11: 0000000000000246 R12: 0000000000000004 [ 1276.148535][T16010] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1276.196706][T16010] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:12:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x20000) 02:12:59 executing program 2 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:12:59 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socket(0xa, 0x2, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) setresuid(0x0, r3, r1) mount$9p_virtio(&(0x7f0000000080)='\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x200000, &(0x7f0000000140)={'trans=virtio,', {[{@uname={'uname'}}, {@dfltuid={'dfltuid', 0x3d, r3}}, {@uname={'uname', 0x3d, '\x00\xc3\t\xbb\x0f\xac\x03,'}}, {@nodevmap='nodevmap'}, {@version_u='version=9p2000.u'}, {@fscache='fscache'}, {@version_9p2000='version=9p2000'}, {@cachetag={'cachetag', 0x3d, '\x00\xc3\t\xbb\x0f\xac\x03,'}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@dont_measure='dont_measure'}]}}) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') r5 = gettid() tkill(r5, 0x3c) openat(r4, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000040)={0x20, 0x20001000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10) ioctl$TIOCGETD(r4, 0x5424, &(0x7f0000000200)) [ 1276.268058][T16037] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1276.294688][T16037] IPVS: set_ctl: invalid protocol: 66 0.0.0.0:21 [ 1276.460475][T16056] FAULT_INJECTION: forcing a failure. [ 1276.460475][T16056] name failslab, interval 1, probability 0, space 0, times 0 [ 1276.479027][T16056] CPU: 1 PID: 16056 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1276.486961][T16056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1276.497015][T16056] Call Trace: [ 1276.500300][T16056] dump_stack+0x1d8/0x2f8 [ 1276.504656][T16056] should_fail+0x555/0x770 [ 1276.509073][T16056] __should_failslab+0x11a/0x160 [ 1276.513997][T16056] ? __kernfs_new_node+0x97/0x6b0 [ 1276.519054][T16056] should_failslab+0x9/0x20 [ 1276.523538][T16056] kmem_cache_alloc+0x56/0x2e0 [ 1276.528280][T16056] __kernfs_new_node+0x97/0x6b0 [ 1276.533116][T16056] ? __kasan_check_write+0x14/0x20 [ 1276.538204][T16056] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 1276.543825][T16056] kernfs_new_node+0x97/0x170 [ 1276.548514][T16056] __kernfs_create_file+0x4a/0x2f0 [ 1276.553616][T16056] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1276.558988][T16056] internal_create_group+0x4be/0xd80 [ 1276.564260][T16056] sysfs_create_group+0x1f/0x30 [ 1276.569087][T16056] loop_set_fd+0xf54/0x1470 [ 1276.573576][T16056] lo_ioctl+0xd5/0x2200 [ 1276.577708][T16056] ? __kasan_slab_free+0x12a/0x1e0 [ 1276.582794][T16056] ? kasan_slab_free+0xe/0x10 [ 1276.587447][T16056] ? kfree+0x115/0x200 [ 1276.591490][T16056] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1276.597123][T16056] ? tomoyo_file_ioctl+0x23/0x30 [ 1276.602041][T16056] ? security_file_ioctl+0x6d/0xd0 02:12:59 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, 0x0, &(0x7f0000000080)) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x0) 02:12:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 02:12:59 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x4, 0xc18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000080), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x5, 0x2, 0x15, 'nr0\x00', 'syz_tun\x00', 'bpq0\x00', 'team_slave_1\x00', @random="725526020f00", [0x17e, 0x0, 0x0, 0xff], @random="df5dbfbdd7a9", [0x101, 0x0, 0xff, 0xff, 0xa8d9186f34f119b9], 0xde, 0xde, 0x10e, [@rateest={'rateest\x00', 0x48, {{'batadv0\x00', 'veth0_to_hsr\x00', 0x33, 0x1, 0x3ff, 0x2, 0x70f0, 0x1f, 0x10000, 0x5}}}], [], @common=@STANDARD={'\x00', 0x8}}, {0x13, 0x4, 0x1, 'bridge_slave_0\x00', 'hsr0\x00', 'vlan0\x00', 'irlan0\x00', @random="663925bdba56", [0xff, 0xff, 0xff, 0xff, 0xb6b5b880c8c72885, 0x101], @remote, [0x0, 0x671100c97860b2d2, 0x0, 0xff], 0x856, 0x856, 0x89e, [@u32={'u32\x00', 0x7c0, {{[{[{0x1b0d45a9, 0x2}, {0x76, 0x1}, {0x2, 0x3}, {0x200, 0x2}, {0x4ff, 0x1b53809707386d78}, {0x800}, {0x4, 0x1}, {0xee}, {0x1, 0x924bdaf6f5b5a1c4}, {0x81, 0x2}, {0x0, 0x3}], [{0x6, 0x783e}, {0x7fffffff, 0x7}, {0x2, 0x9}, {0x200, 0x3}, {0xff, 0x80}, {0x3, 0x7}, {0xfffffc00, 0x1000}, {0x800, 0x9}, {0x10001, 0x6}, {0x55, 0x3}, {0x5, 0x4}], 0xa, 0x7}, {[{0x5}, {0xffffffe0, 0x1}, {0x200, 0x80a1a8df078b9a43}, {}, {0x200, 0x3}, {0xcf5, 0x2}, {0x0, 0x2}, {0x4, 0x1}, {0x3, 0x2}, {0x4, 0x3}, {0x2, 0x1}], [{0x7ff, 0xfffffffd}, {0x3, 0x9}, {0x3, 0x6}, {0xfffff001, 0x1ff}, {0xfffffffa, 0xdd2}, {0x0, 0x7fffffff}, {0x63, 0x1ff}, {0x2e09af2, 0x8001}, {0x40, 0x8}, {0x2, 0x8000}, {0x9dc1, 0x3d76}], 0x0, 0x7}, {[{0x7, 0x1}, {0x3, 0x1}, {0x7}, {0x3, 0x2}, {0x7, 0x2}, {0x5}, {0xabb, 0x2}, {0xe38, 0x1}, {0x6, 0x2}, {0x8001, 0x3}, {0x8, 0x2}], [{0x7fff, 0x7}, {0xfffffe00, 0x6}, {0x2be, 0x1ff}, {0x0, 0x1}, {0xffffff66, 0x2a2}, {0x80000001, 0x8001}, {0x9, 0xb6}, {0x80000001}, {0x40, 0xfffffff9}, {0x3609, 0xfffffffe}, {0xfee, 0x2}], 0x2, 0x1}, {[{0x1, 0x1}, {0x89b, 0x2}, {0x18, 0x3}, {0x464, 0x3}, {0x5, 0x1}, {0x1bfa0}, {0x3}, {0x10001, 0x1}, {0x6, 0x3}, {0x6, 0x3}, {0x1, 0x3}], [{0x6, 0xffffffff}, {0x1000, 0x500}, {0xfffffffe, 0x7}, {0xbed, 0x7}, {0x272, 0x50}, {0x1000, 0xb75}, {0x3, 0x7fffffff}, {0x3f, 0x9}, {0x4, 0xff}, {0x5, 0xc45}, {0x5, 0x8}], 0x1, 0x8}, {[{0x3}, {}, {0x6, 0x3}, {0x8001}, {0x1000, 0x1}, {0x4, 0x2}, {0x9, 0x1}, {0x4}, {0x80, 0x1}, {0xffffffc0, 0x6}, {0x100, 0x2}], [{0x9, 0x1}, {0x401, 0x5}, {0x6, 0x5}, {0x7f, 0x1}, {0x6, 0x4}, {0x7ff, 0x7fff}, {0x101, 0x2}, {0x1, 0x6}, {0x10000, 0xfffff801}, {0x7ff, 0x80}, {0x735d, 0x6}], 0x3, 0x3}, {[{0x7f}, {0xff, 0x2}, {0xf7354a8b, 0x2}, {0x1, 0x2}, {0x3f}, {0x6, 0x1}, {0x1000, 0x3}, {0xaa2, 0x3}, {0x7, 0x1}, {0x8, 0x2}, {0x400, 0x1}], [{0x7}, {0x4, 0x24}, {0x40000000, 0x5}, {0x3, 0x4e0d}, {0x3c2e, 0xffff}, {0x9, 0x1}, {0x2, 0x1}, {0x0, 0x5}, {0x7d88, 0xad48}, {0x0, 0x6}, {0x0, 0x6602}], 0x5, 0x9}, {[{0x7ff, 0x5f60294cb182d88d}, {0x80000000, 0x5}, {0xfffffffc, 0x2}, {0x200, 0x2}, {0x3f, 0x3}, {0x0, 0x9edd5a6eae505b99}, {0x979d}, {0x5}, {0x8}, {0x9, 0x3}, {0x6, 0x2}], [{0x8, 0x5}, {0x46d, 0x20}, {0x0, 0x8000}, {0x0, 0x822}, {0x2, 0xfb75}, {0x0, 0x9}, {0x1}, {0x3, 0x8}, {0x8eb, 0xff}, {0x7, 0x80000001}, {0x8001, 0x10001}], 0x0, 0x1}, {[{0x40, 0x2}, {0x401, 0x2}, {0x2983, 0x2}, {0x5, 0x8c28f1839a79381c}, {0x10001, 0x1}, {0x9, 0x3}, {0x8001, 0x3}, {0x2, 0x1}, {0x40}, {0x101, 0x3}, {0x80, 0x3}], [{0x7fff, 0x1ff}, {0x0, 0x1}, {0xff, 0x10001}, {0xdf6, 0x3129}, {0x0, 0x8}, {0x9, 0x1ff}, {0x0, 0x6}, {0x2, 0x3}, {0xfff, 0x3}, {0x7, 0x638}, {0x2}], 0x8, 0x1}, {[{0x8001}, {0xe0, 0x1}, {0x1}, {0x1}, {0x6, 0x2}, {0x0, 0x3}, {0x2, 0x2}, {0xffffffff}, {0x401, 0x2}, {0x9, 0x3}, {0x2, 0x1}], [{0x200}, {0x1000, 0xff}, {0x4, 0x400}, {0x58, 0x401}, {0xe0, 0x8001}, {0x2, 0x7}, {0x10001, 0x3ff}, {0x8, 0x1}, {0x4647}, {0x3f, 0x100}, {0x6b, 0x7f}], 0x0, 0x1}, {[{0x3}, {0x5, 0x3}, {0x1, 0x2}, {0x8, 0x4}, {0xfff, 0x3}, {}, {0x3, 0x3}, {0xea, 0x2}, {0x8, 0x379fafc7e1e99bbf}, {0x10000}, {0x9, 0x2}], [{0x5}, {0x8, 0x1}, {0xfffffbff}, {0xa75, 0xb0}, {0x1000, 0x7}, {0x2}, {0x60000000, 0x3f}, {0x7, 0x3}, {0x6, 0x2}, {0x6, 0xacaa}, {0x3ff, 0x6e}], 0x0, 0x5}, {[{0x9d, 0x1}, {0x7, 0x2}, {0x6, 0x2}, {0x7, 0x3}, {0x1, 0x1}, {0x3}, {0x21, 0x2}, {0xfffffffe}, {0xffff08f0, 0x3}, {0xfffffffe, 0x3}, {0x8, 0x3}], [{0x1, 0x4}, {0x2, 0x8}, {0x1, 0xa8}, {0x7, 0xffff}, {0x2, 0x200}, {0x400, 0xae2}, {0x6ecaa739, 0x11f}, {0x11dc, 0x3}, {0x6}, {0x0, 0xffffffff}, {0x80, 0xffffffff}]}], 0x2, 0x1}}}], [], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x8, 0x4, 0x8000}}}}]}, {0x0, '\x00', 0x2, 0x7fffffffffffffff, 0x1, [{0xf, 0xb0, 0x445f, 'veth0_to_bridge\x00', 'ifb0\x00', 'ipddp0\x00', 'bridge_slave_0\x00', @link_local, [0xff, 0x58f59aeadc229922, 0x0, 0x0, 0x1fe, 0xff], @dev={[], 0xc}, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x6e, 0xbe, 0x10e, [], [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x4, 'syz0\x00', 0x1}}}], @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x8001, 'syz0\x00', 0x2}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{0x3, 0x10, 0x1b, 'ifb0\x00', 'ip6tnl0\x00', 'lapb0\x00', 'ifb0\x00', @dev={[], 0x29}, [0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0x0, 0x0, 0x1fe], 0x6e, 0x6e, 0x9e, [], [], @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}}]}]}, 0xc90) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f0000000040)) wait4(0x0, 0x0, 0x60000008, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') r4 = gettid() tkill(r4, 0x3c) openat(r3, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 02:12:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x34000) [ 1276.607130][T16056] ? __x64_sys_ioctl+0xa3/0x120 [ 1276.611962][T16056] ? do_syscall_64+0xf7/0x1c0 [ 1276.616623][T16056] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1276.622680][T16056] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1276.628410][T16056] ? rcu_lock_release+0x9/0x30 [ 1276.633160][T16056] ? rcu_lock_release+0x9/0x30 [ 1276.637976][T16056] ? lo_release+0x1f0/0x1f0 [ 1276.642489][T16056] blkdev_ioctl+0x807/0x2980 [ 1276.647087][T16056] ? tomoyo_path_number_perm+0x53e/0x640 [ 1276.652744][T16056] block_ioctl+0xbd/0x100 [ 1276.657076][T16056] ? blkdev_iopoll+0x100/0x100 [ 1276.661850][T16056] do_vfs_ioctl+0x744/0x1730 [ 1276.666445][T16056] ? __fget+0x411/0x510 [ 1276.670610][T16056] ? tomoyo_file_ioctl+0x23/0x30 [ 1276.675559][T16056] ? security_file_ioctl+0xa1/0xd0 [ 1276.680659][T16056] __x64_sys_ioctl+0xe3/0x120 [ 1276.685323][T16056] do_syscall_64+0xf7/0x1c0 [ 1276.689969][T16056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1276.695926][T16056] RIP: 0033:0x459da7 [ 1276.699801][T16056] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1276.719449][T16056] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1276.727852][T16056] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1276.735813][T16056] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1276.743767][T16056] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1276.751717][T16056] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1276.759679][T16056] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:00 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfXplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:00 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f0000000040)={0x0, 0x0, 0x103, 0xd4344ce8c2f64b4f, {0x12000, 0x5, 0x1, 0x5}}) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') r1 = gettid() tkill(r1, 0x3c) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 1276.815341][T16065] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x100000) [ 1276.884520][T16056] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:00 executing program 2 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:00 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') r1 = gettid() r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) shmat(r2, &(0x7f0000ffc000/0x1000)=nil, 0x2000) tkill(r1, 0x3c) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 02:13:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 02:13:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x300000) 02:13:00 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x7, 0x40800) r1 = gettid() tkill(r1, 0x3c) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 1277.145666][T16093] FAULT_INJECTION: forcing a failure. [ 1277.145666][T16093] name failslab, interval 1, probability 0, space 0, times 0 [ 1277.193925][T16093] CPU: 0 PID: 16093 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1277.201871][T16093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1277.211930][T16093] Call Trace: [ 1277.215224][T16093] dump_stack+0x1d8/0x2f8 [ 1277.219564][T16093] should_fail+0x555/0x770 [ 1277.223991][T16093] __should_failslab+0x11a/0x160 [ 1277.228929][T16093] ? __kernfs_new_node+0x97/0x6b0 [ 1277.233954][T16093] should_failslab+0x9/0x20 [ 1277.238463][T16093] kmem_cache_alloc+0x56/0x2e0 [ 1277.243237][T16093] __kernfs_new_node+0x97/0x6b0 [ 1277.248092][T16093] ? mutex_unlock+0xd/0x10 [ 1277.252553][T16093] ? kernfs_activate+0x4c7/0x4e0 [ 1277.257487][T16093] kernfs_new_node+0x97/0x170 [ 1277.262155][T16093] __kernfs_create_file+0x4a/0x2f0 [ 1277.267245][T16093] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1277.272605][T16093] internal_create_group+0x4be/0xd80 [ 1277.277894][T16093] sysfs_create_group+0x1f/0x30 [ 1277.282739][T16093] loop_set_fd+0xf54/0x1470 [ 1277.287230][T16093] lo_ioctl+0xd5/0x2200 [ 1277.291365][T16093] ? __kasan_slab_free+0x12a/0x1e0 [ 1277.296450][T16093] ? kasan_slab_free+0xe/0x10 [ 1277.301116][T16093] ? kfree+0x115/0x200 [ 1277.305176][T16093] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1277.310785][T16093] ? tomoyo_file_ioctl+0x23/0x30 [ 1277.315700][T16093] ? security_file_ioctl+0x6d/0xd0 [ 1277.320799][T16093] ? __x64_sys_ioctl+0xa3/0x120 [ 1277.325636][T16093] ? do_syscall_64+0xf7/0x1c0 [ 1277.330296][T16093] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1277.336347][T16093] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1277.342070][T16093] ? rcu_lock_release+0x9/0x30 [ 1277.346824][T16093] ? rcu_lock_release+0x9/0x30 [ 1277.351569][T16093] ? lo_release+0x1f0/0x1f0 [ 1277.356050][T16093] blkdev_ioctl+0x807/0x2980 [ 1277.360639][T16093] ? tomoyo_path_number_perm+0x53e/0x640 [ 1277.366269][T16093] block_ioctl+0xbd/0x100 [ 1277.370597][T16093] ? blkdev_iopoll+0x100/0x100 [ 1277.375345][T16093] do_vfs_ioctl+0x744/0x1730 [ 1277.379921][T16093] ? __fget+0x411/0x510 [ 1277.384066][T16093] ? tomoyo_file_ioctl+0x23/0x30 [ 1277.388979][T16093] ? security_file_ioctl+0xa1/0xd0 [ 1277.394066][T16093] __x64_sys_ioctl+0xe3/0x120 [ 1277.398738][T16093] do_syscall_64+0xf7/0x1c0 [ 1277.403228][T16093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1277.409149][T16093] RIP: 0033:0x459da7 [ 1277.413030][T16093] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1277.432629][T16093] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1277.441031][T16093] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1277.448994][T16093] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1277.456945][T16093] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1277.464905][T16093] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1277.472870][T16093] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1277.555871][T16093] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:00 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000100100000100000005e8000000b47fc9c858c598ba4909000000000000000a2e834efe3f87695931515781ae36a4d148f269399022f544be4fac9508cce4df4d7015eb590bbfb45f7b815bdb2281145dd688759944bd09b0f55e7ca54b07bd9189de8daeb173aca360f4bca4f5019235efcea227e56f94ddc8d5e02f38fdcdad2e5cc22b1f090ecf60605f3d9129670000000000000000000000000000000eab3ccfade12420421726b120b1ce8ad1642bb195935f9751facf178c4a3b74eeffcfe0312cd4a5cea34746dea9f76bf16244b5bc1bace51a63e67806440fbab6d8cd3ef5e19c077dbc02efed0840d26dbf3f84d5a39b30564d998a2f9293c470f0896ef88805670ed1220cf77ea1c692ee2053565d6529987f514b384013576ab56e1dc4f444be4a13aa637cea74ca6ebce21635"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, 0x0, &(0x7f0000000080)) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x0) 02:13:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x400300) 02:13:00 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') r1 = gettid() r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000000c0)={0x0, @rand_addr=0x472cd71b, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x40006d}, 0x27) ioctl$RTC_UIE_ON(r4, 0x7003) tkill(r1, 0x22) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 02:13:00 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hf\\plus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:00 executing program 2 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:01 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x5) r1 = gettid() r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x4008a0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000000c0)=0x6, 0xfd6c) tkill(r1, 0x3c) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 02:13:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) [ 1277.815461][T16129] FAULT_INJECTION: forcing a failure. [ 1277.815461][T16129] name failslab, interval 1, probability 0, space 0, times 0 [ 1277.850399][T16129] CPU: 1 PID: 16129 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1277.858339][T16129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1277.868382][T16129] Call Trace: [ 1277.871719][T16129] dump_stack+0x1d8/0x2f8 [ 1277.876082][T16129] should_fail+0x555/0x770 [ 1277.880551][T16129] __should_failslab+0x11a/0x160 [ 1277.885472][T16129] ? kzalloc+0x26/0x40 [ 1277.889531][T16129] should_failslab+0x9/0x20 [ 1277.894025][T16129] __kmalloc+0x7a/0x340 [ 1277.898160][T16129] kzalloc+0x26/0x40 [ 1277.902034][T16129] kobject_get_path+0xa7/0x1d0 [ 1277.906778][T16129] kobject_uevent_env+0x2f2/0x1260 [ 1277.911873][T16129] kobject_uevent+0x1f/0x30 [ 1277.916355][T16129] loop_set_fd+0xfc3/0x1470 [ 1277.920903][T16129] lo_ioctl+0xd5/0x2200 [ 1277.925048][T16129] ? __kasan_slab_free+0x12a/0x1e0 [ 1277.930134][T16129] ? kasan_slab_free+0xe/0x10 [ 1277.934788][T16129] ? kfree+0x115/0x200 [ 1277.938837][T16129] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1277.944450][T16129] ? tomoyo_file_ioctl+0x23/0x30 [ 1277.949373][T16129] ? security_file_ioctl+0x6d/0xd0 [ 1277.954481][T16129] ? __x64_sys_ioctl+0xa3/0x120 [ 1277.959337][T16129] ? do_syscall_64+0xf7/0x1c0 02:13:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x1000000) [ 1277.964014][T16129] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1277.970089][T16129] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1277.975838][T16129] ? rcu_lock_release+0x9/0x30 [ 1277.980602][T16129] ? rcu_lock_release+0x9/0x30 [ 1277.985347][T16129] ? lo_release+0x1f0/0x1f0 [ 1277.989831][T16129] blkdev_ioctl+0x807/0x2980 [ 1277.994422][T16129] ? tomoyo_path_number_perm+0x53e/0x640 [ 1278.000044][T16129] block_ioctl+0xbd/0x100 [ 1278.004356][T16129] ? blkdev_iopoll+0x100/0x100 [ 1278.009103][T16129] do_vfs_ioctl+0x744/0x1730 [ 1278.013696][T16129] ? __fget+0x411/0x510 [ 1278.017855][T16129] ? tomoyo_file_ioctl+0x23/0x30 [ 1278.022791][T16129] ? security_file_ioctl+0xa1/0xd0 [ 1278.027882][T16129] __x64_sys_ioctl+0xe3/0x120 [ 1278.032539][T16129] do_syscall_64+0xf7/0x1c0 [ 1278.037020][T16129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1278.042887][T16129] RIP: 0033:0x459da7 [ 1278.046775][T16129] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1278.066378][T16129] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1278.074775][T16129] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1278.082738][T16129] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1278.090713][T16129] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1278.098704][T16129] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1278.106684][T16129] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1278.171052][T16129] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:01 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') r1 = gettid() tkill(r1, 0x3c) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)=0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x5, &(0x7f0000000100)=[{&(0x7f00000000c0)="5b70ad1c9da3c2870e98ee6e9adb78edcd70c9307d84914c38e478bfeb9a577110171b", 0x23, 0xae}, {&(0x7f0000000280)="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", 0x1000, 0xbf37}, {&(0x7f0000001280)="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", 0x1000, 0xf03}, {&(0x7f0000002280)="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", 0xfffffffffffffe8c, 0x20}, {&(0x7f0000003280)="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", 0x1000, 0x1f}], 0x4000, &(0x7f0000004280)={[{@grpjquota='grpjquota='}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\\proc'}}, {@subj_user={'subj_user', 0x3d, '\x00\xc3\t\xbb\x0f\xac\x03,'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@smackfshat={'smackf[\xfb\xfcC', 0x3d, '\x00\xc3\t\xbb\x0f\xac\x03,'}}, {@dont_measure='dont_measure'}]}) 02:13:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x2000000) 02:13:01 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfcplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:01 executing program 2 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1278.438984][T16161] FAULT_INJECTION: forcing a failure. [ 1278.438984][T16161] name failslab, interval 1, probability 0, space 0, times 0 [ 1278.476601][T16161] CPU: 0 PID: 16161 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1278.484560][T16161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1278.494614][T16161] Call Trace: [ 1278.497908][T16161] dump_stack+0x1d8/0x2f8 [ 1278.502234][T16161] should_fail+0x555/0x770 [ 1278.506647][T16161] __should_failslab+0x11a/0x160 [ 1278.511576][T16161] ? __kernfs_new_node+0x97/0x6b0 [ 1278.516590][T16161] should_failslab+0x9/0x20 [ 1278.521086][T16161] kmem_cache_alloc+0x56/0x2e0 [ 1278.525844][T16161] __kernfs_new_node+0x97/0x6b0 [ 1278.530696][T16161] ? mutex_unlock+0xd/0x10 [ 1278.535106][T16161] ? kernfs_activate+0x4c7/0x4e0 [ 1278.540031][T16161] kernfs_new_node+0x97/0x170 [ 1278.544688][T16161] __kernfs_create_file+0x4a/0x2f0 [ 1278.549796][T16161] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1278.555169][T16161] internal_create_group+0x4be/0xd80 [ 1278.560445][T16161] sysfs_create_group+0x1f/0x30 [ 1278.565273][T16161] loop_set_fd+0xf54/0x1470 [ 1278.569774][T16161] lo_ioctl+0xd5/0x2200 [ 1278.573917][T16161] ? __kasan_slab_free+0x12a/0x1e0 [ 1278.579004][T16161] ? kasan_slab_free+0xe/0x10 [ 1278.583663][T16161] ? kfree+0x115/0x200 [ 1278.587723][T16161] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1278.593341][T16161] ? tomoyo_file_ioctl+0x23/0x30 [ 1278.598260][T16161] ? security_file_ioctl+0x6d/0xd0 [ 1278.603362][T16161] ? __x64_sys_ioctl+0xa3/0x120 [ 1278.608201][T16161] ? do_syscall_64+0xf7/0x1c0 [ 1278.612874][T16161] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1278.618931][T16161] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1278.624676][T16161] ? rcu_lock_release+0x9/0x30 [ 1278.629443][T16161] ? rcu_lock_release+0x9/0x30 [ 1278.634199][T16161] ? lo_release+0x1f0/0x1f0 02:13:01 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000100100000100000005e8000000b47fc9c858c598ba4909000000000000000a2e834efe3f87695931515781ae36a4d148f269399022f544be4fac9508cce4df4d7015eb590bbfb45f7b815bdb2281145dd688759944bd09b0f55e7ca54b07bd9189de8daeb173aca360f4bca4f5019235efcea227e56f94ddc8d5e02f38fdcdad2e5cc22b1f090ecf60605f3d9129670000000000000000000000000000000eab3ccfade12420421726b120b1ce8ad1642bb195935f9751facf178c4a3b74eeffcfe0312cd4a5cea34746dea9f76bf16244b5bc1bace51a63e67806440fbab6d8cd3ef5e19c077dbc02efed0840d26dbf3f84d5a39b30564d998a2f9293c470f0896ef88805670ed1220cf77ea1c692ee2053565d6529987f514b384013576ab56e1dc4f444be4a13aa637cea74ca6ebce21635"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, 0x0, &(0x7f0000000080)) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x0) 02:13:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 02:13:01 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') r1 = gettid() tkill(r1, 0x3c) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r7, 0xc0305710, &(0x7f0000000140)={0x0, 0x75, 0x5, 0x1}) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000080)) 02:13:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x4000000) [ 1278.638693][T16161] blkdev_ioctl+0x807/0x2980 [ 1278.643289][T16161] ? tomoyo_path_number_perm+0x53e/0x640 [ 1278.648940][T16161] block_ioctl+0xbd/0x100 [ 1278.653280][T16161] ? blkdev_iopoll+0x100/0x100 [ 1278.658056][T16161] do_vfs_ioctl+0x744/0x1730 [ 1278.662657][T16161] ? __fget+0x411/0x510 [ 1278.666818][T16161] ? tomoyo_file_ioctl+0x23/0x30 [ 1278.671751][T16161] ? security_file_ioctl+0xa1/0xd0 [ 1278.676849][T16161] __x64_sys_ioctl+0xe3/0x120 [ 1278.681514][T16161] do_syscall_64+0xf7/0x1c0 [ 1278.686002][T16161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1278.691877][T16161] RIP: 0033:0x459da7 [ 1278.695749][T16161] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1278.715348][T16161] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1278.723767][T16161] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1278.731726][T16161] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1278.739711][T16161] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1278.747669][T16161] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1278.755631][T16161] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:02 executing program 5: clone(0x8800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) r0 = getpid() getpgrp(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6c, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000100)='proc&}nodevnodevlowlan0\x00', r1}, 0x30) r2 = syz_open_procfs(r0, &(0x7f0000000080)='stack\x00') r3 = gettid() setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000000c0)={0x1, 0x20}, 0x8) tkill(r3, 0x3c) openat(r2, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 1278.836934][T16161] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:02 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') r1 = getpid() getpgrp(r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6c, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r1, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000100)='proc&}nodevnodevlowlan0\x00', r2}, 0x30) ptrace$pokeuser(0x6, r1, 0x100000000, 0x8) r3 = gettid() tkill(r3, 0x3c) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4200, r3, 0x0, 0x100000) 02:13:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0xa000000) 02:13:02 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x8, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r4 = socket(0x1, 0x800, 0x6) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000400)={{{@in6}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f0000000500)=0xe8) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0xd8000022}, 