672c87000000"]) [ 1208.393866] FAULT_INJECTION: forcing a failure. [ 1208.393866] name failslab, interval 1, probability 0, space 0, times 0 [ 1208.418613] audit: type=1800 audit(1650995824.877:821): pid=22205 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=78 res=0 [ 1208.466785] CPU: 0 PID: 22213 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1208.474692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1208.484049] Call Trace: [ 1208.486647] dump_stack+0x1fc/0x2ef [ 1208.490292] should_fail.cold+0xa/0xf [ 1208.494105] ? setup_fault_attr+0x200/0x200 [ 1208.498438] ? lock_acquire+0x170/0x3c0 [ 1208.502430] __should_failslab+0x115/0x180 [ 1208.506677] should_failslab+0x5/0x10 [ 1208.510484] kmem_cache_alloc+0x277/0x370 [ 1208.514652] alloc_vfsmnt+0x23/0x780 [ 1208.518374] vfs_kern_mount.part.0+0x27/0x470 [ 1208.523312] vfs_kern_mount+0x3c/0x60 [ 1208.527122] btrfs_mount+0x23a/0xaa0 [ 1208.530851] ? btrfs_show_options+0xfd0/0xfd0 [ 1208.535347] ? __mutex_unlock_slowpath+0xea/0x610 [ 1208.540187] ? check_preemption_disabled+0x41/0x280 [ 1208.545204] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1208.550223] ? pcpu_alloc+0xc9/0x1190 [ 1208.554014] ? __lockdep_init_map+0x100/0x5a0 [ 1208.558493] mount_fs+0xa3/0x310 [ 1208.561844] vfs_kern_mount.part.0+0x68/0x470 [ 1208.566338] do_mount+0x115c/0x2f50 [ 1208.569959] ? cmp_ex_sort+0xc0/0xc0 [ 1208.573672] ? __do_page_fault+0x180/0xd60 [ 1208.577908] ? copy_mount_string+0x40/0x40 [ 1208.582130] ? memset+0x20/0x40 [ 1208.585407] ? copy_mount_options+0x26f/0x380 [ 1208.589898] ksys_mount+0xcf/0x130 [ 1208.593425] __x64_sys_mount+0xba/0x150 [ 1208.597384] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1208.601949] do_syscall_64+0xf9/0x620 [ 1208.605747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1208.610928] RIP: 0033:0x7f350f3a961a [ 1208.614624] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1208.633514] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1208.641205] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1208.648457] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1208.655712] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 17:57:05 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) 17:57:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x3e000000, 0x0, 0x0) [ 1208.662971] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1208.670231] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 46) 17:57:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xa44a, 0x0, 0x0, 0x0) 17:57:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:05 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 17:57:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x62470000, 0x0, 0x0) 17:57:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:05 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 17:57:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xb44a, 0x0, 0x0, 0x0) [ 1208.962095] audit: type=1800 audit(1650995825.427:822): pid=22241 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=79 res=0 [ 1208.972207] FAULT_INJECTION: forcing a failure. [ 1208.972207] name failslab, interval 1, probability 0, space 0, times 0 [ 1209.034334] CPU: 0 PID: 22249 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1209.042238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1209.051591] Call Trace: [ 1209.054193] dump_stack+0x1fc/0x2ef [ 1209.057831] should_fail.cold+0xa/0xf [ 1209.061637] ? setup_fault_attr+0x200/0x200 [ 1209.065967] ? lock_acquire+0x170/0x3c0 [ 1209.069957] __should_failslab+0x115/0x180 [ 1209.074213] should_failslab+0x5/0x10 [ 1209.078017] __kmalloc_track_caller+0x2a6/0x3c0 [ 1209.082688] ? kstrdup_const+0x53/0x80 [ 1209.086585] kstrdup+0x36/0x70 [ 1209.089785] kstrdup_const+0x53/0x80 [ 1209.093503] alloc_vfsmnt+0xb5/0x780 [ 1209.097220] ? _raw_read_unlock+0x29/0x40 [ 1209.101375] vfs_kern_mount.part.0+0x27/0x470 [ 1209.105880] do_mount+0x115c/0x2f50 [ 1209.109516] ? cmp_ex_sort+0xc0/0xc0 [ 1209.113238] ? __do_page_fault+0x180/0xd60 [ 1209.117477] ? copy_mount_string+0x40/0x40 [ 1209.121706] ? memset+0x20/0x40 [ 1209.124970] ? copy_mount_options+0x26f/0x380 [ 1209.129449] ksys_mount+0xcf/0x130 [ 1209.132983] __x64_sys_mount+0xba/0x150 [ 1209.136962] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1209.141533] do_syscall_64+0xf9/0x620 [ 1209.145317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1209.150484] RIP: 0033:0x7f350f3a961a [ 1209.154191] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1209.173095] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:57:05 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) r1 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r1, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) semctl$IPC_RMID(r1, 0x0, 0x0) openat(r0, &(0x7f0000000240)='./file0\x00', 0x84842, 0x0) 17:57:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x100020000, 0x0, 0x0) 17:57:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1209.180798] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1209.188049] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1209.195306] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1209.202566] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1209.209816] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xc44a, 0x0, 0x0, 0x0) 17:57:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 47) 17:57:05 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 17:57:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:05 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086}) 17:57:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x20001000000, 0x0, 0x0) 17:57:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xd44a, 0x0, 0x0, 0x0) 17:57:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) r0 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r0, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) semctl$IPC_RMID(r0, 0x0, 0x0) [ 1209.475654] FAULT_INJECTION: forcing a failure. [ 1209.475654] name failslab, interval 1, probability 0, space 0, times 0 [ 1209.497837] audit: type=1800 audit(1650995825.967:823): pid=22285 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=80 res=0 17:57:06 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086}) [ 1209.570389] CPU: 0 PID: 22287 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1209.578296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1209.587657] Call Trace: [ 1209.590258] dump_stack+0x1fc/0x2ef [ 1209.593898] should_fail.cold+0xa/0xf [ 1209.597712] ? setup_fault_attr+0x200/0x200 [ 1209.602041] ? lock_acquire+0x170/0x3c0 [ 1209.606015] __should_failslab+0x115/0x180 [ 1209.610370] should_failslab+0x5/0x10 [ 1209.614163] __kmalloc_track_caller+0x2a6/0x3c0 [ 1209.618827] ? kstrdup_const+0x53/0x80 [ 1209.622708] kstrdup+0x36/0x70 [ 1209.625893] kstrdup_const+0x53/0x80 [ 1209.629590] alloc_vfsmnt+0xb5/0x780 [ 1209.633298] vfs_kern_mount.part.0+0x27/0x470 [ 1209.637783] ? kfree+0x110/0x210 [ 1209.641141] vfs_kern_mount+0x3c/0x60 [ 1209.644936] btrfs_mount+0x23a/0xaa0 [ 1209.648649] ? btrfs_show_options+0xfd0/0xfd0 [ 1209.653137] ? __mutex_unlock_slowpath+0xea/0x610 [ 1209.657974] ? check_preemption_disabled+0x41/0x280 [ 1209.662991] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1209.668003] ? pcpu_alloc+0xc9/0x1190 [ 1209.671788] ? __lockdep_init_map+0x100/0x5a0 [ 1209.676268] mount_fs+0xa3/0x310 [ 1209.679622] vfs_kern_mount.part.0+0x68/0x470 [ 1209.684131] do_mount+0x115c/0x2f50 [ 1209.687754] ? cmp_ex_sort+0xc0/0xc0 [ 1209.691451] ? __do_page_fault+0x180/0xd60 [ 1209.695686] ? copy_mount_string+0x40/0x40 [ 1209.699918] ? memset+0x20/0x40 [ 1209.703196] ? copy_mount_options+0x26f/0x380 [ 1209.707771] ksys_mount+0xcf/0x130 [ 1209.711320] __x64_sys_mount+0xba/0x150 [ 1209.715293] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1209.719868] do_syscall_64+0xf9/0x620 [ 1209.723671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1209.728858] RIP: 0033:0x7f350f3a961a [ 1209.732663] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1209.751553] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1209.759243] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a 17:57:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1209.766494] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1209.773753] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1209.781013] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1209.788286] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x40030000000000, 0x0, 0x0) 17:57:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xe44a, 0x0, 0x0, 0x0) 17:57:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 48) 17:57:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:06 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086}) 17:57:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x100000000000000, 0x0, 0x0) 17:57:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xf44a, 0x0, 0x0, 0x0) [ 1210.011705] FAULT_INJECTION: forcing a failure. [ 1210.011705] name failslab, interval 1, probability 0, space 0, times 0 [ 1210.090292] CPU: 0 PID: 22318 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1210.098203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1210.107560] Call Trace: [ 1210.110162] dump_stack+0x1fc/0x2ef [ 1210.113806] should_fail.cold+0xa/0xf [ 1210.117623] ? setup_fault_attr+0x200/0x200 [ 1210.121953] ? lock_acquire+0x170/0x3c0 [ 1210.125942] __should_failslab+0x115/0x180 [ 1210.130188] should_failslab+0x5/0x10 [ 1210.133994] kmem_cache_alloc+0x277/0x370 [ 1210.138154] alloc_vfsmnt+0x23/0x780 [ 1210.141879] vfs_kern_mount.part.0+0x27/0x470 [ 1210.146377] ? kfree+0x110/0x210 [ 1210.149750] vfs_kern_mount+0x3c/0x60 [ 1210.153559] btrfs_mount+0x23a/0xaa0 [ 1210.157287] ? btrfs_show_options+0xfd0/0xfd0 [ 1210.161782] ? __mutex_unlock_slowpath+0xea/0x610 [ 1210.166640] ? check_preemption_disabled+0x41/0x280 [ 1210.171666] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1210.176695] ? pcpu_alloc+0xc9/0x1190 [ 1210.180503] ? __lockdep_init_map+0x100/0x5a0 [ 1210.185013] mount_fs+0xa3/0x310 [ 1210.188391] vfs_kern_mount.part.0+0x68/0x470 [ 1210.192914] do_mount+0x115c/0x2f50 [ 1210.196540] ? cmp_ex_sort+0xc0/0xc0 [ 1210.200252] ? __do_page_fault+0x180/0xd60 [ 1210.204482] ? copy_mount_string+0x40/0x40 [ 1210.208717] ? memset+0x20/0x40 [ 1210.211988] ? copy_mount_options+0x26f/0x380 [ 1210.216506] ksys_mount+0xcf/0x130 [ 1210.220045] __x64_sys_mount+0xba/0x150 [ 1210.224013] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1210.228586] do_syscall_64+0xf9/0x620 [ 1210.232389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1210.237577] RIP: 0033:0x7f350f3a961a [ 1210.241285] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1210.260178] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1210.267875] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1210.275136] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1210.282395] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 17:57:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) r0 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r0, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) semctl$IPC_RMID(r0, 0x0, 0x0) [ 1210.289652] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1210.296910] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 49) 17:57:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) r1 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r1, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) semctl$IPC_RMID(r1, 0x0, 0x0) openat(r0, &(0x7f0000000240)='./file0\x00', 0x84842, 0x0) 17:57:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x200000000000000, 0x0, 0x0) 17:57:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0x200100fa, 0x0, 0x0, 0x0) 17:57:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) r1 