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x24040000) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r5, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x84) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, &(0x7f0000000040)='%', 0x1, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) r7 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r7, 0x29, 0x37, &(0x7f0000000500)=@routing, 0x8) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) 02:13:02 executing program 2 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:02 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfdplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0xf000000) [ 1279.180299][T16220] FAULT_INJECTION: forcing a failure. [ 1279.180299][T16220] name failslab, interval 1, probability 0, space 0, times 0 [ 1279.209305][T16220] CPU: 1 PID: 16220 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1279.217247][T16220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1279.227310][T16220] Call Trace: [ 1279.230616][T16220] dump_stack+0x1d8/0x2f8 [ 1279.234964][T16220] should_fail+0x555/0x770 [ 1279.239402][T16220] __should_failslab+0x11a/0x160 [ 1279.244446][T16220] should_failslab+0x9/0x20 [ 1279.248962][T16220] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1279.254254][T16220] ? kobject_uevent_env+0x2cd/0x1260 [ 1279.259549][T16220] ? dev_uevent_filter+0xb0/0xb0 [ 1279.264491][T16220] kobject_uevent_env+0x2cd/0x1260 [ 1279.269623][T16220] kobject_uevent+0x1f/0x30 [ 1279.274131][T16220] loop_set_fd+0xfc3/0x1470 [ 1279.278656][T16220] lo_ioctl+0xd5/0x2200 [ 1279.282814][T16220] ? __kasan_slab_free+0x12a/0x1e0 [ 1279.287925][T16220] ? kasan_slab_free+0xe/0x10 [ 1279.292601][T16220] ? kfree+0x115/0x200 [ 1279.296681][T16220] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1279.302316][T16220] ? tomoyo_file_ioctl+0x23/0x30 [ 1279.307256][T16220] ? security_file_ioctl+0x6d/0xd0 [ 1279.312370][T16220] ? __x64_sys_ioctl+0xa3/0x120 [ 1279.317222][T16220] ? do_syscall_64+0xf7/0x1c0 [ 1279.321899][T16220] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1279.327977][T16220] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1279.333899][T16220] ? rcu_lock_release+0x9/0x30 [ 1279.338693][T16220] ? rcu_lock_release+0x9/0x30 [ 1279.343468][T16220] ? lo_release+0x1f0/0x1f0 [ 1279.347982][T16220] blkdev_ioctl+0x807/0x2980 [ 1279.352585][T16220] ? tomoyo_path_number_perm+0x53e/0x640 [ 1279.358243][T16220] block_ioctl+0xbd/0x100 [ 1279.362584][T16220] ? blkdev_iopoll+0x100/0x100 [ 1279.367364][T16220] do_vfs_ioctl+0x744/0x1730 [ 1279.371965][T16220] ? __fget+0x411/0x510 [ 1279.376140][T16220] ? tomoyo_file_ioctl+0x23/0x30 [ 1279.381088][T16220] ? security_file_ioctl+0xa1/0xd0 [ 1279.386216][T16220] __x64_sys_ioctl+0xe3/0x120 [ 1279.390911][T16220] do_syscall_64+0xf7/0x1c0 [ 1279.395434][T16220] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1279.401333][T16220] RIP: 0033:0x459da7 [ 1279.405238][T16220] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:13:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x10000000) [ 1279.424850][T16220] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1279.433274][T16220] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1279.441257][T16220] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1279.449239][T16220] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1279.457219][T16220] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1279.465199][T16220] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1279.495868][T16220] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:02 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x0) 02:13:02 executing program 0: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fchmod(0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x400, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000380)) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r2 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x40d09) 02:13:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x2b0d0000) 02:13:02 executing program 2 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:02 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfhplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1279.694656][T16329] FAULT_INJECTION: forcing a failure. [ 1279.694656][T16329] name failslab, interval 1, probability 0, space 0, times 0 [ 1279.748355][T16329] CPU: 1 PID: 16329 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1279.756300][T16329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1279.766358][T16329] Call Trace: [ 1279.769655][T16329] dump_stack+0x1d8/0x2f8 [ 1279.773991][T16329] should_fail+0x555/0x770 [ 1279.778421][T16329] __should_failslab+0x11a/0x160 [ 1279.783370][T16329] should_failslab+0x9/0x20 [ 1279.787884][T16329] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 1279.793619][T16329] ? __kmalloc_node_track_caller+0x3c/0x60 [ 1279.799442][T16329] __kmalloc_node_track_caller+0x3c/0x60 [ 1279.805075][T16329] ? alloc_uevent_skb+0x7f/0x230 [ 1279.810019][T16329] __alloc_skb+0xe8/0x500 [ 1279.814364][T16329] alloc_uevent_skb+0x7f/0x230 [ 1279.819143][T16329] kobject_uevent_env+0xcbc/0x1260 [ 1279.824277][T16329] kobject_uevent+0x1f/0x30 [ 1279.828785][T16329] loop_set_fd+0xfc3/0x1470 [ 1279.833301][T16329] lo_ioctl+0xd5/0x2200 [ 1279.837459][T16329] ? __kasan_slab_free+0x12a/0x1e0 [ 1279.842572][T16329] ? kasan_slab_free+0xe/0x10 02:13:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x40000000) [ 1279.847251][T16329] ? kfree+0x115/0x200 [ 1279.851588][T16329] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1279.858355][T16329] ? tomoyo_file_ioctl+0x23/0x30 [ 1279.863297][T16329] ? security_file_ioctl+0x6d/0xd0 [ 1279.868504][T16329] ? __x64_sys_ioctl+0xa3/0x120 [ 1279.868924][ T26] audit: type=1804 audit(1572142383.009:49): pid=16326 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir892557217/syzkaller.NTlQwn/2912/bus" dev="sda1" ino=17009 res=1 [ 1279.873343][T16329] ? do_syscall_64+0xf7/0x1c0 [ 1279.901637][T16329] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1279.907688][T16329] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1279.913393][T16329] ? rcu_lock_release+0x9/0x30 [ 1279.918151][T16329] ? rcu_lock_release+0x9/0x30 [ 1279.922923][T16329] ? lo_release+0x1f0/0x1f0 [ 1279.927412][T16329] blkdev_ioctl+0x807/0x2980 [ 1279.932117][T16329] ? tomoyo_path_number_perm+0x53e/0x640 [ 1279.937888][T16329] block_ioctl+0xbd/0x100 [ 1279.942204][T16329] ? blkdev_iopoll+0x100/0x100 [ 1279.946957][T16329] do_vfs_ioctl+0x744/0x1730 [ 1279.951598][T16329] ? __fget+0x411/0x510 [ 1279.955737][T16329] ? tomoyo_file_ioctl+0x23/0x30 [ 1279.960653][T16329] ? security_file_ioctl+0xa1/0xd0 [ 1279.965741][T16329] __x64_sys_ioctl+0xe3/0x120 [ 1279.970399][T16329] do_syscall_64+0xf7/0x1c0 [ 1279.974879][T16329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1279.980751][T16329] RIP: 0033:0x459da7 [ 1279.984619][T16329] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1280.004196][T16329] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1280.012578][T16329] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1280.020524][T16329] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1280.028474][T16329] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1280.036425][T16329] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 02:13:03 executing program 0: lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r0, 0x0) setfsgid(0x0) [ 1280.044382][T16329] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:03 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') r1 = gettid() tkill(r1, 0x3c) r2 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x20180, 0x0) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f0000000180)={0x0, 0x4bd1}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)={0x44, r5, 0x200, 0x0, 0x0, {}, [{{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}]}, 0x44}}, 0x8000) sendmsg$DEVLINK_CMD_GET(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x820000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r5, 0x435, 0x70bd29, 0x25dfdbff, {}, [{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000001}, 0x20008080) 02:13:03 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') r1 = gettid() ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000040)={0x7, 0x8000}) tkill(r1, 0x3c) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 1280.110374][T16329] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x60000000) 02:13:03 executing program 0: r0 = semget(0x3, 0x0, 0x0) semctl$SEM_STAT(r0, 0x758d788dc069ea1d, 0x12, &(0x7f0000000200)=""/44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x6) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000280), 0x4) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket(0x40000000015, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') socket$kcm(0x29, 0x4, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 02:13:03 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x226000, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, &(0x7f0000000080)=0x9) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) sendto$rxrpc(r3, &(0x7f0000000280)="f208ee5a067ba6d73468f924ac6ebc7f0527900b0eae7d5113314a4d3034b3124daa6ab0689eadcb848b2e5f4ad35f6bb06868cb728aab8ff02bc362c97461f4770917379b6f142a2e99a69f791661d1e5e5463a93d941ea64606376d7153d65006506f58f18d4658e3e77651748573a90766c18386120d0a5ad920d48812c2b894cd665e0fc70f0d3922dd47d19184ce4aff90d0939572c7f772610c43b7f78d20b01bfbe6826cb6fc57f1c3eaffc242403620340ffdc47018d42903407080f6e584ed20294d13e7b5bba18a8fa5f14f25f8d45fbf3a059763142c733b26272feaad70ee7e38679a8db", 0xea, 0x4, &(0x7f00000001c0)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xd}}}, 0x24) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_MAP(r3, 0x4028641b, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x0, 0x4, 0x8b, &(0x7f0000ffa000/0x3000)=nil, 0x8001}) wait4(0x0, 0x0, 0x60000008, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x40000) write$P9_RWALK(r5, &(0x7f0000000380)=ANY=[@ANYBLOB="8b0000006f02000a008002000000050000000000000082020000000400000000000000400300000001ec791dcc00000062040000000800000000000000a001000000020000000000000080010000000600000000000000a6000000000000000000000000000400000002000000000000000301000000020000000000000004020000000200000000000000"], 0x8b) r6 = gettid() tkill(r6, 0x3c) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r8, 0x0, r7) flock(r8, 0x4455e221db77fc51) openat(r4, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 1280.404697][T16570] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:04 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x0) 02:13:04 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfiplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:04 executing program 2 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x90080000) 02:13:04 executing program 5: clone(0x202000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') r1 = gettid() tkill(r1, 0x3c) r2 = getpid() getpgrp(r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6c, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000100)='proc&}nodevnodevlowlan0\x00', r3}, 0x30) ptrace$cont(0x9, r2, 0x7fffffff, 0xff) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000040)) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 02:13:04 executing program 0: r0 = socket(0x11, 0x800000003, 0x81) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f00000004c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888, 0xffffa888, 0xffffca88}}, 0xfdef) [ 1281.015851][T16685] FAULT_INJECTION: forcing a failure. [ 1281.015851][T16685] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1281.029109][T16685] CPU: 1 PID: 16685 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1281.037007][T16685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1281.047067][T16685] Call Trace: [ 1281.050371][T16685] dump_stack+0x1d8/0x2f8 [ 1281.054715][T16685] should_fail+0x555/0x770 [ 1281.059150][T16685] should_fail_alloc_page+0x55/0x60 [ 1281.064359][T16685] prepare_alloc_pages+0x283/0x460 [ 1281.069482][T16685] __alloc_pages_nodemask+0xb2/0x5d0 [ 1281.074787][T16685] kmem_getpages+0x4d/0xa00 [ 1281.079304][T16685] cache_grow_begin+0x7e/0x2c0 [ 1281.084083][T16685] cache_alloc_refill+0x311/0x3f0 [ 1281.089116][T16685] ? check_preemption_disabled+0xb7/0x2a0 [ 1281.094849][T16685] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 1281.100229][T16685] ? kobject_uevent_env+0x2cd/0x1260 [ 1281.105520][T16685] ? dev_uevent_filter+0xb0/0xb0 [ 1281.110468][T16685] kobject_uevent_env+0x2cd/0x1260 02:13:04 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000140)={0x0, 0x2, &(0x7f0000000040)=[0x7fffffff, 0x9], &(0x7f0000000080), 0x20, 0x8, 0x2, &(0x7f00000000c0)=[0xfffffffa, 0x7, 0x37, 0xb0, 0x6, 0x7, 0x9, 0xbd8e], &(0x7f0000000100)}) r1 = gettid() tkill(r1, 0x3c) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 02:13:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x9effffff) [ 1281.115608][T16685] kobject_uevent+0x1f/0x30 [ 1281.120127][T16685] loop_set_fd+0xfc3/0x1470 [ 1281.124648][T16685] lo_ioctl+0xd5/0x2200 [ 1281.128801][T16685] ? __kasan_slab_free+0x12a/0x1e0 [ 1281.133912][T16685] ? kasan_slab_free+0xe/0x10 [ 1281.138592][T16685] ? kfree+0x115/0x200 [ 1281.142660][T16685] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1281.148288][T16685] ? tomoyo_file_ioctl+0x23/0x30 [ 1281.153222][T16685] ? security_file_ioctl+0x6d/0xd0 [ 1281.158320][T16685] ? __x64_sys_ioctl+0xa3/0x120 [ 1281.163158][T16685] ? do_syscall_64+0xf7/0x1c0 [ 1281.167812][T16685] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1281.173934][T16685] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1281.179665][T16685] ? rcu_lock_release+0x9/0x30 [ 1281.184420][T16685] ? rcu_lock_release+0x9/0x30 [ 1281.189180][T16685] ? lo_release+0x1f0/0x1f0 [ 1281.193660][T16685] blkdev_ioctl+0x807/0x2980 [ 1281.198244][T16685] ? tomoyo_path_number_perm+0x53e/0x640 [ 1281.203931][T16685] block_ioctl+0xbd/0x100 [ 1281.208249][T16685] ? blkdev_iopoll+0x100/0x100 [ 1281.213001][T16685] do_vfs_ioctl+0x744/0x1730 [ 1281.217568][T16685] ? __fget+0x411/0x510 [ 1281.221706][T16685] ? tomoyo_file_ioctl+0x23/0x30 [ 1281.226619][T16685] ? security_file_ioctl+0xa1/0xd0 [ 1281.231707][T16685] __x64_sys_ioctl+0xe3/0x120 [ 1281.236365][T16685] do_syscall_64+0xf7/0x1c0 [ 1281.240846][T16685] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1281.246713][T16685] RIP: 0033:0x459da7 [ 1281.250584][T16685] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1281.270173][T16685] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1281.278590][T16685] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1281.286540][T16685] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1281.294493][T16685] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1281.302462][T16685] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 02:13:04 executing program 0: r0 = socket(0x10, 0x800000000000803, 0x0) sendto(r0, &(0x7f0000000140)="120000001600e78d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) 02:13:04 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x2}]}, 0x10) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abea", 0x1d, 0x11, 0x0, 0x0) [ 1281.310428][T16685] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1281.327324][T16685] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:04 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r2, 0x401, 0x0, 0x0, {{}, 0x0, 0x4102, 0x0, {0x3, 0x13, @l2={'ib', 0x3a, 'hsr0\x00'}}}}, 0x28}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x420000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r2, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x3, @link='syz0\x00'}}}, ["", ""]}, 0x68}}, 0x4000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@remote, 0x0, 0x3c}, 0x0, @in=@loopback}}, 0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = gettid() tkill(r6, 0x3c) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 02:13:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0xc00e0000) [ 1281.597213][ C0] protocol 88fb is buggy, dev hsr_slave_0 02:13:05 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000100100000100000005e8000000b47fc9c858c598ba4909000000000000000a2e834efe3f87695931515781ae36a4d148f269399022f544be4fac9508cce4df4d7015eb590bbfb45f7b815bdb2281145dd688759944bd09b0f55e7ca54b07bd9189de8daeb173aca360f4bca4f5019235efcea227e56f94ddc8d5e02f38fdcdad2e5cc22b1f090ecf60605f3d9129670000000000000000000000000000000eab3ccfade12420421726b120b1ce8ad1642bb195935f9751facf178c4a3b74eeffcfe0312cd4a5cea34746dea9f76bf16244b5bc1bace51a63e67806440fbab6d8cd3ef5e19c077dbc02efed0840d26dbf3f84d5a39b30564d998a2f9293c470f0896ef88805670ed1220cf77ea1c692ee2053565d6529987f514b384013576ab56e1dc4f444be4a13aa637cea74ca6ebce21635"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x0) 02:13:05 executing program 2 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:05 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hflplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:05 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') tkill(0x0, 0x3c) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400000, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 02:13:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0xc3ffffff) 02:13:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) [ 1281.885551][T16933] FAULT_INJECTION: forcing a failure. [ 1281.885551][T16933] name failslab, interval 1, probability 0, space 0, times 0 02:13:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080), 0x4) [ 1281.942555][T16933] CPU: 0 PID: 16933 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1281.950507][T16933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1281.960568][T16933] Call Trace: [ 1281.963957][T16933] dump_stack+0x1d8/0x2f8 [ 1281.968317][T16933] should_fail+0x555/0x770 [ 1281.972766][T16933] __should_failslab+0x11a/0x160 [ 1281.977725][T16933] ? skb_clone+0x1cc/0x380 [ 1281.982146][T16933] should_failslab+0x9/0x20 [ 1281.986663][T16933] kmem_cache_alloc+0x56/0x2e0 [ 1281.991466][T16933] skb_clone+0x1cc/0x380 [ 1281.995728][T16933] netlink_broadcast_filtered+0x619/0x1080 [ 1282.001562][T16933] netlink_broadcast+0x3a/0x50 [ 1282.006421][T16933] kobject_uevent_env+0xcf1/0x1260 [ 1282.011549][T16933] kobject_uevent+0x1f/0x30 [ 1282.016058][T16933] loop_set_fd+0xfc3/0x1470 [ 1282.020590][T16933] lo_ioctl+0xd5/0x2200 [ 1282.024764][T16933] ? __kasan_slab_free+0x12a/0x1e0 [ 1282.029933][T16933] ? kasan_slab_free+0xe/0x10 [ 1282.034620][T16933] ? kfree+0x115/0x200 02:13:05 executing program 0: getpid() r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x20001, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"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"}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) clock_gettime(0x0, &(0x7f0000000040)) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) unshare(0x600) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x22b) select(0x40, &(0x7f0000000080)={0xef67, 0x7, 0x802, 0x100, 0x4, 0x9, 0x5, 0x1f}, &(0x7f00000000c0)={0x3, 0x0, 0x0, 0x3, 0x10000, 0x401, 0xfff, 0x7fff}, &(0x7f0000000100)={0x0, 0x0, 0x20, 0x100000001, 0x0, 0x7, 0x0, 0x400}, &(0x7f0000000140)={0x0, 0x2710}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) semget$private(0x0, 0x3, 0xba) [ 1282.038687][T16933] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1282.044319][T16933] ? tomoyo_file_ioctl+0x23/0x30 [ 1282.049253][T16933] ? security_file_ioctl+0x6d/0xd0 [ 1282.054365][T16933] ? __x64_sys_ioctl+0xa3/0x120 [ 1282.059229][T16933] ? do_syscall_64+0xf7/0x1c0 [ 1282.063908][T16933] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1282.069991][T16933] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1282.075737][T16933] ? rcu_lock_release+0x9/0x30 [ 1282.080522][T16933] ? rcu_lock_release+0x9/0x30 [ 1282.085377][T16933] ? lo_release+0x1f0/0x1f0 [ 1282.089886][T16933] blkdev_ioctl+0x807/0x2980 [ 1282.094484][T16933] ? tomoyo_path_number_perm+0x53e/0x640 [ 1282.100151][T16933] block_ioctl+0xbd/0x100 [ 1282.104482][T16933] ? blkdev_iopoll+0x100/0x100 [ 1282.109293][T16933] do_vfs_ioctl+0x744/0x1730 [ 1282.113887][T16933] ? __fget+0x411/0x510 [ 1282.118054][T16933] ? tomoyo_file_ioctl+0x23/0x30 [ 1282.122992][T16933] ? security_file_ioctl+0xa1/0xd0 [ 1282.128107][T16933] __x64_sys_ioctl+0xe3/0x120 [ 1282.132784][T16933] do_syscall_64+0xf7/0x1c0 [ 1282.137288][T16933] entry_SYSCALL_64_after_hwframe+0x49/0xbe 02:13:05 executing program 0: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "0600ee", 0x8, 0x11, 0x0, @remote, @ipv4={[], [], @dev}, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) [ 1282.143176][T16933] RIP: 0033:0x459da7 [ 1282.147064][T16933] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1282.166672][T16933] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1282.175186][T16933] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1282.183173][T16933] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 02:13:05 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/50) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') mknod$loop(0x0, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) syz_open_dev$binderN(0x0, 0x0, 0x0) 02:13:05 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') r1 = gettid() tkill(r1, 0x3c) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 1282.191242][T16933] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1282.199222][T16933] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1282.207201][T16933] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0xefffffff) [ 1282.284360][T16933] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:06 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, 0x0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x0) 02:13:06 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/icmp\x00') r2 = gettid() tkill(r2, 0x3c) openat(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 02:13:06 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfoplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:06 executing program 2 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0xf0ffffff) 02:13:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x8, 0x6d, 0x8000000000000002, 0x0, 0x0}, 0x3c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) syz_emit_ethernet(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r0}, 0x2c) [ 1282.828861][T17376] FAULT_INJECTION: forcing a failure. [ 1282.828861][T17376] name failslab, interval 1, probability 0, space 0, times 0 [ 1282.844486][T17376] CPU: 0 PID: 17376 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1282.852448][T17376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1282.862510][T17376] Call Trace: [ 1282.865802][T17376] dump_stack+0x1d8/0x2f8 [ 1282.870142][T17376] should_fail+0x555/0x770 02:13:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0xffffff9e) [ 1282.874569][T17376] __should_failslab+0x11a/0x160 [ 1282.879622][T17376] ? kzalloc+0x26/0x40 [ 1282.883697][T17376] should_failslab+0x9/0x20 [ 1282.888200][T17376] __kmalloc+0x7a/0x340 [ 1282.892361][T17376] kzalloc+0x26/0x40 [ 1282.896254][T17376] kobject_get_path+0xa7/0x1d0 [ 1282.901027][T17376] kobject_uevent_env+0x2f2/0x1260 [ 1282.906150][T17376] kobject_uevent+0x1f/0x30 [ 1282.910653][T17376] loop_set_fd+0xfc3/0x1470 [ 1282.915183][T17376] lo_ioctl+0xd5/0x2200 [ 1282.919348][T17376] ? __kasan_slab_free+0x12a/0x1e0 [ 1282.924462][T17376] ? kasan_slab_free+0xe/0x10 [ 1282.929150][T17376] ? kfree+0x115/0x200 [ 1282.933229][T17376] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1282.938864][T17376] ? tomoyo_file_ioctl+0x23/0x30 [ 1282.943796][T17376] ? security_file_ioctl+0x6d/0xd0 [ 1282.948897][T17376] ? __x64_sys_ioctl+0xa3/0x120 [ 1282.953745][T17376] ? do_syscall_64+0xf7/0x1c0 [ 1282.958416][T17376] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1282.964489][T17376] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1282.970226][T17376] ? rcu_lock_release+0x9/0x30 [ 1282.974993][T17376] ? rcu_lock_release+0x9/0x30 [ 1282.979762][T17376] ? lo_release+0x1f0/0x1f0 [ 1282.984267][T17376] blkdev_ioctl+0x807/0x2980 [ 1282.988858][T17376] ? tomoyo_path_number_perm+0x53e/0x640 [ 1282.994511][T17376] block_ioctl+0xbd/0x100 [ 1282.998841][T17376] ? blkdev_iopoll+0x100/0x100 [ 1283.003603][T17376] do_vfs_ioctl+0x744/0x1730 [ 1283.008186][T17376] ? __fget+0x411/0x510 [ 1283.012341][T17376] ? tomoyo_file_ioctl+0x23/0x30 [ 1283.017272][T17376] ? security_file_ioctl+0xa1/0xd0 [ 1283.022376][T17376] __x64_sys_ioctl+0xe3/0x120 [ 1283.027052][T17376] do_syscall_64+0xf7/0x1c0 [ 1283.031552][T17376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1283.037439][T17376] RIP: 0033:0x459da7 [ 1283.041324][T17376] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1283.062518][T17376] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1283.070924][T17376] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 02:13:06 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') r1 = gettid() prctl$PR_CAPBSET_DROP(0x18, 0x25) tkill(r1, 0x3c) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 1283.078890][T17376] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1283.086854][T17376] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1283.094911][T17376] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1283.102877][T17376] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1283.165031][T17376] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:06 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f0000000000)=0x4040) madvise(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)="80fd02", 0x3}], 0xfffff85, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2b3) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 02:13:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0xffffffc3) 02:13:06 executing program 2 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:06 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') r1 = gettid() ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffffffffffffffcb5af5126805f8412c7431a4f4d7fcd7d7829bc58bcad7a85e5bed51ad59a82f3b20db61d8fd1442e73a63503c8fbc60aef523239261df5c2e2853bac571d82391e3def48e3a60d56eaa8e9abd4baa98d4854fcfd1a38f9945d682ceecd20ffc7e3d9f4fe7cddd1afa6c4adf470400688acc78f67a2a80693dd2c5a683e2a1cabb5c16a255b7167fbe12391f2b8c72b0724050f156f8216819d1e02c63e0b58c0d9c07a7c599c5a630127b9c7336f81f4d2e4f720c8743a1710f425c70d1b15ee2cd0820a68dab0009005b"]) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f00000000c0)={0x1ff, 0x9, 0x4, 0x40, {r2, r3/1000+30000}, {0x4, 0x1, 0x6, 0x3, 0xf8, 0x6, "eb0451de"}, 0xffffffae, 0x2, @offset=0x5, 0x4}) tkill(r1, 0x19) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) ioctl$sock_x25_SIOCDELRT(r6, 0x890c, &(0x7f0000000280)={@null=' \x00', 0x5, 'ip6tnl0\x00'}) [ 1283.345902][T17498] FAULT_INJECTION: forcing a failure. [ 1283.345902][T17498] name failslab, interval 1, probability 0, space 0, times 0 [ 1283.370594][T17498] CPU: 0 PID: 17498 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1283.378573][T17498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1283.388623][T17498] Call Trace: [ 1283.391922][T17498] dump_stack+0x1d8/0x2f8 [ 1283.396426][T17498] should_fail+0x555/0x770 [ 1283.400854][T17498] __should_failslab+0x11a/0x160 [ 1283.405789][T17498] should_failslab+0x9/0x20 [ 1283.410292][T17498] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 1283.416002][T17498] ? __kmalloc_node_track_caller+0x3c/0x60 [ 1283.421830][T17498] __kmalloc_node_track_caller+0x3c/0x60 [ 1283.427458][T17498] ? alloc_uevent_skb+0x7f/0x230 [ 1283.432387][T17498] __alloc_skb+0xe8/0x500 [ 1283.436714][T17498] alloc_uevent_skb+0x7f/0x230 [ 1283.441577][T17498] kobject_uevent_env+0xcbc/0x1260 [ 1283.446705][T17498] kobject_uevent+0x1f/0x30 [ 1283.451207][T17498] loop_set_fd+0xfc3/0x1470 [ 1283.455719][T17498] lo_ioctl+0xd5/0x2200 [ 1283.459869][T17498] ? __kasan_slab_free+0x12a/0x1e0 [ 1283.464967][T17498] ? kasan_slab_free+0xe/0x10 [ 1283.469635][T17498] ? kfree+0x115/0x200 [ 1283.473693][T17498] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1283.479314][T17498] ? tomoyo_file_ioctl+0x23/0x30 [ 1283.484240][T17498] ? security_file_ioctl+0x6d/0xd0 [ 1283.489342][T17498] ? __x64_sys_ioctl+0xa3/0x120 [ 1283.494180][T17498] ? do_syscall_64+0xf7/0x1c0 [ 1283.498849][T17498] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1283.504918][T17498] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1283.510646][T17498] ? rcu_lock_release+0x9/0x30 [ 1283.515409][T17498] ? rcu_lock_release+0x9/0x30 [ 1283.520170][T17498] ? lo_release+0x1f0/0x1f0 [ 1283.524673][T17498] blkdev_ioctl+0x807/0x2980 [ 1283.529266][T17498] ? tomoyo_path_number_perm+0x53e/0x640 [ 1283.534925][T17498] block_ioctl+0xbd/0x100 [ 1283.539255][T17498] ? blkdev_iopoll+0x100/0x100 [ 1283.544020][T17498] do_vfs_ioctl+0x744/0x1730 [ 1283.548606][T17498] ? __fget+0x411/0x510 [ 1283.552766][T17498] ? tomoyo_file_ioctl+0x23/0x30 [ 1283.557702][T17498] ? security_file_ioctl+0xa1/0xd0 [ 1283.562816][T17498] __x64_sys_ioctl+0xe3/0x120 [ 1283.567496][T17498] do_syscall_64+0xf7/0x1c0 [ 1283.571999][T17498] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1283.577887][T17498] RIP: 0033:0x459da7 [ 1283.581777][T17498] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1283.601382][T17498] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1283.609793][T17498] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1283.617764][T17498] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1283.625734][T17498] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1283.633706][T17498] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 02:13:06 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfpplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0xffffffef) 02:13:06 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, 0x0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x0) 02:13:06 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$getown(r2, 0x9) r4 = syz_open_procfs(r3, &(0x7f0000000080)='\x00\x82\x92f\x00\t\x00\x00\x00\x80,') r5 = gettid() tkill(r5, 0x3c) openat(r4, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 1283.641672][T17498] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:07 executing program 0: r0 = memfd_create(&(0x7f0000000140)='+\\lo\x00', 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0xffffff6c) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) fsetxattr$security_selinux(r1, &(0x7f0000000080)='security.selinux\x00', 0x0, 0x0, 0x3) [ 1283.757295][T17498] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0xfffffff0) 02:13:07 executing program 2 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1283.986489][T17677] FAULT_INJECTION: forcing a failure. [ 1283.986489][T17677] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.008033][T17677] CPU: 1 PID: 17677 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1284.015974][T17677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1284.026061][T17677] Call Trace: [ 1284.029367][T17677] dump_stack+0x1d8/0x2f8 [ 1284.033713][T17677] should_fail+0x555/0x770 [ 1284.038142][T17677] __should_failslab+0x11a/0x160 [ 1284.043091][T17677] ? skb_clone+0x1cc/0x380 [ 1284.047516][T17677] should_failslab+0x9/0x20 [ 1284.052024][T17677] kmem_cache_alloc+0x56/0x2e0 [ 1284.056794][T17677] skb_clone+0x1cc/0x380 [ 1284.061045][T17677] netlink_broadcast_filtered+0x619/0x1080 [ 1284.066868][T17677] netlink_broadcast+0x3a/0x50 [ 1284.071639][T17677] kobject_uevent_env+0xcf1/0x1260 [ 1284.076768][T17677] kobject_uevent+0x1f/0x30 [ 1284.081268][T17677] loop_set_fd+0xfc3/0x1470 [ 1284.085786][T17677] lo_ioctl+0xd5/0x2200 [ 1284.089937][T17677] ? __kasan_slab_free+0x12a/0x1e0 [ 1284.095040][T17677] ? kasan_slab_free+0xe/0x10 [ 1284.099716][T17677] ? kfree+0x115/0x200 [ 1284.103777][T17677] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1284.109406][T17677] ? tomoyo_file_ioctl+0x23/0x30 [ 1284.114341][T17677] ? security_file_ioctl+0x6d/0xd0 [ 1284.119451][T17677] ? __x64_sys_ioctl+0xa3/0x120 [ 1284.124305][T17677] ? do_syscall_64+0xf7/0x1c0 [ 1284.128986][T17677] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1284.135063][T17677] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1284.140803][T17677] ? rcu_lock_release+0x9/0x30 [ 1284.145581][T17677] ? rcu_lock_release+0x9/0x30 [ 1284.150360][T17677] ? lo_release+0x1f0/0x1f0 [ 1284.154872][T17677] blkdev_ioctl+0x807/0x2980 [ 1284.159480][T17677] ? tomoyo_path_number_perm+0x53e/0x640 [ 1284.165147][T17677] block_ioctl+0xbd/0x100 [ 1284.169486][T17677] ? blkdev_iopoll+0x100/0x100 [ 1284.174258][T17677] do_vfs_ioctl+0x744/0x1730 [ 1284.178848][T17677] ? __fget+0x411/0x510 [ 1284.183014][T17677] ? tomoyo_file_ioctl+0x23/0x30 [ 1284.187959][T17677] ? security_file_ioctl+0xa1/0xd0 [ 1284.193081][T17677] __x64_sys_ioctl+0xe3/0x120 [ 1284.197772][T17677] do_syscall_64+0xf7/0x1c0 [ 1284.202375][T17677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1284.208268][T17677] RIP: 0033:0x459da7 [ 1284.212163][T17677] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:13:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0xc) writev(r4, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="1f0000000203193b000007000000068100023b05090002000000404202", 0x1d}], 0x1) splice(r2, 0x0, r4, 0x0, 0x422000a7b, 0x0) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) r5 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 1284.231772][T17677] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1284.240188][T17677] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1284.248168][T17677] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1284.256146][T17677] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1284.264125][T17677] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1284.272105][T17677] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x2000000000000) 02:13:07 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hftplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1284.386317][T17677] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x10000000000000) 02:13:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x2, 0x0, 0x0) clone(0x3502001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000000)="da84f098b14c7b67cc3bcd3c2f74e7a9", 0x103) 02:13:07 executing program 2 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:07 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000100100000100000005e8000000b47fc9c858c598ba4909000000000000000a2e834efe3f87695931515781ae36a4d148f269399022f544be4fac9508cce4df4d7015eb590bbfb45f7b815bdb2281145dd688759944bd09b0f55e7ca54b07bd9189de8daeb173aca360f4bca4f5019235efcea227e56f94ddc8d5e02f38fdcdad2e5cc22b1f090ecf60605f3d9129670000000000000000000000000000000eab3ccfade12420421726b120b1ce8ad1642bb195935f9751facf178c4a3b74eeffcfe0312cd4a5cea34746dea9f76bf16244b5bc1bace51a63e67806440fbab6d8cd3ef5e19c077dbc02efed0840d26dbf3f84d5a39b30564d998a2f9293c470f0896ef88805670ed1220cf77ea1c692ee2053565d6529987f514b384013576ab56e1dc4f444be4a13aa637cea74ca6ebce21635"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, 0x0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x0) 02:13:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x30000000000000) 02:13:08 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfuplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1284.727700][T17929] FAULT_INJECTION: forcing a failure. [ 1284.727700][T17929] name failslab, interval 1, probability 0, space 0, times 0 02:13:08 executing program 0: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) [ 1284.817184][T17929] CPU: 1 PID: 17929 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1284.825126][T17929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1284.835181][T17929] Call Trace: [ 1284.835218][T17929] dump_stack+0x1d8/0x2f8 [ 1284.835235][T17929] should_fail+0x555/0x770 [ 1284.835254][T17929] __should_failslab+0x11a/0x160 [ 1284.852183][T17929] ? __d_alloc+0x2d/0x6e0 [ 1284.852198][T17929] should_failslab+0x9/0x20 [ 1284.852209][T17929] kmem_cache_alloc+0x56/0x2e0 [ 1284.852222][T17929] __d_alloc+0x2d/0x6e0 [ 1284.869938][T17929] d_alloc+0x4e/0x1d0 [ 1284.873935][T17929] __lookup_hash+0xe5/0x290 [ 1284.878451][T17929] filename_create+0x14f/0x670 [ 1284.883231][T17929] ? getname_flags+0x214/0x640 [ 1284.888010][T17929] do_mkdirat+0x5a/0x320 [ 1284.892262][T17929] __x64_sys_mkdir+0x60/0x70 [ 1284.896866][T17929] do_syscall_64+0xf7/0x1c0 [ 1284.901380][T17929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1284.907380][T17929] RIP: 0033:0x459357 [ 1284.911273][T17929] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1284.930878][T17929] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1284.939295][T17929] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1284.947274][T17929] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1284.955248][T17929] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 02:13:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x40030000000000) [ 1284.963220][T17929] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1284.971192][T17929] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x100000000000000) 02:13:08 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfxplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:08 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_DEL(r4, 0x0, 0x484, &(0x7f00000002c0)={0x3a, @multicast2, 0x4e20, 0x1, 'lblc\x00', 0x2, 0x9, 0x70}, 0x2c) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r1) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x50, r8, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x50}}, 0x0) sendmsg$IPVS_CMD_FLUSH(r6, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x68000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="000327bd7000fedbdf25110000001c00020008000b000a00000008000e004e2300000800070001000000"], 0x30}, 0x1, 0x0, 0x0, 0xc080}, 0x20000000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000000c0)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) r9 = syz_open_procfs(r0, &(0x7f0000000080)='net/rfcomm\x00') gettid() tkill(0xffffffffffffffff, 0x36) openat(r9, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 02:13:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x200000000000000) 02:13:08 executing program 2 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1285.292865][T17971] IPVS: set_ctl: invalid protocol: 58 224.0.0.2:20000 [ 1285.316456][T17971] IPVS: Error joining to the multicast group 02:13:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x400000000000000) 02:13:08 executing program 5: syz_extract_tcp_res$synack(&(0x7f0000000080), 0x1, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x45e0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000ffd000/0x2000)=nil, 0x2000}, 0x2}) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='nEt/snmp\x80') r7 = socket$inet6(0xa, 0x2, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r8, 0x0, r7) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) accept4$alg(r11, 0x0, 0x0, 0x80000) r12 = dup(r8) r13 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r13, &(0x7f0000000040)={0x11, 0x0, r14}, 