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r1, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) semctl$IPC_RMID(r1, 0x0, 0x0) openat(r0, &(0x7f0000000240)='./file0\x00', 0x84842, 0x0) 17:57:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x400000000000000, 0x0, 0x0) 17:57:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) r0 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r0, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) [ 1210.558868] FAULT_INJECTION: forcing a failure. [ 1210.558868] name fail_page_alloc, interval 1, probability 0, space 0, times 0 17:57:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfffffdef, 0x0, 0x0, 0x0) [ 1210.634684] CPU: 0 PID: 22354 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1210.642596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1210.651951] Call Trace: [ 1210.654552] dump_stack+0x1fc/0x2ef [ 1210.658197] should_fail.cold+0xa/0xf [ 1210.662012] ? lock_acquire+0x170/0x3c0 [ 1210.666000] ? setup_fault_attr+0x200/0x200 [ 1210.670341] __alloc_pages_nodemask+0x239/0x2890 [ 1210.675106] ? __lock_acquire+0x6de/0x3ff0 [ 1210.679361] ? kernel_text_address+0xbd/0xf0 [ 1210.683779] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1210.688622] ? __save_stack_trace+0xaf/0x190 [ 1210.693050] ? __lock_acquire+0x6de/0x3ff0 [ 1210.697305] alloc_pages_current+0x193/0x2a0 [ 1210.701718] get_zeroed_page+0x10/0x40 [ 1210.705613] parse_security_options.constprop.0+0x1a/0xa0 [ 1210.711159] btrfs_mount_root+0x110/0x1830 [ 1210.715409] ? btrfs_decode_error+0x70/0x70 [ 1210.719734] ? __mutex_unlock_slowpath+0xea/0x610 [ 1210.724587] ? check_preemption_disabled+0x41/0x280 [ 1210.729614] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1210.734633] ? pcpu_alloc+0xc9/0x1190 [ 1210.738435] ? __lockdep_init_map+0x100/0x5a0 [ 1210.742928] mount_fs+0xa3/0x310 [ 1210.746295] vfs_kern_mount.part.0+0x68/0x470 [ 1210.750800] ? kfree+0x110/0x210 [ 1210.754166] vfs_kern_mount+0x3c/0x60 [ 1210.757972] btrfs_mount+0x23a/0xaa0 [ 1210.761683] ? btrfs_show_options+0xfd0/0xfd0 [ 1210.766164] ? __mutex_unlock_slowpath+0xea/0x610 [ 1210.770995] ? check_preemption_disabled+0x41/0x280 [ 1210.775997] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1210.780993] ? pcpu_alloc+0xc9/0x1190 [ 1210.784788] ? __lockdep_init_map+0x100/0x5a0 [ 1210.789286] mount_fs+0xa3/0x310 [ 1210.792640] vfs_kern_mount.part.0+0x68/0x470 [ 1210.797123] do_mount+0x115c/0x2f50 [ 1210.800747] ? cmp_ex_sort+0xc0/0xc0 [ 1210.804456] ? __do_page_fault+0x180/0xd60 [ 1210.808692] ? copy_mount_string+0x40/0x40 [ 1210.812927] ? memset+0x20/0x40 [ 1210.816192] ? copy_mount_options+0x26f/0x380 [ 1210.821106] ksys_mount+0xcf/0x130 [ 1210.824647] __x64_sys_mount+0xba/0x150 [ 1210.828620] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1210.833187] do_syscall_64+0xf9/0x620 [ 1210.836972] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1210.842149] RIP: 0033:0x7f350f3a961a [ 1210.845888] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1210.864962] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1210.872669] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a 17:57:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) r1 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r1, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) semctl$IPC_RMID(r1, 0x0, 0x0) openat(r0, &(0x7f0000000240)='./file0\x00', 0x84842, 0x0) 17:57:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x500000000000000, 0x0, 0x0) [ 1210.879923] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1210.887177] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1210.894524] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1210.901775] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00060100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 50) 17:57:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) r0 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r0, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) 17:57:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) r0 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r0, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) 17:57:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x600000000000000, 0x0, 0x0) 17:57:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x2, 0x0, 0x0) 17:57:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1211.168747] FAULT_INJECTION: forcing a failure. [ 1211.168747] name failslab, interval 1, probability 0, space 0, times 0 [ 1211.227994] CPU: 1 PID: 22392 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1211.235923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1211.245282] Call Trace: [ 1211.247887] dump_stack+0x1fc/0x2ef [ 1211.251534] should_fail.cold+0xa/0xf [ 1211.255351] ? setup_fault_attr+0x200/0x200 [ 1211.259688] ? lock_acquire+0x170/0x3c0 [ 1211.263681] __should_failslab+0x115/0x180 [ 1211.267928] should_failslab+0x5/0x10 [ 1211.271736] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1211.276854] __kmalloc_node+0x38/0x70 [ 1211.280671] kvmalloc_node+0xb4/0xf0 [ 1211.284397] btrfs_mount_root+0x13f/0x1830 [ 1211.288649] ? btrfs_decode_error+0x70/0x70 [ 1211.292981] ? __mutex_unlock_slowpath+0xea/0x610 [ 1211.297849] ? check_preemption_disabled+0x41/0x280 [ 1211.302893] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1211.307921] ? pcpu_alloc+0xc9/0x1190 [ 1211.311734] ? __lockdep_init_map+0x100/0x5a0 [ 1211.316274] mount_fs+0xa3/0x310 [ 1211.319745] vfs_kern_mount.part.0+0x68/0x470 [ 1211.324258] ? kfree+0x110/0x210 [ 1211.327638] vfs_kern_mount+0x3c/0x60 [ 1211.331532] btrfs_mount+0x23a/0xaa0 [ 1211.335268] ? btrfs_show_options+0xfd0/0xfd0 [ 1211.339766] ? __mutex_unlock_slowpath+0xea/0x610 [ 1211.344633] ? check_preemption_disabled+0x41/0x280 [ 1211.349666] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1211.354814] ? pcpu_alloc+0xc9/0x1190 [ 1211.358625] ? __lockdep_init_map+0x100/0x5a0 [ 1211.363131] mount_fs+0xa3/0x310 [ 1211.366520] vfs_kern_mount.part.0+0x68/0x470 [ 1211.371034] do_mount+0x115c/0x2f50 [ 1211.374674] ? cmp_ex_sort+0xc0/0xc0 [ 1211.378401] ? __do_page_fault+0x180/0xd60 [ 1211.382637] ? copy_mount_string+0x40/0x40 [ 1211.386883] ? memset+0x20/0x40 [ 1211.390177] ? copy_mount_options+0x26f/0x380 [ 1211.394689] ksys_mount+0xcf/0x130 [ 1211.398245] __x64_sys_mount+0xba/0x150 [ 1211.402235] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1211.406824] do_syscall_64+0xf9/0x620 [ 1211.410641] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1211.415880] RIP: 0033:0x7f350f3a961a [ 1211.420087] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1211.438997] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1211.446713] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1211.453993] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1211.461289] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1211.468559] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 17:57:07 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfffffdef, 0x0, 0x0, 0x0) 17:57:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000003000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x700000000000000, 0x0, 0x0) 17:57:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x4, 0x0, 0x0) [ 1211.475838] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 51) 17:57:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) r0 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r0, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) 17:57:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) r1 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r1, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) semctl$IPC_RMID(r1, 0x0, 0x0) openat(r0, &(0x7f0000000240)='./file0\x00', 0x84842, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000440)="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", 0x1000, 0x7}, {&(0x7f0000000300)="33714254210ae81ae7dc420ab575a2", 0xf, 0xc01}, {&(0x7f0000001440)="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", 0xc00, 0x3}], 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="696f636896210de67a5ae527e4ee9b881f95dea6212e6f38383546b3202c6e6e6f5e756c7461696c3d312c5c707072616973655f747970653d696d61736b672c87000000"]) semop(0x0, &(0x7f00000020c0)=[{0x0, 0x3ff}, {0x4, 0x9ec, 0x1800}, {0x3, 0x4, 0x800}, {0x3, 0x1, 0x1000}, {0x3, 0x3, 0x800}, {0x1}, {0x0, 0x2, 0x1800}], 0x7) 17:57:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x800000000000000, 0x0, 0x0) 17:57:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x5, 0x0, 0x0) 17:57:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) r1 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r1, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) semctl$IPC_RMID(r1, 0x0, 0x0) openat(r0, &(0x7f0000000240)='./file0\x00', 0x84842, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000440)="31d4ee8c0598f2153b749ac51cce0774c62cb7ac5996180f906fe8addd19bf2b5e7a5148ae361dbe918223c11ff1353c2bbeeea8434e3282a6e9e56fcf51de252ca08b587162aeb10b65b6d39486d05a623471cb28302d9d4b0d9856ad13fd0d83b93b5488fba2fdf699e7a2bd97bc10fa529d9a19b4a29e7a11d938e964b22366876893310b2764fa835ca2083cb4132ed8dfbd2eed03d8ef3badd1a9ec5f249646fea52b3d6566d1b2a429277c2163b120d8830446deadd86318332cc3c38c81f94f96fcc557f9cec7bf49a72bf3d636331e0970bb5df95b0d016877018932d0a33e469884b5c60a61f496579f025490cd14f73ef89e6b0e512d34cb420472c7934e1e440aa56bf0fd6ee01cffc6c7d17e08233d3e5c3779c84035e72c0e5707b58578c346ba1188e42ea408c90a428491034574233653e64c7c694e63f160dee5e95d1406caf8ff814c5a0706b0e09d0c36ca64babb0cb6e156cbd0af630d61f394d256c3286ff65a10cd3f6c2573922ed8a5bad4c86d3b6656562f58cab4ccd7947efaad8082d033cb45bc6a9d0b33f367dfccc56c8b3413a61647dcee4917eb535760891a34ce803766bd58465785b599243421d34d4f817a215ba066416cd1901adc3642f383d685f29c8167b9e788e9e33053ad7c36d2fce80177a0649d17ebeecee778065e0acad1e602b8cf1ca58a92a5e616e85d672c8fe546c0b415f383e5c5f08fbd9eac8ac873e7f9964a3c392f7c99536ad5afaf5961b90522da57f6d40b3c09613106d715bc39cc107e950613e36c0a12170964dc73f84aa5fed36b681e172afe04457863114f33b1a0817a714d34787d88c4a791c6958de2b58b983c6357d0f78051a77299d7242a39199fed696ed3b9dfdf08eee6fe9884eee37786dcd7925af05f2775476595f573ba7fd8cd2d2f276cb6a29a969a90caabbf4bd8417a7777f1eae63a9c1837507e88b67c878d27664166d7e47aba65c911c10a211fd61ecae6372337b917b06094096baacf7ed4bd045c0f6e574ea4ce41501b1aee57b7a80092750424b58bce3c7cd41adcd1c067410bdb74be45264e161a4ab6d00a4de89a0290530c07aa72d5ed77882ba49d6720b6dfb78c37747b909ad335f4d493213294f95784548f3b56f960668f6836656e336e4f17466c9db3bcdc9e97983315740b9fbb7c764dda7313caaa60bc823950317944a515c1fa44ef9fbe7cf3a0697af7a5c3908d5d5f61bdafd57abf8e4abfc0868e9ea82f2be0be91633423805b9d0e8310b7f0411c16f129ebaa122b78a66cc875d939c574da5c1893de97252ea9b811aaa1477a2dd6e28ab093fd872d5947b6b6ea00259944125b0d40b0fd1ec0523416519f2ef8f8e966c5f6e8445a303c8d539083cc7d37298866575001a5f1cfa2ccd9f55ad8c1a830e8e05be3ecbba6a9bce113ffa2b990d334a3f7068ee8797299cc059dac04af3f7fd7a3579d6a1424ebf372491743660853be6e97203ea6a97c38f4f05b03797e0388a250c9f32e7dfbcf25b82c5342e82e4e086e946f39055552cf1588423e4f8185ae80907ca09b85023c2a62cef6f9909af07a20e6dafaed2b9fac0c377e1e1c57cf5d75182a51077dc0af38b75891ba128420c05197d642c86bb8adc1e7d174cf3f35986401eaf709029640f081594702d51030be1fd0dac50ceb66f554ce66c85715aef35049d7402f2a30b96e1eee0764f4087e00ba4f8e0e2b5fb2e300c57b136addfec8401a14e9241cdc6f70429d894234ba58b2d5b825783f38b601559387786d5b946a396669bf06980d81716357d3d5d6a2e145d518637e2b702c5bc2cb5d48f5bf5dec5432ceae6d0ed05f55f66e3dd48e4cdd03a4d2dd20af10d7d2922c9c7d4e1401cadcc231ac1f946d5b404a505c6832a1b15af4f5a9275cc4000e70b0a04badc39b781e2ca28cf41f8bd3971b920cf3a78cadae004f457e243537579bd7c69186249f1a3ca60bb312f1eaf08f0a1281d55c0dd2063117be212348ea8ff3bfe7ed8934086c6a9d85690d0254aaa303bd676d56dd0a53ba2cba04850f6161386376ef87072f5595134a5969c090a69914da649e8e8bed684499