0x14) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r15, @ANYBLOB="00000000ffffffff000000810800010063627100180402000304060003000000003bae10ffffff9e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) clock_gettime(0x0, &(0x7f0000000100)) sendmsg$can_bcm(r12, &(0x7f0000000240)={&(0x7f00000000c0)={0x1d, r15}, 0x10, &(0x7f0000000200)={&(0x7f0000000180)={0x1, 0x80, 0x103, {0x0, 0x2710}, {0x0, 0x7530}, {0x4, 0x0, 0x1}, 0x1, @can={{0x4, 0x0, 0x1}, 0x5, 0xcbe0cada847eff55, 0x0, 0x0, "80f0cb017d1986c5"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) r16 = gettid() ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000040)={0x9, 0x3, 0xf86, 0x0, 0x2}) r17 = socket$inet6(0xa, 0x2, 0x0) r18 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r18, 0x0, r17) getsockopt$inet6_int(r17, 0x29, 0x43, &(0x7f00000002c0), &(0x7f0000000300)=0x4) tkill(r16, 0x3c) openat(r6, &(0x7f0000000000)='./file0\x00', 0x82080, 0x0) [ 1285.544435][T18081] FAULT_INJECTION: forcing a failure. [ 1285.544435][T18081] name failslab, interval 1, probability 0, space 0, times 0 [ 1285.595898][T18081] CPU: 0 PID: 18081 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1285.603873][T18081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1285.613934][T18081] Call Trace: [ 1285.617228][T18081] dump_stack+0x1d8/0x2f8 [ 1285.621576][T18081] should_fail+0x555/0x770 [ 1285.626007][T18081] __should_failslab+0x11a/0x160 [ 1285.630960][T18081] ? getname_flags+0xba/0x640 [ 1285.635641][T18081] should_failslab+0x9/0x20 [ 1285.640148][T18081] kmem_cache_alloc+0x56/0x2e0 [ 1285.644906][T18081] ? __kasan_check_write+0x14/0x20 [ 1285.650029][T18081] getname_flags+0xba/0x640 [ 1285.654543][T18081] do_mkdirat+0x3c/0x320 [ 1285.658789][T18081] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1285.664516][T18081] ? do_syscall_64+0x1d/0x1c0 [ 1285.669192][T18081] __x64_sys_mkdir+0x60/0x70 [ 1285.673782][T18081] do_syscall_64+0xf7/0x1c0 [ 1285.678290][T18081] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1285.684177][T18081] RIP: 0033:0x459357 [ 1285.688083][T18081] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1285.707682][T18081] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1285.716101][T18081] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1285.724070][T18081] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1285.732040][T18081] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 02:13:09 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfzplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:09 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) write$sndseq(r2, &(0x7f0000000080)=[{0x7, 0x8, 0x7f, 0x0, @time={r3, r4+10000000}, {0x0, 0x4}, {0x1}, @raw32={[0xb250, 0x63e, 0x857]}}, {0x6, 0xba, 0x4, 0x6, @time, {0x6, 0xf8}, {0x6, 0xfc}, @connect={{0x0, 0x8f}, {0x8, 0x49}}}], 0x60) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') r6 = gettid() tkill(r6, 0x3c) openat(r5, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 02:13:09 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x0) [ 1285.740006][T18081] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1285.747976][T18081] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:09 executing program 0: r0 = syz_open_dev$cec(0x0, 0x0, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x805c6103, &(0x7f0000000000)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x3, &(0x7f0000000080)=0x428, 0x4) 02:13:09 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x0, @loopback}], 0xb8a992984705439d) 02:13:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0xa00000000000000) 02:13:09 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfs\nlus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:09 executing program 2 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:09 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000100)='167.0.0.1\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 02:13:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0xf00000000000000) 02:13:09 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1b0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) [ 1286.084417][T18220] 9pnet_virtio: no channels available for device 167.0.0.1 [ 1286.102135][T18219] FAULT_INJECTION: forcing a failure. [ 1286.102135][T18219] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1286.115381][T18219] CPU: 1 PID: 18219 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1286.123275][T18219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1286.133338][T18219] Call Trace: [ 1286.136671][T18219] dump_stack+0x1d8/0x2f8 [ 1286.141015][T18219] should_fail+0x555/0x770 [ 1286.145440][T18219] should_fail_alloc_page+0x55/0x60 [ 1286.150645][T18219] prepare_alloc_pages+0x283/0x460 [ 1286.155770][T18219] __alloc_pages_nodemask+0xb2/0x5d0 [ 1286.161066][T18219] ? lo_release+0x1f0/0x1f0 [ 1286.165573][T18219] ? blkdev_ioctl+0x807/0x2980 [ 1286.170345][T18219] kmem_getpages+0x4d/0xa00 [ 1286.174856][T18219] cache_grow_begin+0x7e/0x2c0 [ 1286.179633][T18219] cache_alloc_refill+0x311/0x3f0 [ 1286.184662][T18219] ? check_preemption_disabled+0xb7/0x2a0 [ 1286.190384][T18219] kmem_cache_alloc+0x2b9/0x2e0 [ 1286.195233][T18219] ? getname_flags+0xba/0x640 [ 1286.199917][T18219] getname_flags+0xba/0x640 [ 1286.204427][T18219] do_mkdirat+0x3c/0x320 [ 1286.208684][T18219] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1286.214407][T18219] ? do_syscall_64+0x1d/0x1c0 [ 1286.219088][T18219] __x64_sys_mkdir+0x60/0x70 [ 1286.223683][T18219] do_syscall_64+0xf7/0x1c0 [ 1286.228194][T18219] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1286.234087][T18219] RIP: 0033:0x459357 [ 1286.237979][T18219] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1286.257587][T18219] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1286.266023][T18219] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1286.274006][T18219] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 02:13:09 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) [ 1286.281978][T18219] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1286.289955][T18219] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1286.297928][T18219] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:09 executing program 0: r0 = semget(0x3, 0x0, 0x0) semctl$SEM_STAT(r0, 0x758d788dc069ea1d, 0x12, &(0x7f0000000200)=""/44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000", 0xe, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x40000000015, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') socket$kcm(0x29, 0x0, 0x0) [ 1286.335334][T18219] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:09 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@mcast2, 0x0, 0x2b}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x3}}, 0xe8) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000800)=ANY=[@ANYBLOB="02120000020000000a0000b0d35ed3449e57ebb071b324c37bca08bb6f9ac77b52c087e002d44fb9cd09fed421605e78db9ecda3153565e1ccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e10104000000000000b873cb7d47ecf13d432c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88000000000000000038bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac23fdc11b69a958683b70db1cc5d3384cf16435508f2905a5839595c41c90d8b17a31e58f72027c54bd1000000000000"], 0x10}}, 0x0) 02:13:09 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000100100000100000005e8000000b47fc9c858c598ba4909000000000000000a2e834efe3f87695931515781ae36a4d148f269399022f544be4fac9508cce4df4d7015eb590bbfb45f7b815bdb2281145dd688759944bd09b0f55e7ca54b07bd9189de8daeb173aca360f4bca4f5019235efcea227e56f94ddc8d5e02f38fdcdad2e5cc22b1f090ecf60605f3d9129670000000000000000000000000000000eab3ccfade12420421726b120b1ce8ad1642bb195935f9751facf178c4a3b74eeffcfe0312cd4a5cea34746dea9f76bf16244b5bc1bace51a63e67806440fbab6d8cd3ef5e19c077dbc02efed0840d26dbf3f84d5a39b30564d998a2f9293c470f0896ef88805670ed1220cf77ea1c692ee2053565d6529987f514b384013576ab56e1dc4f444be4a13aa637cea74ca6ebce21635"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x0) 02:13:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x1000000000000000) 02:13:09 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfs#lus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:09 executing program 2 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:09 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@hci, 0x80) sendmsg$can_bcm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000540)=ANY=[@ANYBLOB="05000000000800001900000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000260000005deca2c94acb507247cc3684d1523426a929384a26451e7a4ffcd8265ebb8cbb1346759291752c6ce386315560dcc0bfc9e50bae2febd1c4b58c81684a168e08"], 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "7d4de30444adc043"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000700)=ANY=[@ANYBLOB="05000000c6081e0900000000003f0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000000000005deca2c94acb507247cc3684d1523426a929384a26451e7a4ffcd8265ebb8cbb1346759291752c6ce386315560dcc0bfc9e50bae16ef12cc89c135864deefbfb9b2febd1c4b58c81684a168e08e1a2ea9f0afcd1698a09382e9d5ff45839ded0e0635b40f255c87cfb106538e0385b41b68fd4477f54a194f9f72c79e7e8115ac033c1140be29dbcd8ec499c3e5d9e2de5d002468f9ac9c64a6706efabe8733e0d526989ed6af192d2"], 0x80}}, 0x0) 02:13:09 executing program 0: unshare(0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000300)=""/71, 0x47}, {&(0x7f0000000240)=""/31, 0x1f}, {&(0x7f0000000380)=""/116, 0x74}], 0x3, &(0x7f0000000e80)=""/176, 0xb0}, 0x5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0xc5, 0x6d, 0x9, 0x6, 0x0, 0x3, 0x0, 0x3d, 0x0, 0x38, 0x1a6, 0x0, 0x4, 0x20, 0x1, 0x1, 0xa, 0x1f}, [{0x70000000, 0xc011, 0x7, 0x0, 0x1, 0x2, 0xcc5}, {0x6, 0x8, 0x0, 0x0, 0x0, 0x7fffffff}], "171ab7e50578497e506123cd02469e6a542fe837347ca8692465d7b447eb660ffa08227af4e6f788e95e9083c624766dc713013cb6302c4ba32002a150b602f79d6287cb709d17a1444214f41d796f731ea9e08e2445f7f1e86e31de0450223ea0598d52fc971d4f95eb9c4e50d8f75b972e264e6e3e03fa792b348ec01bd44a0671a2f621cb8bc6b742e2", [[], [], [], [], [], [], [], [], []]}, 0xa03) clone(0x400000070024103, 0x0, 0x0, 0x0, 0x0) [ 1286.721336][T18744] FAULT_INJECTION: forcing a failure. [ 1286.721336][T18744] name failslab, interval 1, probability 0, space 0, times 0 [ 1286.741226][T18744] CPU: 1 PID: 18744 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1286.749168][T18744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1286.759234][T18744] Call Trace: [ 1286.762532][T18744] dump_stack+0x1d8/0x2f8 [ 1286.766865][T18744] should_fail+0x555/0x770 [ 1286.771282][T18744] __should_failslab+0x11a/0x160 [ 1286.776215][T18744] ? __d_alloc+0x2d/0x6e0 [ 1286.780539][T18744] should_failslab+0x9/0x20 [ 1286.785040][T18744] kmem_cache_alloc+0x56/0x2e0 [ 1286.789803][T18744] __d_alloc+0x2d/0x6e0 [ 1286.793960][T18744] d_alloc+0x4e/0x1d0 [ 1286.797940][T18744] __lookup_hash+0xe5/0x290 [ 1286.802439][T18744] filename_create+0x14f/0x670 [ 1286.807206][T18744] ? getname_flags+0x214/0x640 [ 1286.811975][T18744] do_mkdirat+0x5a/0x320 [ 1286.816227][T18744] __x64_sys_mkdir+0x60/0x70 [ 1286.820828][T18744] do_syscall_64+0xf7/0x1c0 [ 1286.825337][T18744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1286.831235][T18744] RIP: 0033:0x459357 [ 1286.835125][T18744] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1286.854816][T18744] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1286.863233][T18744] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 02:13:10 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000380)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000003c0)={r0, 0x1, 0x6, @remote}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000280)={0x1, 0x70, 0x5, 0x7, 0x6, 0x3, 0x0, 0x4, 0x40, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8183, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x140, 0xd57c, 0x9, 0xcadc0c1d3c087c7e, 0x3, 0x0, 0xfbe}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x84003ff) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @remote}}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000500)=0xe8) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000400)) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, &(0x7f00000001c0)={0x2, 0x22f}) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) fgetxattr(0xffffffffffffffff, &(0x7f0000000140)=@known='trusted.overlay.origin\x00', &(0x7f0000000540)=""/233, 0xe9) add_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080), 0x0, 0xfffffffffffffffb) r2 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000cab000)) sendmsg$TEAM_CMD_OPTIONS_GET(r2, 0x0, 0x8004) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000640)) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x0}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x200000, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000004c0)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7fffffff}}) creat(0x0, 0x0) [ 1286.871199][T18744] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1286.879170][T18744] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1286.887136][T18744] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1286.895108][T18744] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:10 