ad96aeb3c9048f59f7be3a0b1e444735e9fc6e07eb81d9f80b56063a0e055b1b55c801e9a183ce8c0f7e9a539c504ae0ecb9b621256c3f0b81e19695e822bd146eea842c1d8d59cb46fab1a891877d4d0cc0e91d9a2ad5af8c832ac798d4d4c7479a519e7a62e1dd60cf220a06a9156828d3381e6c1f1aedf625b584dadc0774c83f2c06f7052514b5b1fdae857d5c00bb079d582912e47ac8382523dbe20bccc3e270012fb7f7e719d5c4f26657993d93cd5796418142ca7b15fb1db6250f3cb541b4e4be870d51fb153a254819460d2991dd59c8f81439bc9ebc4aaab91e0b178d93d1003f88c0a398b9ab014d4bc6aa7ea6f63b5c258f159b933fad73b16b19b7dfd9baf7a1917014d645e37e22571ece56ff4b9f4757c4b06bfbf2f0b816751f94d209d679e2faa296f6bc674c5ef066f9c009725d9498fae48fa86ab713380267aa726f437f3aab114f040711c47862f3022dd7dce8da715a648c924df961769de7e6db44ea98b0a00737081671508acf0bf72d379903d90f5ac008fea8efa14093b2d6598056b52b4d915b4e6acb9b1403a9d84bfa2c192f291e92d81ecb1850921887ff38ac97e79232ac4161c33120448f7c94fa8cecb3e5a1772f6bd0c069d5e455820da63e47a83c4b926b7c0092104cf029bfabef0ae34ca4dd471b99417ea476bbb0b1dbcb5fd79fd8a9deafa926dd3ee6156d529808f1807180fd01197dbccde3492f2fd83a4a6186a2560a47eaec3ccdfd9f421a075da2a0459f085d49bf328cd08bcc1cd6987859c519cac938d6c73de639d7aceab1e82150e300c75bf86de84c1ba02a3a24bbb5117cf8920e438749a81ec937feb749a1be5b2716bc07bc30d4a6147d78a8d3c836f6d07e8869bfd450409feaae0c92236b3a5274718ec5b947189d2dabab0be8eb61a5c365fff2e2da62ed4b0000000040000000319002a391f5dec1c1b09cdfe5dfb536eabdee368bbbd75e7f66067389fc14cf9aa67059f5caaef6ba8eb6df583e08ded6f5fe4278325cc2218444bf5baaa90689167204de70a99d8f60a8a5994fb8f26b9089f083e8d7fea641e26b9c8c4eb0d9ddd52500eb3244ff608abd054e55985afefe975e5f2b4d8f5f5a9d3be40aee0572f98dc813d9676221a3afc9d77d622642d46b496f4716c78fb7847153ac9b13775f87e17ff283ad37fcaecbcf89f603b71dfcfee8afe0d8add626cfc85bd24c05e419b9bcf40f1a7ddaa0bf8db126615b4f13f485120f6f6961ea3d558aa3875ee2a2cef2d700000000f114d233127de3eb595241fc2dd516621e20eec94f35d543711d85733c501b8113e81f4852f5096deb7e034f424d53fd95405b7c9c1cc601d8cf3c5bde96887d77c313cb1fc6c7de0a5ccfd908b7c28d5fcff97f9b91ac4e7f992e5da9537cd2af8bf7bfacaf62616c31f79fd2bc2139c770b19f4b0af28fc19d1ad069315382442ecdac93405571d0b2ed9f18e67790f68dc5b82a7cb0800b3e9ca6d38adaf2c51a3b771b3af69bb839b71dbdb407feebcb6319fb079cfe841d243ba6ed6768606220fcd279515e75f53418fb742da97daccde807b2d09a672c2dc1ea2b3934797cd90f45be89d2e2b8fcd7fb6cbd1d2040c8eafbe694e8209fc1a2e8a8e8c32704071ec3794f9cc9dca69ec1478f36aad415998e0aeacc3875f26b365191cc739b1980d793bd1eec8fe6bc72f499bd406e0f36045ab13a42919280c8ea201b338b11d90406dc9a51196e2609eb28ace9b116883cae8c812522f9fc85b4c2ab79c074bde59b838f28e18679711aa2ec8f04dbbff13db206f3610fb9608258011ea625e88a08f8281b7d747950d037c70c40439d473ab1af6b9b60e359a79c57e83595a48e207bf2f93d9a5ec757ce9a4d6fc3420131acfb7a29e255ad1d5cac983a8355848c908c816df423e1e8d0d204edb1d1d5b04e775e612879175cffeaaecc02654305b068f8c6577b514a85d6705e87c715b7b8179bf59163391c106de7f7bd2b103ebaff3190e6d869785f6c347ab0a3323ad9d67d48ce294cf8443e02795d0b9c4528e7ca2124d343e428b79b3cf6ebcddc77d6d8a984f6d7f0cf397dcd20369860aac52fc7a4a2f0314b0a598916b46163e97f6943f004ce1f441ac0bbe428052099e6d3661f27d19c17e1cc6889c4f2badff5acae55c2c98d9cb5d5af012eb5faaa9d84f7b15206b480ee427a23c205500ad1f757d8530fd84eae8b1f0c62640f18bc0b3674699a1b34fb26e2b430363b6efa8b279b44b2442a7d25442f6ff26392192c72c8b411cf57241d4ad9cf60771c512a9c3d5e54356b1501d29944112b211f294c00405f8fecf57774842de2f386bca6946d2a052b3c4af1abd5a2020b53715053124e17411bfc384a11b932ad3c3f1c56cb8dc6d0e0c0cf5577831c83994fccb160ca9e79a1c2eacf6265be6ddf8f13f7e30efe7d18a134744c3caa56af5a8ed4808063950eef7945b81c1c2c48ca64f0698d4bd9f4730e61a8d92eb000b25b0fe2b14c5d56eeeed6547333f0ecd25bc6d2567863688b7ce6e86057b0d8cb85936ac8b7634adc24e4e552886635ed2f1677793c26d0b379535428c8e1ea5bea667ee23e38843860a1a84911f0903edf0532fa1d5dc6aebc9b9f99ccb9ca96dc12a10d5f5431ba82010420ada46a867b3c2b293769d176cb433263d7599f37cf9e168d2e8cfc7756446fe17ec2da89ba892f59e7fce6d52b0d19124d5de680f941f33582d3c68abab4eed6d3af06ce9a32a8c06c74edb437bca09646c23abdac117aad7696a3e5ae81274d336bfaf8b0f52a78269d64508eec35a66a6fd5d8566a723459835488ffbb3c61f3626d4b4f2038ba9d7403f5e73770c95ad72c7a5b4bc8d305aa4529edbf05da1407877dfb2a382fa9909c58684ce1f1b85bd7b6f38099163ba11a03c772d1b53dcf86b074098942b8869cc7aa441b7db3322c64b4d3b968aa8831293d9007b58bb161539fda6b4c02835245f345c9ad6aaad763a4fe2c0496353e931646609254abaf764432d56b9afb090669cf2fb91b5842ee7d2c8e32ddb75713f0ee0537b4e22b978fa8f126667d3b879763a7d4f0977ee6bf2ff3ca751cf80cb8df3e4f4dbb5872a89585a579ac50eccee924e03a66c9324063e7b990c4990bfe108c010d6214645ae96fcfe2e1aca5b748c53879558b2444b0358a071293dcc41319179af12b7b6dc494786095cd4534d55d3f6c46d4be9e626f4ffbb9703b40f8f0a276961748d127d88ea3e66b157f6543215dad56542f5cf5d7a94b538628cbb1a05e98ebeaaed68f979353434f7813ae7c0ced291584f48aecd8c676150d626137aafbfd90541d6104419ffb408be56936668b64bc63828cb7aa5872411b48b8fd9d567d32297755a567fec0bb79ffa7b8422c763509affa8ccee5d82eeb4e22b72050457105f5a5cb59ae6bd1674516ce199f3e15fe0d8a305eebb59b283facb8c580d55decf22911283bcbb4a857790a08185235844aa2e4f9ab66d3edd20ad185a4ed446f6c8c1e23613a644e3074645bad9ae30271779e5bde5802ea272944fb54de45ae730a1d86eee8bee9dd256775807125bd60f9164b261f88f923ac31ef72156ef14722dbc4e96da7f8e18f3665b054c3594bd44f2547cc1996a6b3778d58a506495ad51b750d", 0x1000, 0x7}, {&(0x7f0000000300)="33714254210ae81ae7dc420ab575a2", 0xf, 0xc01}, {&(0x7f0000001440)="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", 0xc00, 0x3}], 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="696f636896210de67a5ae527e4ee9b881f95dea6212e6f38383546b3202c6e6e6f5e756c7461696c3d312c5c707072616973655f747970653d696d61736b672c87000000"]) semop(0x0, &(0x7f00000020c0)=[{0x0, 0x3ff}, {0x4, 0x9ec, 0x1800}, {0x3, 0x4, 0x800}, {0x3, 0x1, 0x1000}, {0x3, 0x3, 0x800}, {0x1}, {0x0, 0x2, 0x1800}], 0x7) [ 1211.783733] FAULT_INJECTION: forcing a failure. [ 1211.783733] name failslab, interval 1, probability 0, space 0, times 0 [ 1211.835557] CPU: 0 PID: 22441 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1211.843468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1211.852829] Call Trace: [ 1211.855430] dump_stack+0x1fc/0x2ef [ 1211.859074] should_fail.cold+0xa/0xf [ 1211.862886] ? setup_fault_attr+0x200/0x200 [ 1211.867219] ? lock_acquire+0x170/0x3c0 [ 1211.871209] __should_failslab+0x115/0x180 [ 1211.875454] should_failslab+0x5/0x10 [ 1211.879263] kmem_cache_alloc_trace+0x284/0x380 [ 1211.883948] btrfs_mount_root+0x1e1/0x1830 [ 1211.888208] ? btrfs_decode_error+0x70/0x70 [ 1211.892537] ? __mutex_unlock_slowpath+0xea/0x610 [ 1211.897392] ? check_preemption_disabled+0x41/0x280 [ 1211.902428] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1211.907440] ? pcpu_alloc+0xc9/0x1190 [ 1211.911225] ? __lockdep_init_map+0x100/0x5a0 [ 1211.915722] mount_fs+0xa3/0x310 [ 1211.919084] vfs_kern_mount.part.0+0x68/0x470 [ 1211.923577] ? kfree+0x110/0x210 [ 1211.926940] vfs_kern_mount+0x3c/0x60 [ 1211.930740] btrfs_mount+0x23a/0xaa0 [ 1211.934454] ? btrfs_show_options+0xfd0/0xfd0 [ 1211.938943] ? __mutex_unlock_slowpath+0xea/0x610 [ 1211.943792] ? check_preemption_disabled+0x41/0x280 [ 1211.948910] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1211.953931] ? pcpu_alloc+0xc9/0x1190 [ 1211.957729] ? __lockdep_init_map+0x100/0x5a0 [ 1211.962224] mount_fs+0xa3/0x310 [ 1211.965601] vfs_kern_mount.part.0+0x68/0x470 [ 1211.970092] do_mount+0x115c/0x2f50 [ 1211.973726] ? cmp_ex_sort+0xc0/0xc0 [ 1211.977433] ? __do_page_fault+0x180/0xd60 [ 1211.981656] ? copy_mount_string+0x40/0x40 [ 1211.985880] ? memset+0x20/0x40 [ 1211.989142] ? copy_mount_options+0x26f/0x380 [ 1211.993638] ksys_mount+0xcf/0x130 [ 1211.997173] __x64_sys_mount+0xba/0x150 [ 1212.001136] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1212.005705] do_syscall_64+0xf9/0x620 [ 1212.009495] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1212.014675] RIP: 0033:0x7f350f3a961a 17:57:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00008008000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0xe00000000000000, 0x0, 0x0) [ 1212.018381] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1212.037274] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1212.044993] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1212.052266] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1212.059527] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1212.066782] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1212.074042] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x6, 0x0, 0x0) 17:57:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) r0 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r0, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) 17:57:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 52) 17:57:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) r1 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r1, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002580)=""/231) semop(0x0, &(0x7f0000002080)=[{0x4, 0x7, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x8, 0x1000}, {0x2, 0x2a, 0x1000}, {0x3, 0x8, 0x1800}, {0x2, 0x8, 0x1000}], 0x6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x6, 0x1]) semctl$IPC_RMID(r1, 0x0, 0x0) openat(r0, &(0x7f0000000240)='./file0\x00', 0x84842, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000440)="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", 0x1000, 0x7}, {&(0x7f0000000300)="33714254210ae81ae7dc420ab575a2", 0xf, 0xc01}, {&(0x7f0000001440)="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", 0xc00, 0x3}], 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="696f636896210de67a5ae527e4ee9b881f95dea6212e6f38383546b3202c6e6e6f5e756c7461696c3d312c5c707072616973655f747970653d696d61736b672c87000000"]) semop(0x0, &(0x7f00000020c0)=[{0x0, 0x3ff}, {0x4, 0x9ec, 0x1800}, {0x3, 0x4, 0x800}, {0x3, 0x1, 0x1000}, {0x3, 0x3, 0x800}, {0x1}, {0x0, 0x2, 0x1800}], 0x7) 17:57:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x1000000000000000, 0x0, 0x0) 17:57:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) r0 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r0, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) 17:57:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x8, 0x0, 0x0) 17:57:08 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x24e20086, r2}) [ 1212.392348] FAULT_INJECTION: forcing a failure. [ 1212.392348] name failslab, interval 1, probability 0, space 0, times 0 [ 1212.417309] CPU: 1 PID: 22479 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1212.425218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1212.434570] Call Trace: [ 1212.437170] dump_stack+0x1fc/0x2ef [ 1212.440815] should_fail.cold+0xa/0xf [ 1212.444626] ? setup_fault_attr+0x200/0x200 [ 1212.448946] ? lock_acquire+0x170/0x3c0 [ 1212.452927] __should_failslab+0x115/0x180 [ 1212.457172] should_failslab+0x5/0x10 [ 1212.460979] __kmalloc_track_caller+0x2a6/0x3c0 [ 1212.465650] ? btrfs_mount_root+0x364/0x1830 [ 1212.470061] kstrdup+0x36/0x70 [ 1212.473267] btrfs_mount_root+0x364/0x1830 [ 1212.477520] ? btrfs_decode_error+0x70/0x70 [ 1212.481850] ? __mutex_unlock_slowpath+0xea/0x610 [ 1212.486846] ? check_preemption_disabled+0x41/0x280 [ 1212.491877] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1212.496897] ? pcpu_alloc+0xc9/0x1190 [ 1212.500710] ? __lockdep_init_map+0x100/0x5a0 [ 1212.505216] mount_fs+0xa3/0x310 [ 1212.508603] vfs_kern_mount.part.0+0x68/0x470 [ 1212.513100] ? kfree+0x110/0x210 [ 1212.516477] vfs_kern_mount+0x3c/0x60 [ 1212.520752] btrfs_mount+0x23a/0xaa0 [ 1212.524492] ? btrfs_show_options+0xfd0/0xfd0 [ 1212.528991] ? __mutex_unlock_slowpath+0xea/0x610 [ 1212.533848] ? check_preemption_disabled+0x41/0x280 [ 1212.538883] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1212.543932] ? pcpu_alloc+0xc9/0x1190 [ 1212.547740] ? __lockdep_init_map+0x100/0x5a0 [ 1212.552233] mount_fs+0xa3/0x310 [ 1212.555605] vfs_kern_mount.part.0+0x68/0x470 [ 