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r3, 0x0, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 02:13:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x2b0d000000000000) 02:13:10 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfs%lus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:10 executing program 2 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x4000000000000000) [ 1287.182853][T19157] FAULT_INJECTION: forcing a failure. [ 1287.182853][T19157] name failslab, interval 1, probability 0, space 0, times 0 [ 1287.207355][T19157] CPU: 1 PID: 19157 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1287.215290][T19157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1287.225348][T19157] Call Trace: [ 1287.228652][T19157] dump_stack+0x1d8/0x2f8 [ 1287.232989][T19157] should_fail+0x555/0x770 [ 1287.237441][T19157] __should_failslab+0x11a/0x160 [ 1287.242383][T19157] ? security_inode_alloc+0x36/0x1e0 [ 1287.247659][T19157] should_failslab+0x9/0x20 [ 1287.252146][T19157] kmem_cache_alloc+0x56/0x2e0 [ 1287.256894][T19157] security_inode_alloc+0x36/0x1e0 [ 1287.261987][T19157] inode_init_always+0x3b5/0x920 [ 1287.266926][T19157] ? set_qf_name+0x3c0/0x3c0 [ 1287.271497][T19157] new_inode_pseudo+0x7f/0x240 [ 1287.276502][T19157] new_inode+0x28/0x1c0 [ 1287.280636][T19157] ? trace_ext4_request_inode+0x28b/0x2d0 [ 1287.286332][T19157] __ext4_new_inode+0x43d/0x5650 [ 1287.291251][T19157] ? memset+0x31/0x40 [ 1287.295229][T19157] ? smk_curacc+0xa3/0xe0 [ 1287.299626][T19157] ext4_mkdir+0x3f5/0x1450 [ 1287.304052][T19157] ? security_inode_permission+0xdd/0x120 [ 1287.309756][T19157] vfs_mkdir+0x43f/0x610 [ 1287.314001][T19157] do_mkdirat+0x1d7/0x320 [ 1287.318311][T19157] __x64_sys_mkdir+0x60/0x70 [ 1287.322884][T19157] do_syscall_64+0xf7/0x1c0 [ 1287.327366][T19157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1287.333233][T19157] RIP: 0033:0x459357 [ 1287.337108][T19157] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1287.356709][T19157] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1287.365094][T19157] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1287.373054][T19157] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1287.381000][T19157] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1287.388949][T19157] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1287.396909][T19157] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:11 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x0) 02:13:11 executing program 5: r0 = socket(0x11, 0x800000003, 0x81) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f00000004c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x543, 0x0, 0xffffca88}}, 0xfdef) 02:13:11 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$binfmt_aout(r0, &(0x7f0000000440), 0x20) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000400)={0x0, 0xff6a}) 02:13:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x6000000000000000) 02:13:11 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfs*lus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:11 executing program 2 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1287.796417][T19181] FAULT_INJECTION: forcing a failure. [ 1287.796417][T19181] name failslab, interval 1, probability 0, space 0, times 0 [ 1287.880611][T19181] CPU: 0 PID: 19181 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1287.888560][T19181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1287.898619][T19181] Call Trace: [ 1287.901918][T19181] dump_stack+0x1d8/0x2f8 [ 1287.906261][T19181] should_fail+0x555/0x770 [ 1287.910696][T19181] __should_failslab+0x11a/0x160 [ 1287.915648][T19181] ? __d_alloc+0x2d/0x6e0 [ 1287.919985][T19181] should_failslab+0x9/0x20 [ 1287.924494][T19181] kmem_cache_alloc+0x56/0x2e0 02:13:11 executing program 0: 02:13:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x9008000000000000) [ 1287.929278][T19181] __d_alloc+0x2d/0x6e0 [ 1287.933440][T19181] d_alloc+0x4e/0x1d0 [ 1287.937428][T19181] __lookup_hash+0xe5/0x290 [ 1287.941939][T19181] filename_create+0x14f/0x670 [ 1287.946713][T19181] ? getname_flags+0x214/0x640 [ 1287.951592][T19181] do_mkdirat+0x5a/0x320 [ 1287.955846][T19181] __x64_sys_mkdir+0x60/0x70 [ 1287.960445][T19181] do_syscall_64+0xf7/0x1c0 [ 1287.965463][T19181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1287.971358][T19181] RIP: 0033:0x459357 [ 1287.975254][T19181] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1287.994848][T19181] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1288.003287][T19181] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1288.011267][T19181] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1288.019224][T19181] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 02:13:11 executing program 5: r0 = semget(0x3, 0x0, 0x0) semctl$SEM_STAT(r0, 0x758d788dc069ea1d, 0x12, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x6) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x40000000015, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') socket$kcm(0x29, 0x4, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) [ 1288.027307][T19181] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1288.035272][T19181] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:11 executing program 0: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) dup2(r0, r1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 02:13:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x9effffff00000000) 02:13:11 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfs+lus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:11 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x0) 02:13:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0xc00e000000000000) 02:13:11 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:11 executing program 2 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:11 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100), 0x10) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x4000000) 02:13:11 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfs-lus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1288.770793][T19621] FAULT_INJECTION: forcing a failure. [ 1288.770793][T19621] name failslab, interval 1, probability 0, space 0, times 0 [ 1288.827365][T19621] CPU: 1 PID: 19621 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1288.835306][T19621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1288.845364][T19621] Call Trace: [ 1288.848661][T19621] dump_stack+0x1d8/0x2f8 [ 1288.853011][T19621] should_fail+0x555/0x770 [ 1288.857437][T19621] __should_failslab+0x11a/0x160 [ 1288.862381][T19621] ? ext4_alloc_inode+0x1f/0x560 [ 1288.867325][T19621] should_failslab+0x9/0x20 [ 1288.871833][T19621] kmem_cache_alloc+0x56/0x2e0 [ 1288.876599][T19621] ? set_qf_name+0x3c0/0x3c0 [ 1288.881187][T19621] ext4_alloc_inode+0x1f/0x560 [ 1288.885943][T19621] ? set_qf_name+0x3c0/0x3c0 [ 1288.890526][T19621] new_inode_pseudo+0x68/0x240 [ 1288.895284][T19621] new_inode+0x28/0x1c0 [ 1288.899433][T19621] ? trace_ext4_request_inode+0x28b/0x2d0 [ 1288.905146][T19621] __ext4_new_inode+0x43d/0x5650 [ 1288.910078][T19621] ? memset+0x31/0x40 [ 1288.914075][T19621] ? smk_curacc+0xa3/0xe0 [ 1288.918403][T19621] ext4_mkdir+0x3f5/0x1450 [ 1288.922821][T19621] ? security_inode_permission+0xdd/0x120 [ 1288.928545][T19621] vfs_mkdir+0x43f/0x610 [ 1288.932790][T19621] do_mkdirat+0x1d7/0x320 [ 1288.937204][T19621] __x64_sys_mkdir+0x60/0x70 [ 1288.941793][T19621] do_syscall_64+0xf7/0x1c0 [ 1288.946291][T19621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1288.952176][T19621] RIP: 0033:0x459357 [ 1288.956065][T19621] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:13:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0xc3ffffff00000000) [ 1288.975679][T19621] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1288.984084][T19621] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1288.992050][T19621] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1289.000031][T19621] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1289.007995][T19621] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1289.015963][T19621] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_int(r0, 0x29, 0x13, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) wait4(0x0, 0x0, 0x0, 0x0) 02:13:12 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0xefffffff00000000) 02:13:12 executing program 2 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:12 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfs.lus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1289.239239][T19847] FAULT_INJECTION: forcing a failure. [ 1289.239239][T19847] name failslab, interval 1, probability 0, space 0, times 0 [ 1289.264349][T19847] CPU: 1 PID: 19847 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1289.272291][T19847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1289.282343][T19847] Call Trace: [ 1289.285633][T19847] dump_stack+0x1d8/0x2f8 [ 1289.289971][T19847] should_fail+0x555/0x770 [ 1289.294389][T19847] __should_failslab+0x11a/0x160 [ 1289.299327][T19847] ? ext4_mb_new_blocks+0x2ac/0x2cc0 [ 1289.304613][T19847] should_failslab+0x9/0x20 [ 1289.309114][T19847] kmem_cache_alloc+0x56/0x2e0 [ 1289.313900][T19847] ext4_mb_new_blocks+0x2ac/0x2cc0 [ 1289.319006][T19847] ? trace_kmalloc+0xcd/0x130 [ 1289.323692][T19847] ? kcalloc+0x2f/0x50 [ 1289.327755][T19847] ? __kmalloc+0x26c/0x340 [ 1289.332175][T19847] ? kcalloc+0x2f/0x50 [ 1289.336239][T19847] ? ext4_ext_search_right+0x4cb/0x940 [ 1289.341692][T19847] ? ext4_find_extent+0x8e0/0xaa0 [ 1289.346730][T19847] ? ext4_inode_to_goal_block+0x27b/0x3b0 [ 1289.352450][T19847] ext4_ext_map_blocks+0x4b8c/0x7170 [ 1289.357773][T19847] ext4_map_blocks+0x8f4/0x1e30 [ 1289.362630][T19847] ? __kasan_check_write+0x14/0x20 [ 1289.367745][T19847] ext4_getblk+0xae/0x460 [ 1289.372080][T19847] ext4_bread+0x4a/0x340 [ 1289.376320][T19847] ext4_append+0x175/0x310 [ 1289.380745][T19847] ext4_mkdir+0x7ad/0x1450 [ 1289.385174][T19847] vfs_mkdir+0x43f/0x610 [ 1289.389417][T19847] do_mkdirat+0x1d7/0x320 [ 1289.393750][T19847] __x64_sys_mkdir+0x60/0x70 [ 1289.398335][T19847] do_syscall_64+0xf7/0x1c0 [ 1289.402834][T19847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1289.408719][T19847] RIP: 0033:0x459357 [ 1289.412617][T19847] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1289.432211][T19847] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1289.440615][T19847] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1289.448581][T19847] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1289.456545][T19847] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1289.464515][T19847] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1289.472498][T19847] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:12 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x0) 02:13:12 executing program 0: 02:13:12 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0xf0ffffff00000000) 02:13:12 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfs0lus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:12 executing program 2 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:13 executing program 0: 02:13:13 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1289.717470][T19865] FAULT_INJECTION: forcing a failure. [ 1289.717470][T19865] name failslab, interval 1, probability 0, space 0, times 0 02:13:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0xffffffff00000000) [ 1289.817663][T19865] CPU: 0 PID: 19865 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1289.825615][T19865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1289.835713][T19865] Call Trace: [ 1289.839023][T19865] dump_stack+0x1d8/0x2f8 [ 1289.843361][T19865] should_fail+0x555/0x770 [ 1289.847786][T19865] __should_failslab+0x11a/0x160 [ 1289.852733][T19865] ? kcalloc+0x2f/0x50 [ 1289.856802][T19865] should_failslab+0x9/0x20 [ 1289.861297][T19865] __kmalloc+0x7a/0x340 [ 1289.865460][T19865] kcalloc+0x2f/0x50 [ 1289.869349][T19865] ext4_find_extent+0x216/0xaa0 [ 1289.869362][T19865] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 1289.869375][T19865] ext4_ext_map_blocks+0x170/0x7170 [ 1289.885749][T19865] ? trace_lock_acquire+0x159/0x1d0 [ 1289.890970][T19865] ? __kasan_check_write+0x14/0x20 [ 1289.896086][T19865] ext4_map_blocks+0x8f4/0x1e30 [ 1289.900953][T19865] ? __kasan_check_write+0x14/0x20 [ 1289.906422][T19865] ext4_getblk+0xae/0x460 [ 1289.910781][T19865] ext4_bread+0x4a/0x340 [ 1289.915038][T19865] ext4_append+0x175/0x310 [ 1289.919460][T19865] ext4_mkdir+0x7ad/0x1450 [ 1289.923891][T19865] vfs_mkdir+0x43f/0x610 [ 1289.928152][T19865] do_mkdirat+0x1d7/0x320 [ 1289.932495][T19865] __x64_sys_mkdir+0x60/0x70 [ 1289.937103][T19865] do_syscall_64+0xf7/0x1c0 [ 1289.941612][T19865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1289.947503][T19865] RIP: 0033:0x459357 [ 