1212.560107] do_mount+0x115c/0x2f50 [ 1212.563744] ? cmp_ex_sort+0xc0/0xc0 [ 1212.567467] ? __do_page_fault+0x180/0xd60 [ 1212.571718] ? copy_mount_string+0x40/0x40 [ 1212.575964] ? memset+0x20/0x40 [ 1212.579256] ? copy_mount_options+0x26f/0x380 [ 1212.583761] ksys_mount+0xcf/0x130 [ 1212.587319] __x64_sys_mount+0xba/0x150 [ 1212.591298] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1212.595876] do_syscall_64+0xf9/0x620 [ 1212.599681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1212.604869] RIP: 0033:0x7f350f3a961a [ 1212.608592] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1212.627497] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1212.635213] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a 17:57:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1212.642498] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1212.649771] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1212.657044] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1212.664318] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 53) 17:57:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x1428000000000000, 0x0, 0x0) 17:57:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x8000000, 0x0, 0x0) [ 1212.887668] FAULT_INJECTION: forcing a failure. [ 1212.887668] name failslab, interval 1, probability 0, space 0, times 0 [ 1212.901126] CPU: 1 PID: 22517 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1212.909032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1212.918391] Call Trace: [ 1212.920994] dump_stack+0x1fc/0x2ef [ 1212.924640] should_fail.cold+0xa/0xf [ 1212.928459] ? setup_fault_attr+0x200/0x200 [ 1212.932794] ? lock_acquire+0x170/0x3c0 [ 1212.936798] __should_failslab+0x115/0x180 [ 1212.941047] should_failslab+0x5/0x10 [ 1212.944865] kmem_cache_alloc_trace+0x284/0x380 [ 1212.949548] btrfs_mount_root+0x188/0x1830 [ 1212.953790] ? btrfs_decode_error+0x70/0x70 [ 1212.958108] ? __mutex_unlock_slowpath+0xea/0x610 [ 1212.962949] ? check_preemption_disabled+0x41/0x280 [ 1212.967969] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1212.972979] ? pcpu_alloc+0xc9/0x1190 [ 1212.976774] ? __lockdep_init_map+0x100/0x5a0 [ 1212.981268] mount_fs+0xa3/0x310 [ 1212.984633] vfs_kern_mount.part.0+0x68/0x470 [ 1212.989123] ? kfree+0x110/0x210 [ 1212.992488] vfs_kern_mount+0x3c/0x60 [ 1212.996283] btrfs_mount+0x23a/0xaa0 [ 1212.999994] ? btrfs_show_options+0xfd0/0xfd0 [ 1213.004478] ? __mutex_unlock_slowpath+0xea/0x610 [ 1213.009319] ? check_preemption_disabled+0x41/0x280 [ 1213.014336] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1213.019345] ? pcpu_alloc+0xc9/0x1190 [ 1213.023142] ? __lockdep_init_map+0x100/0x5a0 [ 1213.027637] mount_fs+0xa3/0x310 [ 1213.031002] vfs_kern_mount.part.0+0x68/0x470 [ 1213.035499] do_mount+0x115c/0x2f50 [ 1213.039127] ? cmp_ex_sort+0xc0/0xc0 [ 1213.042836] ? __do_page_fault+0x180/0xd60 [ 1213.047071] ? copy_mount_string+0x40/0x40 [ 1213.051311] ? memset+0x20/0x40 [ 1213.054583] ? copy_mount_options+0x26f/0x380 [ 1213.059074] ksys_mount+0xcf/0x130 [ 1213.062610] __x64_sys_mount+0xba/0x150 [ 1213.066579] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1213.071151] do_syscall_64+0xf9/0x620 [ 1213.074962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1213.080143] RIP: 0033:0x7f350f3a961a [ 1213.083852] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1213.102830] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1213.110532] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1213.117791] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1213.125049] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1213.132305] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1213.139563] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) r0 = semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) semop(r0, &(0x7f0000000080)=[{0x0, 0x40, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x9, 0x800}], 0x4) 17:57:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x3e00000000000000, 0x0, 0x0) 17:57:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00100100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x4000000, 0x0, 0x0) 17:57:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0xe, 0x0, 0x0) 17:57:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000300000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 54) 17:57:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x10, 0x0, 0x0) 17:57:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x6247000000000000, 0x0, 0x0) 17:57:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x4000000, 0x0, 0x0) 17:57:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) 17:57:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x3e, 0x0, 0x0) [ 1213.474200] FAULT_INJECTION: forcing a failure. [ 1213.474200] name failslab, interval 1, probability 0, space 0, times 0 [ 1213.524920] CPU: 0 PID: 22551 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1213.532833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1213.542191] Call Trace: [ 1213.544786] dump_stack+0x1fc/0x2ef [ 1213.548429] should_fail.cold+0xa/0xf [ 1213.552242] ? setup_fault_attr+0x200/0x200 [ 1213.556581] ? lock_acquire+0x170/0x3c0 [ 1213.560571] __should_failslab+0x115/0x180 [ 1213.564816] should_failslab+0x5/0x10 [ 1213.568631] kmem_cache_alloc+0x277/0x370 [ 1213.572881] getname_kernel+0x4e/0x370 [ 1213.576777] kern_path+0x1b/0x40 [ 1213.580149] lookup_bdev+0xfc/0x220 [ 1213.583781] ? bd_acquire+0x440/0x440 [ 1213.587586] ? debug_check_no_obj_freed+0x201/0x490 [ 1213.592618] blkdev_get_by_path+0x1b/0xd0 [ 1213.596776] btrfs_scan_one_device+0xd0/0xd00 [ 1213.601286] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1213.606405] ? debug_check_no_obj_freed+0x201/0x490 [ 1213.611430] ? device_list_add+0xdd0/0xdd0 [ 1213.615670] ? kfree+0x110/0x210 [ 1213.619037] ? btrfs_mount_root+0x107a/0x1830 [ 1213.623534] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1213.628117] btrfs_mount_root+0x9df/0x1830 [ 1213.632355] ? btrfs_decode_error+0x70/0x70 [ 1213.636673] ? __mutex_unlock_slowpath+0xea/0x610 [ 1213.641511] ? check_preemption_disabled+0x41/0x280 [ 1213.646526] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1213.651535] ? pcpu_alloc+0xc9/0x1190 [ 1213.655340] ? __lockdep_init_map+0x100/0x5a0 [ 1213.659828] mount_fs+0xa3/0x310 [ 1213.663202] vfs_kern_mount.part.0+0x68/0x470 [ 1213.667689] ? kfree+0x110/0x210 [ 1213.671060] vfs_kern_mount+0x3c/0x60 [ 1213.674858] btrfs_mount+0x23a/0xaa0 [ 1213.678568] ? btrfs_show_options+0xfd0/0xfd0 [ 1213.683052] ? __mutex_unlock_slowpath+0xea/0x610 [ 1213.687893] ? check_preemption_disabled+0x41/0x280 [ 1213.692931] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1213.697941] ? pcpu_alloc+0xc9/0x1190 [ 1213.701739] ? __lockdep_init_map+0x100/0x5a0 [ 1213.706230] mount_fs+0xa3/0x310 [ 1213.709581] vfs_kern_mount.part.0+0x68/0x470 [ 1213.714073] do_mount+0x115c/0x2f50 [ 1213.717707] ? cmp_ex_sort+0xc0/0xc0 [ 1213.721851] ? __do_page_fault+0x180/0xd60 [ 1213.726092] ? copy_mount_string+0x40/0x40 [ 1213.730322] ? memset+0x20/0x40 [ 1213.733596] ? copy_mount_options+0x26f/0x380 [ 1213.738086] ksys_mount+0xcf/0x130 [ 1213.741620] __x64_sys_mount+0xba/0x150 [ 1213.745587] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1213.750150] do_syscall_64+0xf9/0x620 [ 1213.753954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1213.759133] RIP: 0033:0x7f350f3a961a 17:57:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x4000000, 0x0, 0x0) 17:57:10 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0xffffffff00000000, 0x0, 0x0) [ 1213.762836] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1213.781733] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1213.789435] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1213.796695] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1213.803963] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1213.811223] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1213.818498] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 55) 17:57:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x500, 0x0, 0x0) 17:57:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) 17:57:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x4000000, 0x0, 0x0) [ 1213.998928] FAULT_INJECTION: forcing a failure. [ 1213.998928] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1214.010759] CPU: 0 PID: 22578 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1214.018642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1214.028446] Call Trace: [ 1214.031043] dump_stack+0x1fc/0x2ef [ 1214.034686] should_fail.cold+0xa/0xf [ 1214.038494] ? setup_fault_attr+0x200/0x200 [ 1214.042830] __alloc_pages_nodemask+0x239/0x2890 [ 1214.047590] ? __save_stack_trace+0x72/0x190 [ 1214.052000] ? deref_stack_reg+0x134/0x1d0 [ 1214.056244] ? mark_held_locks+0xf0/0xf0 [ 1214.060312] ? unwind_next_frame+0xeee/0x1400 [ 1214.064825] ? __lock_acquire+0x6de/0x3ff0 [ 1214.069073] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1214.073917] ? is_bpf_text_address+0xd5/0x1b0 [ 1214.078423] ? __bpf_address_lookup+0x330/0x330 [ 1214.083098] ? check_preemption_disabled+0x41/0x280 [ 1214.088118] ? is_bpf_text_address+0xfc/0x1b0 [ 1214.092624] ? kernel_text_address+0xbd/0xf0 [ 1214.097030] cache_grow_begin+0xa4/0x8a0 [ 1214.101078] ? setup_fault_attr+0x200/0x200 [ 1214.105387] ? lock_acquire+0x170/0x3c0 [ 1214.109356] cache_alloc_refill+0x273/0x340 [ 1214.113680] kmem_cache_alloc+0x346/0x370 [ 1214.117823] getname_kernel+0x4e/0x370 [ 1214.122022] kern_path+0x1b/0x40 [ 1214.125379] lookup_bdev+0xfc/0x220 [ 1214.128990] ? bd_acquire+0x440/0x440 [ 1214.132782] ? debug_check_no_obj_freed+0x201/0x490 [ 1214.137794] blkdev_get_by_path+0x1b/0xd0 [ 1214.141937] btrfs_scan_one_device+0xd0/0xd00 [ 1214.146428] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1214.151524] ? debug_check_no_obj_freed+0x201/0x490 [ 1214.156532] ? device_list_add+0xdd0/0xdd0 [ 1214.160752] ? kfree+0x110/0x210 [ 1214.164126] ? btrfs_mount_root+0x107a/0x1830 [ 1214.168617] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1214.173197] btrfs_mount_root+0x9df/0x1830 [ 1214.177441] ? btrfs_decode_error+0x70/0x70 [ 1214.181757] ? __mutex_unlock_slowpath+0xea/0x610 [ 1214.186594] ? check_preemption_disabled+0x41/0x280 [ 1214.191609] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1214.196626] ? pcpu_alloc+0xc9/0x1190 [ 1214.200424] ? __lockdep_init_map+0x100/0x5a0 [ 1214.204905] mount_fs+0xa3/0x310 [ 1214.208259] vfs_kern_mount.part.0+0x68/0x470 [ 1214.212748] ? kfree+0x110/0x210 [ 1214.216117] vfs_kern_mount+0x3c/0x60 [ 1214.220271] btrfs_mount+0x23a/0xaa0 [ 1214.223983] ? btrfs_show_options+0xfd0/0xfd0 [ 1214.228485] ? __mutex_unlock_slowpath+0xea/0x610 [ 1214.233338] ? check_preemption_disabled+0x41/0x280 [ 1214.238355] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1214.243375] ? pcpu_alloc+0xc9/0x1190 [ 1214.247169] ? __lockdep_init_map+0x100/0x5a0 [ 1214.251664] mount_fs+0xa3/0x310 [ 1214.255044] vfs_kern_mount.part.0+0x68/0x470 [ 1214.259535] do_mount+0x115c/0x2f50 [ 1214.263160] ? cmp_ex_sort+0xc0/0xc0 [ 1214.266874] ? __do_page_fault+0x180/0xd60 [ 1214.271092] ? copy_mount_string+0x40/0x40 [ 1214.275330] ? memset+0x20/0x40 [ 1214.278615] ? copy_mount_options+0x26f/0x380 [ 1214.283134] ksys_mount+0xcf/0x130 [ 1214.286670] __x64_sys_mount+0xba/0x150 [ 1214.290633] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1214.295203] do_syscall_64+0xf9/0x620 [ 1214.298990] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1214.304170] RIP: 0033:0x7f350f3a961a [ 1214.307878] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1214.326760] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1214.334459] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1214.341845] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 17:57:10 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x2) [ 1214.349110] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1214.356372] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1214.363654] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000f00000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 56) 17:57:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) 17:57:10 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) (fail_nth: 1) 17:57:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x600, 0x0, 0x0) 17:57:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x4) 17:57:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1214.607350] FAULT_INJECTION: forcing a failure. [ 1214.607350] name failslab, interval 1, probability 0, space 0, times 0 [ 1214.653567] CPU: 1 PID: 22608 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1214.661479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1214.670846] Call Trace: [ 1214.673451] dump_stack+0x1fc/0x2ef [ 1214.677094] should_fail.cold+0xa/0xf [ 1214.680911] ? setup_fault_attr+0x200/0x200 [ 1214.685245] ? lock_acquire+0x170/0x3c0 [ 1214.689238] __should_failslab+0x115/0x180 [ 1214.693483] should_failslab+0x5/0x10 [ 1214.697298] kmem_cache_alloc+0x277/0x370 17:57:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1214.701462] getname_kernel+0x4e/0x370 [ 1214.705362] kern_path+0x1b/0x40 [ 1214.708736] lookup_bdev+0xfc/0x220 [ 1214.712366] ? bd_acquire+0x440/0x440 [ 1214.716175] ? debug_check_no_obj_freed+0x201/0x490 [ 1214.721210] blkdev_get_by_path+0x1b/0xd0 [ 1214.725373] btrfs_scan_one_device+0xd0/0xd00 [ 1214.729881] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1214.735003] ? debug_check_no_obj_freed+0x201/0x490 [ 1214.740034] ? device_list_add+0xdd0/0xdd0 [ 1214.744284] ? kfree+0x110/0x210 [ 1214.747660] ? btrfs_mount_root+0x107a/0x1830 17:57:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1214.752168] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1214.756766] btrfs_mount_root+0x9df/0x1830 [ 1214.761039] ? btrfs_decode_error+0x70/0x70 [ 1214.765371] ? __mutex_unlock_slowpath+0xea/0x610 [ 1214.770216] ? check_preemption_disabled+0x41/0x280 [ 1214.775238] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1214.780276] ? pcpu_alloc+0xc9/0x1190 [ 1214.784085] ? __lockdep_init_map+0x100/0x5a0 [ 1214.788592] mount_fs+0xa3/0x310 [ 1214.791973] vfs_kern_mount.part.0+0x68/0x470 [ 1214.796472] ? kfree+0x110/0x210 [ 1214.799848] vfs_kern_mount+0x3c/0x60 17:57:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1214.803663] btrfs_mount+0x23a/0xaa0 [ 1214.807387] ? btrfs_show_options+0xfd0/0xfd0 [ 1214.811885] ? __mutex_unlock_slowpath+0xea/0x610 [ 1214.816739] ? check_preemption_disabled+0x41/0x280 [ 1214.821764] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1214.826786] ? pcpu_alloc+0xc9/0x1190 [ 1214.830597] ? __lockdep_init_map+0x100/0x5a0 [ 1214.835100] mount_fs+0xa3/0x310 [ 1214.838479] vfs_kern_mount.part.0+0x68/0x470 [ 1214.842974] do_mount+0x115c/0x2f50 [ 1214.846604] ? cmp_ex_sort+0xc0/0xc0 [ 1214.850328] ? __do_page_fault+0x180/0xd60 17:57:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000300000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1214.854568] ? copy_mount_string+0x40/0x40 [ 1214.858824] ? memset+0x20/0x40 [ 1214.862117] ? copy_mount_options+0x26f/0x380 [ 1214.866627] ksys_mount+0xcf/0x130 [ 1214.870170] __x64_sys_mount+0xba/0x150 [ 1214.874134] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1214.878715] do_syscall_64+0xf9/0x620 [ 1214.882529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1214.887728] RIP: 0033:0x7f350f3a961a 17:57:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1214.891447] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1214.910358] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1214.918080] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1214.925360] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1214.932641] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1214.939911] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1214.947186] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:11 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) 17:57:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 57) 17:57:11 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0xe00, 0x0, 0x0) 17:57:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x5) 17:57:11 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000280)=[{0x4, 0x0, 0x800}, {0x3, 0xffff}, {0x3, 0x5, 0x1800}], 0x3) 17:57:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:11 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x2, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) 17:57:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x6) 17:57:11 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x1428, 0x0, 0x0) 17:57:11 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x5421, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) [ 1215.257600] FAULT_INJECTION: forcing a failure. [ 1215.257600] name failslab, interval 1, probability 0, space 0, times 0 [ 1215.313381] CPU: 0 PID: 22658 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1215.321288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1215.330645] Call Trace: [ 1215.333246] dump_stack+0x1fc/0x2ef [ 1215.336886] should_fail.cold+0xa/0xf [ 1215.340709] ? setup_fault_attr+0x200/0x200 [ 1215.345040] ? lock_acquire+0x170/0x3c0 [ 1215.349032] __should_failslab+0x115/0x180 [ 1215.353265] should_failslab+0x5/0x10 [ 1215.357054] kmem_cache_alloc+0x277/0x370 [ 1215.361200] getname_kernel+0x4e/0x370 [ 1215.365088] kern_path+0x1b/0x40 [ 1215.368450] lookup_bdev+0xfc/0x220 [ 1215.372057] ? bd_acquire+0x440/0x440 [ 1215.375844] ? list_sort.part.0+0x523/0x790 [ 1215.380147] ? try_release_extent_buffer+0x3a0/0x3a0 [ 1215.385234] blkdev_get_by_path+0x1b/0xd0 [ 1215.389366] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 1215.393860] open_fs_devices+0x5a3/0xa50 [ 1215.397917] ? find_fsid+0xb0/0xb0 [ 1215.401456] ? debug_check_no_obj_freed+0x201/0x490 [ 1215.406471] btrfs_open_devices+0x114/0x150 [ 1215.410777] btrfs_mount_root+0xa60/0x1830 [ 1215.414998] ? btrfs_decode_error+0x70/0x70 [ 1215.419304] ? __mutex_unlock_slowpath+0xea/0x610 [ 1215.424134] ? check_preemption_disabled+0x41/0x280 [ 1215.429138] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1215.434136] ? pcpu_alloc+0xc9/0x1190 [ 1215.437921] ? __lockdep_init_map+0x100/0x5a0 [ 1215.442413] mount_fs+0xa3/0x310 [ 1215.445778] vfs_kern_mount.part.0+0x68/0x470 [ 1215.450257] ? kfree+0x110/0x210 [ 1215.453606] vfs_kern_mount+0x3c/0x60 [ 1215.457395] btrfs_mount+0x23a/0xaa0 [ 1215.461098] ? btrfs_show_options+0xfd0/0xfd0 [ 1215.465576] ? __mutex_unlock_slowpath+0xea/0x610 [ 1215.470404] ? check_preemption_disabled+0x41/0x280 [ 1215.475410] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1215.480409] ? pcpu_alloc+0xc9/0x1190 [ 1215.484213] ? __lockdep_init_map+0x100/0x5a0 [ 1215.488693] mount_fs+0xa3/0x310 [ 1215.492046] vfs_kern_mount.part.0+0x68/0x470 [ 1215.496527] do_mount+0x115c/0x2f50 [ 1215.500153] ? cmp_ex_sort+0xc0/0xc0 [ 1215.503877] ? __do_page_fault+0x180/0xd60 [ 1215.508105] ? copy_mount_string+0x40/0x40 [ 1215.512330] ? memset+0x20/0x40 [ 1215.515598] ? copy_mount_options+0x26f/0x380 [ 1215.520089] ksys_mount+0xcf/0x130 [ 1215.523633] __x64_sys_mount+0xba/0x150 [ 1215.527601] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1215.532170] do_syscall_64+0xf9/0x620 [ 1215.535959] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1215.541135] RIP: 0033:0x7f350f3a961a [ 1215.544838] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 17:57:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) 17:57:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x7) [ 1215.563738] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1215.571443] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1215.578703] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1215.585961] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1215.593219] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1215.600572] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 58) 17:57:12 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x5450, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) 17:57:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x2814, 0x0, 0x0) 17:57:12 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x5451, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) 17:57:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x8) [ 1215.825618] FAULT_INJECTION: forcing a failure. [ 1215.825618] name failslab, interval 1, probability 0, space 0, times 0 [ 1215.889710] CPU: 1 PID: 22690 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1215.897731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1215.907085] Call Trace: [ 1215.909674] dump_stack+0x1fc/0x2ef [ 1215.913298] should_fail.cold+0xa/0xf [ 1215.917088] ? setup_fault_attr+0x200/0x200 [ 1215.921397] ? lock_acquire+0x170/0x3c0 [ 1215.925366] __should_failslab+0x115/0x180 [ 1215.929592] should_failslab+0x5/0x10 [ 1215.933382] kmem_cache_alloc+0x277/0x370 [ 1215.937523] getname_kernel+0x4e/0x370 [ 1215.941400] kern_path+0x1b/0x40 [ 1215.944755] lookup_bdev+0xfc/0x220 [ 1215.948367] ? bd_acquire+0x440/0x440 [ 1215.952157] ? list_sort.part.0+0x523/0x790 [ 1215.956469] ? try_release_extent_buffer+0x3a0/0x3a0 [ 1215.961563] blkdev_get_by_path+0x1b/0xd0 [ 1215.965702] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 1215.970192] open_fs_devices+0x5a3/0xa50 [ 1215.974249] ? find_fsid+0xb0/0xb0 [ 1215.977779] ? debug_check_no_obj_freed+0x201/0x490 [ 1215.982800] btrfs_open_devices+0x114/0x150 [ 1215.987113] btrfs_mount_root+0xa60/0x1830 [ 1215.991349] ? btrfs_decode_error+0x70/0x70 [ 1215.995661] ? __mutex_unlock_slowpath+0xea/0x610 [ 1216.000498] ? check_preemption_disabled+0x41/0x280 [ 1216.005512] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1216.010521] ? pcpu_alloc+0xc9/0x1190 [ 1216.014312] ? __lockdep_init_map+0x100/0x5a0 [ 1216.018800] mount_fs+0xa3/0x310 [ 1216.022159] vfs_kern_mount.part.0+0x68/0x470 [ 1216.026649] ? kfree+0x110/0x210 [ 1216.030007] vfs_kern_mount+0x3c/0x60 [ 1216.033800] btrfs_mount+0x23a/0xaa0 [ 1216.037507] ? btrfs_show_options+0xfd0/0xfd0 [ 1216.041991] ? __mutex_unlock_slowpath+0xea/0x610 [ 1216.046835] ? check_preemption_disabled+0x41/0x280 [ 1216.051847] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1216.056852] ? pcpu_alloc+0xc9/0x1190 [ 1216.060643] ? __lockdep_init_map+0x100/0x5a0 [ 1216.065129] mount_fs+0xa3/0x310 [ 1216.068488] vfs_kern_mount.part.0+0x68/0x470 [ 1216.072977] do_mount+0x115c/0x2f50 [ 1216.076596] ? cmp_ex_sort+0xc0/0xc0 [ 1216.080304] ? __do_page_fault+0x180/0xd60 [ 1216.084616] ? copy_mount_string+0x40/0x40 [ 1216.088847] ? memset+0x20/0x40 [ 1216.092118] ? copy_mount_options+0x26f/0x380 [ 1216.096604] ksys_mount+0xcf/0x130 [ 1216.100137] __x64_sys_mount+0xba/0x150 [ 1216.104107] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1216.108683] do_syscall_64+0xf9/0x620 [ 1216.112477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1216.117655] RIP: 0033:0x7f350f3a961a [ 1216.121361] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1216.140246] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1216.147943] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1216.155200] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1216.162455] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1216.169711] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1216.176968] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x3e00, 0x0, 0x0) 17:57:12 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x5452, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) 17:57:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) 17:57:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 59) 17:57:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0xe) 17:57:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x4762, 0x0, 0x0) 17:57:12 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x5460, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) [ 1216.502955] FAULT_INJECTION: forcing a failure. [ 1216.502955] name failslab, interval 1, probability 0, space 0, times 0 [ 1216.514698] CPU: 0 PID: 22724 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1216.522588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1216.531949] Call Trace: [ 1216.534548] dump_stack+0x1fc/0x2ef [ 1216.538186] should_fail.cold+0xa/0xf [ 1216.541999] ? setup_fault_attr+0x200/0x200 [ 1216.546328] ? __lock_acquire+0x6de/0x3ff0 [ 1216.550579] __should_failslab+0x115/0x180 [ 1216.554823] should_failslab+0x5/0x10 [ 1216.558637] kmem_cache_alloc+0x3f/0x370 [ 1216.562711] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 1216.568347] __radix_tree_create+0x314/0x540 [ 1216.572763] page_cache_tree_insert+0xac/0x3f0 [ 1216.577334] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 1216.582778] ? lock_acquire+0x170/0x3c0 [ 1216.586763] ? __add_to_page_cache_locked+0x45e/0xb60 [ 1216.591952] __add_to_page_cache_locked+0x46e/0xb60 [ 1216.596956] ? page_cache_tree_insert+0x3f0/0x3f0 [ 1216.601801] add_to_page_cache_lru+0x16a/0x680 [ 1216.606395] ? add_to_page_cache_locked+0x40/0x40 [ 1216.611236] pagecache_get_page+0x478/0xd50 [ 1216.615546] __getblk_slow+0x216/0x9e0 [ 1216.619422] __bread_gfp+0x218/0x300 [ 1216.623134] btrfs_read_dev_super+0x8a/0x230 [ 1216.627548] btrfs_get_bdev_and_sb+0xf6/0x2f0 [ 1216.632038] open_fs_devices+0x5a3/0xa50 [ 1216.636091] ? find_fsid+0xb0/0xb0 [ 1216.639625] btrfs_open_devices+0x114/0x150 [ 1216.643949] btrfs_mount_root+0xa60/0x1830 [ 1216.648198] ? btrfs_decode_error+0x70/0x70 [ 1216.652522] ? __mutex_unlock_slowpath+0xea/0x610 [ 1216.657353] ? check_preemption_disabled+0x41/0x280 [ 1216.662370] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1216.667385] ? pcpu_alloc+0xc9/0x1190 [ 1216.671179] ? __lockdep_init_map+0x100/0x5a0 [ 1216.675658] mount_fs+0xa3/0x310 [ 1216.679012] vfs_kern_mount.part.0+0x68/0x470 [ 1216.683499] ? kfree+0x110/0x210 [ 1216.686869] vfs_kern_mount+0x3c/0x60 [ 1216.690667] btrfs_mount+0x23a/0xaa0 [ 1216.694379] ? btrfs_show_options+0xfd0/0xfd0 [ 1216.698861] ? __mutex_unlock_slowpath+0xea/0x610 [ 1216.703703] ? check_preemption_disabled+0x41/0x280 [ 1216.708717] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1216.713717] ? pcpu_alloc+0xc9/0x1190 [ 1216.717508] ? __lockdep_init_map+0x100/0x5a0 [ 1216.722004] mount_fs+0xa3/0x310 [ 1216.725379] vfs_kern_mount.part.0+0x68/0x470 [ 1216.729867] do_mount+0x115c/0x2f50 [ 1216.733485] ? cmp_ex_sort+0xc0/0xc0 [ 1216.737187] ? __do_page_fault+0x180/0xd60 [ 1216.741420] ? copy_mount_string+0x40/0x40 [ 1216.745667] ? memset+0x20/0x40 [ 1216.748940] ? copy_mount_options+0x26f/0x380 [ 1216.753421] ksys_mount+0xcf/0x130 [ 1216.756947] __x64_sys_mount+0xba/0x150 [ 1216.760916] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1216.765503] do_syscall_64+0xf9/0x620 [ 1216.769300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1216.774473] RIP: 0033:0x7f350f3a961a [ 1216.778169] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1216.797058] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:57:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x10) 17:57:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1216.804772] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1216.812035] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1216.819290] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1216.826550] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1216.833816] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000100000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 60) 17:57:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) semget(0x3, 0x3, 0x0) semget$private(0x0, 0x20000000102, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) 17:57:13 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x8901, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) 17:57:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x6247, 0x0, 0x0) 17:57:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x3e) 17:57:13 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x8902, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) 17:57:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1217.057880] FAULT_INJECTION: forcing a failure. [ 1217.057880] name failslab, interval 1, probability 0, space 0, times 0 [ 1217.125711] CPU: 0 PID: 22748 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1217.133627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1217.142986] Call Trace: [ 1217.145587] dump_stack+0x1fc/0x2ef [ 1217.149239] should_fail.cold+0xa/0xf [ 1217.153054] ? setup_fault_attr+0x200/0x200 [ 1217.157384] ? __lock_acquire+0x6de/0x3ff0 [ 1217.161640] __should_failslab+0x115/0x180 [ 1217.165888] should_failslab+0x5/0x10 [ 1217.169702] kmem_cache_alloc+0x3f/0x370 [ 1217.173772] ? mempool_alloc+0x350/0x350 [ 1217.177840] mempool_alloc+0x146/0x350 [ 1217.181740] ? lock_acquire+0x170/0x3c0 [ 1217.185722] ? mempool_resize+0x790/0x790 [ 1217.189890] ? check_preemption_disabled+0x41/0x280 [ 1217.194923] ? alloc_buffer_head+0x20/0x130 [ 1217.199261] bio_alloc_bioset+0x389/0x5e0 [ 1217.203428] ? alloc_page_buffers+0x2da/0x5c0 [ 1217.207932] ? bvec_alloc+0x2f0/0x2f0 [ 1217.211740] ? do_raw_spin_lock+0xcb/0x220 [ 1217.215985] ? create_empty_buffers+0x4e7/0x760 [ 1217.220668] submit_bh_wbc+0x141/0x760 [ 1217.224574] block_read_full_page+0x7cf/0xd10 [ 1217.229081] ? block_llseek+0xc0/0xc0 [ 1217.232900] ? __bread_gfp+0x300/0x300 [ 1217.236802] ? add_to_page_cache_locked+0x40/0x40 [ 1217.241667] do_read_cache_page+0x533/0x1170 [ 1217.246074] ? blkdev_writepages+0x20/0x20 [ 1217.250297] btrfs_scan_one_device+0x195/0xd00 [ 1217.254868] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1217.259968] ? debug_check_no_obj_freed+0x201/0x490 [ 1217.264981] ? device_list_add+0xdd0/0xdd0 [ 1217.269201] ? kfree+0x110/0x210 [ 1217.272563] ? btrfs_mount_root+0x107a/0x1830 [ 1217.277052] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1217.281633] btrfs_mount_root+0x9df/0x1830 [ 1217.285873] ? btrfs_decode_error+0x70/0x70 [ 1217.290178] ? __mutex_unlock_slowpath+0xea/0x610 [ 1217.295009] ? check_preemption_disabled+0x41/0x280 [ 1217.300014] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1217.305016] ? pcpu_alloc+0xc9/0x1190 [ 1217.308803] ? __lockdep_init_map+0x100/0x5a0 [ 1217.313302] mount_fs+0xa3/0x310 [ 1217.316679] vfs_kern_mount.part.0+0x68/0x470 [ 1217.321177] ? kfree+0x110/0x210 [ 1217.324539] vfs_kern_mount+0x3c/0x60 [ 1217.328325] btrfs_mount+0x23a/0xaa0 [ 1217.332037] ? btrfs_show_options+0xfd0/0xfd0 [ 1217.336530] ? __mutex_unlock_slowpath+0xea/0x610 [ 1217.341373] ? check_preemption_disabled+0x41/0x280 [ 1217.346409] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1217.351426] ? pcpu_alloc+0xc9/0x1190 [ 1217.355223] ? __lockdep_init_map+0x100/0x5a0 [ 1217.359704] mount_fs+0xa3/0x310 [ 1217.363077] vfs_kern_mount.part.0+0x68/0x470 [ 1217.367566] do_mount+0x115c/0x2f50 [ 1217.371192] ? cmp_ex_sort+0xc0/0xc0 [ 1217.374898] ? __do_page_fault+0x180/0xd60 [ 1217.379128] ? copy_mount_string+0x40/0x40 [ 1217.383374] ? memset+0x20/0x40 [ 1217.386649] ? copy_mount_options+0x26f/0x380 [ 1217.391142] ksys_mount+0xcf/0x130 [ 1217.394693] __x64_sys_mount+0xba/0x150 [ 1217.398669] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1217.403253] do_syscall_64+0xf9/0x620 [ 1217.407051] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1217.412235] RIP: 0033:0x7f350f3a961a [ 1217.415941] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1217.434829] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1217.442535] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1217.449798] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1217.457059] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1217.464318] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 17:57:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x34000, 0x0, 0x0) [ 1217.471588] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) semget(0x3, 0x3, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) 17:57:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x500) 17:57:14 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x8903, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) 17:57:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000103000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 61) 17:57:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x400300, 0x0, 0x0) 17:57:14 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x8904, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) 17:57:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x600) 17:57:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="3aa10685e3b806853c45febfe2632ec9d97aaf19e6f65c59dd200e07e2181b9e3ef4e72bbd40425ea16abfe806a542dc00000104000000000100fffffff600005f42485266535f4d07000000000000000000500000000000001010000007cdc58f00000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000000f32dd61b0833c0cdae0e4b0300000000000000019900000045019f455c2b008853e8dfa44319bba719fd4c4a94b97206c0e41f9e6025d66a41505324557bbd6443b4da52066094557502ca3b312e8936e1b3901fce6b00e3f9417d28c74781f0cdabb601478fdad45b5bd772787fcfa22b48a06597fc48d14f1c65a940607b6a2242ebd9ecf257", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) semget(0x3, 0x3, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) [ 1217.846272] FAULT_INJECTION: forcing a failure. [ 1217.846272] name failslab, interval 1, probability 0, space 0, times 0 [ 1217.857503] CPU: 0 PID: 22789 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1217.865388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1217.874743] Call Trace: [ 1217.877338] dump_stack+0x1fc/0x2ef [ 1217.880965] should_fail.cold+0xa/0xf [ 1217.884760] ? setup_fault_attr+0x200/0x200 [ 1217.889073] ? __lock_acquire+0x6de/0x3ff0 [ 1217.893299] __should_failslab+0x115/0x180 [ 1217.897528] should_failslab+0x5/0x10 [ 1217.901323] kmem_cache_alloc+0x3f/0x370 [ 1217.905379] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 1217.910995] __radix_tree_create+0x314/0x540 [ 1217.915421] page_cache_tree_insert+0xac/0x3f0 [ 1217.919994] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 1217.925437] ? lock_acquire+0x170/0x3c0 [ 1217.929401] ? __add_to_page_cache_locked+0x45e/0xb60 [ 1217.934589] __add_to_page_cache_locked+0x46e/0xb60 [ 1217.939599] ? page_cache_tree_insert+0x3f0/0x3f0 [ 1217.944443] add_to_page_cache_lru+0x16a/0x680 [ 1217.949015] ? add_to_page_cache_locked+0x40/0x40 [ 1217.953862] pagecache_get_page+0x478/0xd50 [ 1217.958178] __getblk_slow+0x216/0x9e0 [ 1217.962060] __bread_gfp+0x218/0x300 [ 1217.965766] btrfs_read_dev_super+0x8a/0x230 [ 1217.970166] btrfs_get_bdev_and_sb+0xf6/0x2f0 [ 1217.974652] open_fs_devices+0x5a3/0xa50 [ 1217.978704] ? find_fsid+0xb0/0xb0 [ 1217.982239] btrfs_open_devices+0x114/0x150 [ 1217.986551] btrfs_mount_root+0xa60/0x1830 [ 1217.990779] ? btrfs_decode_error+0x70/0x70 [ 1217.995094] ? __mutex_unlock_slowpath+0xea/0x610 [ 1217.999928] ? check_preemption_disabled+0x41/0x280 [ 1218.004941] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1218.009943] ? pcpu_alloc+0xc9/0x1190 [ 1218.013734] ? __lockdep_init_map+0x100/0x5a0 [ 1218.018219] mount_fs+0xa3/0x310 [ 1218.021577] vfs_kern_mount.part.0+0x68/0x470 [ 1218.026069] ? kfree+0x110/0x210 [ 1218.029426] vfs_kern_mount+0x3c/0x60 [ 1218.033216] btrfs_mount+0x23a/0xaa0 [ 1218.036919] ? btrfs_show_options+0xfd0/0xfd0 [ 1218.041404] ? __mutex_unlock_slowpath+0xea/0x610 [ 1218.046240] ? check_preemption_disabled+0x41/0x280 [ 1218.051250] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1218.056252] ? pcpu_alloc+0xc9/0x1190 [ 1218.060042] ? __lockdep_init_map+0x100/0x5a0 [ 1218.064526] mount_fs+0xa3/0x310 [ 1218.067903] vfs_kern_mount.part.0+0x68/0x470 [ 1218.072418] do_mount+0x115c/0x2f50 [ 1218.076049] ? cmp_ex_sort+0xc0/0xc0 [ 1218.079759] ? __do_page_fault+0x180/0xd60 [ 1218.083983] ? copy_mount_string+0x40/0x40 [ 1218.088212] ? memset+0x20/0x40 [ 1218.091484] ? copy_mount_options+0x26f/0x380 [ 1218.095970] ksys_mount+0xcf/0x130 [ 1218.099503] __x64_sys_mount+0xba/0x150 [ 1218.103469] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1218.108042] do_syscall_64+0xf9/0x620 [ 1218.111832] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1218.117014] RIP: 0033:0x7f350f3a961a [ 1218.120714] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1218.139600] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:57:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x1000000, 0x0, 0x0) [ 1218.147293] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1218.154554] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1218.161808] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1218.169079] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1218.176335] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:14 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x8906, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) 17:57:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x700) 17:57:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x2000000, 0x0, 0x0) 17:57:14 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x8907, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) 17:57:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 62) 17:57:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0xe00) 17:57:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) semget(0x3, 0x3, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) 17:57:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:15 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) 17:57:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x4000000, 0x0, 0x0) 17:57:15 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x8914, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) [ 1218.603839] FAULT_INJECTION: forcing a failure. [ 1218.603839] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1218.615672] CPU: 1 PID: 22834 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1218.623566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1218.632930] Call Trace: [ 1218.635530] dump_stack+0x1fc/0x2ef [ 1218.639180] should_fail.cold+0xa/0xf [ 1218.642994] ? setup_fault_attr+0x200/0x200 [ 1218.647355] __alloc_pages_nodemask+0x239/0x2890 [ 1218.652133] ? mark_held_locks+0xf0/0xf0 [ 1218.656203] ? mark_held_locks+0xf0/0xf0 [ 1218.660278] ? __lock_acquire+0x6de/0x3ff0 [ 1218.664531] ? __lock_acquire+0x6de/0x3ff0 [ 1218.668783] ? perf_trace_lock_acquire+0x530/0x530 [ 1218.673729] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1218.678585] ? check_preemption_disabled+0x41/0x280 [ 1218.683617] ? perf_trace_lock+0xe2/0x4b0 [ 1218.687781] ? perf_trace_lock_acquire+0x530/0x530 [ 1218.692717] ? __blkdev_put+0x562/0x870 [ 1218.696708] cache_grow_begin+0xa4/0x8a0 17:57:15 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x8916, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) [ 1218.700781] ? setup_fault_attr+0x200/0x200 [ 1218.705117] ? lock_acquire+0x170/0x3c0 [ 1218.709114] cache_alloc_refill+0x273/0x340 [ 1218.713452] kmem_cache_alloc+0x346/0x370 [ 1218.717617] getname_kernel+0x4e/0x370 [ 1218.721516] kern_path+0x1b/0x40 [ 1218.724887] lookup_bdev+0xfc/0x220 [ 1218.728523] ? bd_acquire+0x440/0x440 [ 1218.732342] blkdev_get_by_path+0x1b/0xd0 [ 1218.736589] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 1218.741095] open_fs_devices+0x5a3/0xa50 [ 1218.745163] ? find_fsid+0xb0/0xb0 [ 1218.748815] btrfs_open_devices+0x114/0x150 17:57:15 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x8918, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) [ 1218.753149] btrfs_mount_root+0xa60/0x1830 [ 1218.757405] ? btrfs_decode_error+0x70/0x70 [ 1218.761738] ? __mutex_unlock_slowpath+0xea/0x610 [ 1218.766604] ? check_preemption_disabled+0x41/0x280 [ 1218.771634] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1218.776660] ? pcpu_alloc+0xc9/0x1190 [ 1218.780473] ? __lockdep_init_map+0x100/0x5a0 [ 1218.784981] mount_fs+0xa3/0x310 [ 1218.788362] vfs_kern_mount.part.0+0x68/0x470 [ 1218.792866] ? kfree+0x110/0x210 [ 1218.796242] vfs_kern_mount+0x3c/0x60 [ 1218.800037] btrfs_mount+0x23a/0xaa0 17:57:15 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x8936, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) [ 1218.803755] ? btrfs_show_options+0xfd0/0xfd0 [ 1218.808259] ? __mutex_unlock_slowpath+0xea/0x610 [ 1218.813121] ? check_preemption_disabled+0x41/0x280 [ 1218.818150] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1218.823166] ? pcpu_alloc+0xc9/0x1190 [ 1218.826979] ? __lockdep_init_map+0x100/0x5a0 [ 1218.831488] mount_fs+0xa3/0x310 [ 1218.834872] vfs_kern_mount.part.0+0x68/0x470 [ 1218.839382] do_mount+0x115c/0x2f50 [ 1218.843021] ? cmp_ex_sort+0xc0/0xc0 [ 1218.846824] ? __do_page_fault+0x180/0xd60 17:57:15 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x8940, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) [ 1218.851061] ? copy_mount_string+0x40/0x40 [ 1218.855316] ? memset+0x20/0x40 [ 1218.858607] ? copy_mount_options+0x26f/0x380 [ 1218.863101] ksys_mount+0xcf/0x130 [ 1218.866659] __x64_sys_mount+0xba/0x150 [ 1218.870643] ? do_syscall_64+0x56/0x620 [ 1218.874626] do_syscall_64+0xf9/0x620 [ 1218.878440] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1218.883632] RIP: 0033:0x7f350f3a961a 17:57:15 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x8941, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) [ 1218.887350] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1218.906256] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1218.913973] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1218.921242] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1218.928512] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1218.935791] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1218.943070] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 63) 17:57:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200}, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x4, 0x0) semget$private(0x0, 0x20000000102, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) 17:57:15 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x1428) 17:57:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x5000000, 0x0, 0x0) 17:57:15 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x894c, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) 17:57:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x6000000, 0x0, 0x0) 17:57:15 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x2814) 17:57:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:15 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x8980, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) [ 1219.272325] FAULT_INJECTION: forcing a failure. [ 1219.272325] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.334110] CPU: 0 PID: 22877 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1219.342030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1219.351394] Call Trace: [ 1219.353990] dump_stack+0x1fc/0x2ef [ 1219.357625] should_fail.cold+0xa/0xf [ 1219.361427] ? setup_fault_attr+0x200/0x200 [ 1219.365738] ? perf_trace_lock_acquire+0x530/0x530 [ 1219.370663] ? check_preemption_disabled+0x41/0x280 [ 1219.375686] __should_failslab+0x115/0x180 [ 1219.379915] should_failslab+0x5/0x10 [ 1219.383710] kmem_cache_alloc+0x3f/0x370 [ 1219.387754] ? mempool_alloc+0x350/0x350 [ 1219.391817] mempool_alloc+0x146/0x350 [ 1219.395719] ? mempool_resize+0x790/0x790 [ 1219.399878] ? lock_downgrade+0x720/0x720 [ 1219.404014] ? mark_held_locks+0xa6/0xf0 [ 1219.408089] bio_alloc_bioset+0x389/0x5e0 [ 1219.412236] ? __find_get_block+0x314/0xde0 [ 1219.416560] ? bvec_alloc+0x2f0/0x2f0 [ 1219.420352] ? __getblk_slow+0x6a3/0x9e0 [ 1219.424395] submit_bh_wbc+0x141/0x760 [ 1219.428268] __bread_gfp+0x14e/0x300 [ 1219.431977] btrfs_read_dev_super+0x8a/0x230 [ 1219.436386] btrfs_get_bdev_and_sb+0xf6/0x2f0 [ 1219.440873] open_fs_devices+0x5a3/0xa50 [ 1219.444917] ? find_fsid+0xb0/0xb0 [ 1219.448546] btrfs_open_devices+0x114/0x150 [ 1219.452881] btrfs_mount_root+0xa60/0x1830 [ 1219.457114] ? btrfs_decode_error+0x70/0x70 [ 1219.461418] ? __mutex_unlock_slowpath+0xea/0x610 [ 1219.466244] ? check_preemption_disabled+0x41/0x280 [ 1219.471270] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1219.476291] ? pcpu_alloc+0xc9/0x1190 [ 1219.480098] ? __lockdep_init_map+0x100/0x5a0 [ 1219.484591] mount_fs+0xa3/0x310 [ 1219.487944] vfs_kern_mount.part.0+0x68/0x470 [ 1219.492428] ? kfree+0x110/0x210 [ 1219.495962] vfs_kern_mount+0x3c/0x60 [ 1219.499747] btrfs_mount+0x23a/0xaa0 [ 1219.503462] ? btrfs_show_options+0xfd0/0xfd0 [ 1219.507948] ? __mutex_unlock_slowpath+0xea/0x610 [ 1219.512791] ? check_preemption_disabled+0x41/0x280 [ 1219.517812] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1219.522826] ? pcpu_alloc+0xc9/0x1190 [ 1219.526626] ? __lockdep_init_map+0x100/0x5a0 [ 1219.531123] mount_fs+0xa3/0x310 [ 1219.534487] vfs_kern_mount.part.0+0x68/0x470 [ 1219.538971] do_mount+0x115c/0x2f50 [ 1219.542594] ? cmp_ex_sort+0xc0/0xc0 [ 1219.546303] ? __do_page_fault+0x180/0xd60 [ 1219.550527] ? copy_mount_string+0x40/0x40 [ 1219.554776] ? memset+0x20/0x40 [ 1219.558062] ? copy_mount_options+0x26f/0x380 [ 1219.562562] ksys_mount+0xcf/0x130 [ 1219.566095] __x64_sys_mount+0xba/0x150 [ 1219.570053] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1219.574617] do_syscall_64+0xf9/0x620 [ 1219.578403] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1219.583590] RIP: 0033:0x7f350f3a961a [ 1219.587301] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1219.606221] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1219.613923] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1219.621193] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 17:57:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) semget(0x2, 0x4, 0x0) semget$private(0x0, 0x20000000102, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) [ 1219.628456] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1219.635722] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1219.643001] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x3e00) 17:57:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 64) 17:57:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x8000000, 0x0, 0x0) 17:57:16 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x8981, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) 17:57:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x4762) 17:57:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000180)=ANY=[]) semget(0x2, 0x4, 0x0) semget$private(0x0, 0x20000000102, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) 17:57:16 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x8982, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) 17:57:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0xe000000, 0x0, 0x0) [ 1219.954875] FAULT_INJECTION: forcing a failure. [ 1219.954875] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1219.966716] CPU: 0 PID: 22920 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1219.974624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1219.983985] Call Trace: [ 1219.986586] dump_stack+0x1fc/0x2ef [ 1219.990229] should_fail.cold+0xa/0xf [ 1219.994040] ? setup_fault_attr+0x200/0x200 [ 1219.998379] __alloc_pages_nodemask+0x239/0x2890 [ 1220.003151] ? mark_held_locks+0xf0/0xf0 [ 1220.007222] ? mark_held_locks+0xf0/0xf0 [ 1220.011293] ? __lock_acquire+0x6de/0x3ff0 [ 1220.015532] ? __lock_acquire+0x6de/0x3ff0 [ 1220.019774] ? __lock_acquire+0x6de/0x3ff0 [ 1220.024014] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1220.028880] ? lo_release+0x109/0x1f0 [ 1220.032686] ? __blkdev_put+0x6c4/0x870 [ 1220.036670] cache_grow_begin+0xa4/0x8a0 [ 1220.040738] ? setup_fault_attr+0x200/0x200 [ 1220.045054] ? lock_acquire+0x170/0x3c0 [ 1220.049027] cache_alloc_refill+0x273/0x340 [ 1220.053352] kmem_cache_alloc+0x346/0x370 [ 1220.057495] getname_kernel+0x4e/0x370 [ 1220.061369] kern_path+0x1b/0x40 [ 1220.064717] lookup_bdev+0xfc/0x220 [ 1220.068326] ? bd_acquire+0x440/0x440 [ 1220.072127] blkdev_get_by_path+0x1b/0xd0 [ 1220.076280] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 1220.080773] open_fs_devices+0x5a3/0xa50 [ 1220.084828] ? find_fsid+0xb0/0xb0 [ 1220.088356] btrfs_open_devices+0x114/0x150 [ 1220.092673] btrfs_mount_root+0xa60/0x1830 [ 1220.096909] ? btrfs_decode_error+0x70/0x70 [ 1220.101217] ? __mutex_unlock_slowpath+0xea/0x610 [ 1220.106054] ? check_preemption_disabled+0x41/0x280 [ 1220.111069] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1220.116090] ? pcpu_alloc+0xc9/0x1190 [ 1220.119884] ? __lockdep_init_map+0x100/0x5a0 [ 1220.124365] mount_fs+0xa3/0x310 [ 1220.127738] vfs_kern_mount.part.0+0x68/0x470 [ 1220.132233] ? kfree+0x110/0x210 [ 1220.135607] vfs_kern_mount+0x3c/0x60 [ 1220.139412] btrfs_mount+0x23a/0xaa0 [ 1220.143115] ? btrfs_show_options+0xfd0/0xfd0 [ 1220.147594] ? __mutex_unlock_slowpath+0xea/0x610 [ 1220.152437] ? check_preemption_disabled+0x41/0x280 [ 1220.157450] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1220.162454] ? pcpu_alloc+0xc9/0x1190 [ 1220.166244] ? __lockdep_init_map+0x100/0x5a0 [ 1220.170738] mount_fs+0xa3/0x310 [ 1220.174113] vfs_kern_mount.part.0+0x68/0x470 [ 1220.178612] do_mount+0x115c/0x2f50 [ 1220.182226] ? cmp_ex_sort+0xc0/0xc0 [ 1220.185933] ? __do_page_fault+0x180/0xd60 [ 1220.190155] ? copy_mount_string+0x40/0x40 [ 1220.194398] ? memset+0x20/0x40 [ 1220.197672] ? copy_mount_options+0x26f/0x380 [ 1220.202157] ksys_mount+0xcf/0x130 [ 1220.205684] __x64_sys_mount+0xba/0x150 [ 1220.209652] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1220.214231] do_syscall_64+0xf9/0x620 [ 1220.218031] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1220.223213] RIP: 0033:0x7f350f3a961a [ 1220.226939] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1220.245825] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:57:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x6247) [ 1220.253531] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1220.260801] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1220.268063] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1220.275327] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1220.282593] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 17:57:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) (fail_nth: 65) 17:57:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) semget(0x2, 0x4, 0x0) semget$private(0x0, 0x20000000102, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002040)=""/15) 17:57:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x10000000, 0x0, 0x0) 17:57:16 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x8983, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) 17:57:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) 17:57:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x34000) [ 1220.536502] FAULT_INJECTION: forcing a failure. [ 1220.536502] name failslab, interval 1, probability 0, space 0, times 0 [ 1220.569374] CPU: 0 PID: 22951 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1220.577284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1220.586641] Call Trace: [ 1220.589240] dump_stack+0x1fc/0x2ef [ 1220.592885] should_fail.cold+0xa/0xf [ 1220.596698] ? setup_fault_attr+0x200/0x200 [ 1220.601027] ? lock_acquire+0x170/0x3c0 [ 1220.605017] __should_failslab+0x115/0x180 [ 1220.609430] should_failslab+0x5/0x10 [ 1220.613227] kmem_cache_alloc_trace+0x284/0x380 [ 1220.617901] btrfs_alloc_device+0xae/0x670 [ 1220.622133] ? __call_rcu.constprop.0+0x245/0x7f0 [ 1220.626983] ? btrfs_finish_sprout+0x6c0/0x6c0 [ 1220.631577] ? lockdep_hardirqs_on+0x3a8/0x5c0 17:57:17 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) 17:57:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1220.636173] ? __kmalloc+0x38e/0x3c0 [ 1220.639892] ? close_fs_devices.part.0+0x2c9/0x8e0 [ 1220.644832] close_fs_devices.part.0+0x263/0x8e0 [ 1220.649602] btrfs_close_devices+0x95/0x1f0 [ 1220.653940] btrfs_mount_root+0x10b9/0x1830 [ 1220.658259] ? btrfs_decode_error+0x70/0x70 [ 1220.662565] ? __mutex_unlock_slowpath+0xea/0x610 [ 1220.667410] ? check_preemption_disabled+0x41/0x280 [ 1220.672428] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1220.677438] ? pcpu_alloc+0xc9/0x1190 [ 1220.681234] ? __lockdep_init_map+0x100/0x5a0 [ 1220.685809] mount_fs+0xa3/0x310 [ 1220.689167] vfs_kern_mount.part.0+0x68/0x470 [ 1220.693655] ? kfree+0x110/0x210 [ 1220.697012] vfs_kern_mount+0x3c/0x60 [ 1220.700811] btrfs_mount+0x23a/0xaa0 [ 1220.704518] ? btrfs_show_options+0xfd0/0xfd0 [ 1220.708993] ? __mutex_unlock_slowpath+0xea/0x610 [ 1220.713834] ? check_preemption_disabled+0x41/0x280 [ 1220.718848] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1220.723847] ? pcpu_alloc+0xc9/0x1190 [ 1220.727628] ? __lockdep_init_map+0x100/0x5a0 [ 1220.732125] mount_fs+0xa3/0x310 [ 1220.735493] vfs_kern_mount.part.0+0x68/0x470 [ 1220.739972] do_mount+0x115c/0x2f50 [ 1220.743589] ? cmp_ex_sort+0xc0/0xc0 [ 1220.747289] ? __do_page_fault+0x180/0xd60 [ 1220.751520] ? copy_mount_string+0x40/0x40 [ 1220.755764] ? memset+0x20/0x40 [ 1220.759035] ? copy_mount_options+0x26f/0x380 [ 1220.763515] ksys_mount+0xcf/0x130 [ 1220.767042] __x64_sys_mount+0xba/0x150 [ 1220.771010] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1220.775584] do_syscall_64+0xf9/0x620 [ 1220.779369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1220.784540] RIP: 0033:0x7f350f3a961a [ 1220.788234] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1220.807117] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1220.814809] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1220.822063] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1220.829317] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1220.836577] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1220.843840] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 [ 1220.854678] ------------[ cut here ]------------ [ 1220.859445] kernel BUG at fs/btrfs/volumes.c:1061! [ 1220.864912] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1220.870290] CPU: 0 PID: 22951 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1220.878171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1220.887530] RIP: 0010:close_fs_devices.part.0+0x6b0/0x8e0 [ 1220.893061] Code: 03 0f 8e 27 01 00 00 48 8b 44 24 20 c7 80 10 01 00 00 00 00 00 00 48 83 c4 48 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 70 ad 71 fe <0f> 0b e8 69 ad 71 fe 0f 0b e8 22 8d a7 fe e9 17 fd ff ff 48 8b 7c [ 1220.911957] RSP: 0018:ffff88805814f838 EFLAGS: 00010246 [ 1220.917307] RAX: 0000000000040000 RBX: ffff88809ec7e0c0 RCX: ffffc9000b37e000 [ 1220.924569] RDX: 0000000000040000 RSI: ffffffff82f0d800 RDI: 0000000000000007 [ 1220.931825] RBP: 0000000000000000 R08: 0000000000000000 R09: fffffffffffff000 [ 1220.939086] R10: 0000000000000007 R11: 0000000000000000 R12: 4a4cfd19a7bb1943 [ 1220.946343] R13: fffffffffffffff4 R14: dffffc0000000000 R15: ffff8880aabf8040 [ 1220.953602] FS: 00007f350dd1d700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 1220.961815] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1220.967682] CR2: 00007f05ce825000 CR3: 00000000a9301000 CR4: 00000000003406f0 [ 1220.974942] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1220.982199] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1220.989455] Call Trace: [ 1220.992045] btrfs_close_devices+0x95/0x1f0 [ 1220.996361] btrfs_mount_root+0x10b9/0x1830 [ 1221.000692] ? btrfs_decode_error+0x70/0x70 [ 1221.005008] ? __mutex_unlock_slowpath+0xea/0x610 [ 1221.009850] ? check_preemption_disabled+0x41/0x280 [ 1221.014862] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1221.019870] ? pcpu_alloc+0xc9/0x1190 [ 1221.023663] ? __lockdep_init_map+0x100/0x5a0 [ 1221.028152] mount_fs+0xa3/0x310 [ 1221.031512] vfs_kern_mount.part.0+0x68/0x470 [ 1221.036001] ? kfree+0x110/0x210 [ 1221.039364] vfs_kern_mount+0x3c/0x60 [ 1221.043158] btrfs_mount+0x23a/0xaa0 [ 1221.046866] ? btrfs_show_options+0xfd0/0xfd0 [ 1221.051352] ? __mutex_unlock_slowpath+0xea/0x610 [ 1221.056188] ? check_preemption_disabled+0x41/0x280 [ 1221.061200] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1221.066207] ? pcpu_alloc+0xc9/0x1190 [ 1221.069998] ? __lockdep_init_map+0x100/0x5a0 [ 1221.074485] mount_fs+0xa3/0x310 [ 1221.077848] vfs_kern_mount.part.0+0x68/0x470 [ 1221.082338] do_mount+0x115c/0x2f50 [ 1221.085958] ? cmp_ex_sort+0xc0/0xc0 [ 1221.089666] ? __do_page_fault+0x180/0xd60 [ 1221.093892] ? copy_mount_string+0x40/0x40 [ 1221.098123] ? memset+0x20/0x40 [ 1221.101397] ? copy_mount_options+0x26f/0x380 [ 1221.105884] ksys_mount+0xcf/0x130 [ 1221.109418] __x64_sys_mount+0xba/0x150 [ 1221.113382] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1221.117954] do_syscall_64+0xf9/0x620 [ 1221.121761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1221.126938] RIP: 0033:0x7f350f3a961a [ 1221.130640] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1221.149527] RSP: 002b:00007f350dd1cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1221.157224] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f350f3a961a [ 1221.164482] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f350dd1cfe0 [ 1221.171741] RBP: 00007f350dd1d020 R08: 00007f350dd1d020 R09: 0000000020000000 [ 1221.179001] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 17:57:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x14280000, 0x0, 0x0) [ 1221.186259] R13: 0000000020000100 R14: 00007f350dd1cfe0 R15: 0000000020000080 [ 1221.193528] Modules linked in: [ 1221.199560] ---[ end trace 32dbc50e9c5b46c8 ]--- [ 1221.199584] RIP: 0010:close_fs_devices.part.0+0x6b0/0x8e0 [ 1221.199600] Code: 03 0f 8e 27 01 00 00 48 8b 44 24 20 c7 80 10 01 00 00 00 00 00 00 48 83 c4 48 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 70 ad 71 fe <0f> 0b e8 69 ad 71 fe 0f 0b e8 22 8d a7 fe e9 17 fd ff ff 48 8b 7c [ 1221.233752] RSP: 0018:ffff88805814f838 EFLAGS: 00010246 17:57:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03236473e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x400300) [ 1221.254327] RAX: 0000000000040000 RBX: ffff88809ec7e0c0 RCX: ffffc9000b37e000 [ 1221.264792] RDX: 0000000000040000 RSI: ffffffff82f0d800 RDI: 0000000000000007 17:57:17 executing program 3: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a1, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e20086, r3}) 17:57:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000080)) [ 1221.298925] RBP: 0000000000000000 R08: 0000000000000000 R09: fffffffffffff000 [ 1221.328683] R10: 0000000000000007 R11: 0000000000000000 R12: 4a4cfd19a7bb1943 [ 1221.357105] R13: fffffffffffffff4 R14: dffffc0000000000 R15: ffff8880aabf8040 [ 1221.382779] FS: 00007f350dd1d700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 1221.417246] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1221.445751] CR2: 000055859662f8b8 CR3: 00000000a9301000 CR4: 00000000003406e0 [ 1221.460844] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1221.473249] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1221.481363] Kernel panic - not syncing: Fatal exception [ 1221.486906] Kernel Offset: disabled [ 1221.490525] Rebooting in 86400 seconds..