1289.951402][T19865] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1289.971010][T19865] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1289.979427][T19865] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1289.987413][T19865] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1289.995392][T19865] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1290.003372][T19865] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 02:13:13 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsLlus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:13 executing program 0: [ 1290.011353][T19865] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:13 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:13 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000100100000100000005e8000000b47fc9c858c598ba4909000000000000000a2e834efe3f87695931515781ae36a4d148f269399022f544be4fac9508cce4df4d7015eb590bbfb45f7b815bdb2281145dd688759944bd09b0f55e7ca54b07bd9189de8daeb173aca360f4bca4f5019235efcea227e56f94ddc8d5e02f38fdcdad2e5cc22b1f090ecf60605f3d9129670000000000000000000000000000000eab3ccfade12420421726b120b1ce8ad1642bb195935f9751facf178c4a3b74eeffcfe0312cd4a5cea34746dea9f76bf16244b5bc1bace51a63e67806440fbab6d8cd3ef5e19c077dbc02efed0840d26dbf3f84d5a39b30564d998a2f9293c470f0896ef88805670ed1220cf77ea1c692ee2053565d6529987f514b384013576ab56e1dc4f444be4a13aa637cea74ca6ebce21635"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x0) 02:13:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000240)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r7, 0x0, 0x0) writev(r5, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r5, &(0x7f0000000480)=ANY=[], 0xa) close(r6) socket$netlink(0x10, 0x3, 0x4) r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x8040, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r8, 0xc0585605, &(0x7f0000000180)={0x0, 0x0, {0x7, 0x1, 0x2016, 0x9, 0x4, 0x7, 0x1, 0x3}}) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r4, 0x0, r6, 0x0, 0x80000001, 0x0) 02:13:13 executing program 0: 02:13:13 executing program 2 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:13 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:13 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsXlus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:13 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:13 executing program 0: [ 1290.687261][T19996] FAULT_INJECTION: forcing a failure. [ 1290.687261][T19996] name failslab, interval 1, probability 0, space 0, times 0 [ 1290.737308][T19996] CPU: 0 PID: 19996 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1290.745255][T19996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1290.755318][T19996] Call Trace: [ 1290.758619][T19996] dump_stack+0x1d8/0x2f8 [ 1290.762967][T19996] should_fail+0x555/0x770 [ 1290.767401][T19996] __should_failslab+0x11a/0x160 [ 1290.772354][T19996] ? kcalloc+0x2f/0x50 [ 1290.776432][T19996] should_failslab+0x9/0x20 [ 1290.780947][T19996] __kmalloc+0x7a/0x340 [ 1290.785196][T19996] kcalloc+0x2f/0x50 [ 1290.789100][T19996] ext4_find_extent+0x216/0xaa0 [ 1290.793965][T19996] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 1290.800491][T19996] ext4_ext_map_blocks+0x170/0x7170 [ 1290.805727][T19996] ? __kasan_check_write+0x14/0x20 [ 1290.810868][T19996] ? __down_read+0x14b/0x360 [ 1290.815489][T19996] ext4_map_blocks+0x424/0x1e30 [ 1290.820342][T19996] ? __kasan_check_write+0x14/0x20 [ 1290.825561][T19996] ext4_getblk+0xae/0x460 [ 1290.829912][T19996] ext4_bread+0x4a/0x340 [ 1290.834171][T19996] ext4_append+0x175/0x310 [ 1290.838718][T19996] ext4_mkdir+0x7ad/0x1450 [ 1290.843157][T19996] vfs_mkdir+0x43f/0x610 [ 1290.847414][T19996] do_mkdirat+0x1d7/0x320 [ 1290.851867][T19996] __x64_sys_mkdir+0x60/0x70 [ 1290.856463][T19996] do_syscall_64+0xf7/0x1c0 [ 1290.860969][T19996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1290.866863][T19996] RIP: 0033:0x459357 02:13:14 executing program 0: [ 1290.870759][T19996] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1290.890454][T19996] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1290.898874][T19996] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1290.906876][T19996] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1290.914857][T19996] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1290.922835][T19996] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 02:13:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:14 executing program 0: [ 1290.930816][T19996] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:14 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1290.991616][T19996] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:14 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000100100000100000005e8000000b47fc9c858c598ba4909000000000000000a2e834efe3f87695931515781ae36a4d148f269399022f544be4fac9508cce4df4d7015eb590bbfb45f7b815bdb2281145dd688759944bd09b0f55e7ca54b07bd9189de8daeb173aca360f4bca4f5019235efcea227e56f94ddc8d5e02f38fdcdad2e5cc22b1f090ecf60605f3d9129670000000000000000000000000000000eab3ccfade12420421726b120b1ce8ad1642bb195935f9751facf178c4a3b74eeffcfe0312cd4a5cea34746dea9f76bf16244b5bc1bace51a63e67806440fbab6d8cd3ef5e19c077dbc02efed0840d26dbf3f84d5a39b30564d998a2f9293c470f0896ef88805670ed1220cf77ea1c692ee2053565d6529987f514b384013576ab56e1dc4f444be4a13aa637cea74ca6ebce21635"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00), 0x40000000000037b, 0x0) 02:13:14 executing program 0: 02:13:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200), 0x0) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050500019fa5d4b3"], 0xe) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_opts(r7, 0x0, 0x4, &(0x7f0000000040), &(0x7f0000000080)) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:14 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfs\\lus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:14 executing program 2 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:14 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1291.623513][T20135] FAULT_INJECTION: forcing a failure. [ 1291.623513][T20135] name failslab, interval 1, probability 0, space 0, times 0 [ 1291.636652][T20135] CPU: 1 PID: 20135 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1291.644560][T20135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1291.654719][T20135] Call Trace: [ 1291.658019][T20135] dump_stack+0x1d8/0x2f8 [ 1291.662370][T20135] should_fail+0x555/0x770 [ 1291.666798][T20135] __should_failslab+0x11a/0x160 [ 1291.671739][T20135] ? __es_insert_extent+0x7ba/0x17c0 [ 1291.677031][T20135] should_failslab+0x9/0x20 [ 1291.681542][T20135] kmem_cache_alloc+0x56/0x2e0 [ 1291.686325][T20135] __es_insert_extent+0x7ba/0x17c0 [ 1291.691448][T20135] ? __kasan_check_write+0x14/0x20 [ 1291.696568][T20135] ? do_raw_write_lock+0xf3/0x460 [ 1291.701625][T20135] ext4_es_insert_extent+0x250/0x2ea0 [ 1291.707015][T20135] ext4_ext_map_blocks+0x1806/0x7170 [ 1291.712332][T20135] ? __down_read+0x14b/0x360 [ 1291.716929][T20135] ext4_map_blocks+0x424/0x1e30 [ 1291.721813][T20135] ? __kasan_check_write+0x14/0x20 [ 1291.726926][T20135] ext4_getblk+0xae/0x460 [ 1291.731262][T20135] ext4_bread+0x4a/0x340 [ 1291.735507][T20135] ext4_append+0x175/0x310 [ 1291.739926][T20135] ext4_mkdir+0x7ad/0x1450 [ 1291.744363][T20135] vfs_mkdir+0x43f/0x610 [ 1291.748629][T20135] do_mkdirat+0x1d7/0x320 [ 1291.752964][T20135] __x64_sys_mkdir+0x60/0x70 [ 1291.757558][T20135] do_syscall_64+0xf7/0x1c0 [ 1291.762059][T20135] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1291.767949][T20135] RIP: 0033:0x459357 [ 1291.771856][T20135] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1291.791646][T20135] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1291.800139][T20135] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1291.808243][T20135] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1291.816229][T20135] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1291.824203][T20135] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1291.832180][T20135] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1291.868598][T20135] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r1) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x23f) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f00000002c0)) r5 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r6, 0x0, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r8, 0x0, r7) setsockopt$inet_sctp6_SCTP_EVENTS(r7, 0x84, 0xb, &(0x7f0000000080)={0x2, 0x1f, 0xff, 0x7f, 0x3, 0x7, 0x4, 0x1f, 0x40, 0x2, 0x5}, 0xb) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = fcntl$dupfd(r10, 0x0, r9) setsockopt$IP_VS_SO_SET_ADD(r11, 0x0, 0x482, &(0x7f00000000c0)={0x73, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x2e}, 0x2c) r12 = socket$inet6(0xa, 0x2, 0x0) r13 = socket$inet6(0xa, 0x2, 0x0) r14 = fcntl$dupfd(r13, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_RTOINFO(r14, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x3, 0x80}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r11, 0x84, 0x13, &(0x7f0000000240)={r15, 0x100}, &(0x7f0000000280)=0x8) write$binfmt_elf64(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454cd4b3000000000000000000"], 0xe) close(r5) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfd6e) r16 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x5586114f35a0fe6f, 0x0) ioctl$KVM_RUN(r16, 0xae80, 0x0) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 02:13:15 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsclus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:15 executing program 0: 02:13:15 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:15 executing program 2 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:15 executing program 0: [ 1292.041971][T20253] IPVS: set_ctl: invalid protocol: 115 0.0.0.0:21 [ 1292.102303][T20253] IPVS: set_ctl: invalid protocol: 115 0.0.0.0:21 [ 1292.196956][T20255] FAULT_INJECTION: forcing a failure. [ 1292.196956][T20255] name failslab, interval 1, probability 0, space 0, times 0 [ 1292.234037][T20255] CPU: 0 PID: 20255 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1292.241979][T20255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1292.252029][T20255] Call Trace: [ 1292.255329][T20255] dump_stack+0x1d8/0x2f8 [ 1292.259658][T20255] should_fail+0x555/0x770 [ 1292.264074][T20255] __should_failslab+0x11a/0x160 [ 1292.269092][T20255] ? kcalloc+0x2f/0x50 [ 1292.273157][T20255] should_failslab+0x9/0x20 [ 1292.277653][T20255] __kmalloc+0x7a/0x340 [ 1292.281809][T20255] kcalloc+0x2f/0x50 [ 1292.285699][T20255] ext4_find_extent+0x216/0xaa0 [ 1292.290543][T20255] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 1292.296866][T20255] ext4_ext_map_blocks+0x170/0x7170 [ 1292.302087][T20255] ? __kasan_check_write+0x14/0x20 [ 1292.307187][T20255] ? __down_read+0x14b/0x360 [ 1292.311780][T20255] ext4_map_blocks+0x424/0x1e30 [ 1292.316633][T20255] ? __kasan_check_write+0x14/0x20 [ 1292.321744][T20255] ext4_getblk+0xae/0x460 [ 1292.326074][T20255] ext4_bread+0x4a/0x340 [ 1292.330401][T20255] ext4_append+0x175/0x310 [ 1292.334815][T20255] ext4_mkdir+0x7ad/0x1450 [ 1292.339241][T20255] vfs_mkdir+0x43f/0x610 [ 1292.343482][T20255] do_mkdirat+0x1d7/0x320 [ 1292.347814][T20255] __x64_sys_mkdir+0x60/0x70 [ 1292.352396][T20255] do_syscall_64+0xf7/0x1c0 [ 1292.356893][T20255] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1292.362774][T20255] RIP: 0033:0x459357 [ 1292.366665][T20255] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1292.386279][T20255] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1292.394688][T20255] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1292.402652][T20255] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1292.410729][T20255] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1292.418696][T20255] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1292.426662][T20255] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:15 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000100100000100000005e8000000b47fc9c858c598ba4909000000000000000a2e834efe3f87695931515781ae36a4d148f269399022f544be4fac9508cce4df4d7015eb590bbfb45f7b815bdb2281145dd688759944bd09b0f55e7ca54b07bd9189de8daeb173aca360f4bca4f5019235efcea227e56f94ddc8d5e02f38fdcdad2e5cc22b1f090ecf60605f3d9129670000000000000000000000000000000eab3ccfade12420421726b120b1ce8ad1642bb195935f9751facf178c4a3b74eeffcfe0312cd4a5cea34746dea9f76bf16244b5bc1bace51a63e67806440fbab6d8cd3ef5e19c077dbc02efed0840d26dbf3f84d5a39b30564d998a2f9293c470f0896ef88805670ed1220cf77ea1c692ee2053565d6529987f514b384013576ab56e1dc4f444be4a13aa637cea74ca6ebce21635"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00), 0x40000000000037b, 0x0) 02:13:15 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:15 executing program 0: 02:13:15 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsdlus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:15 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r6, 0x0, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r5) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) [ 1292.451889][T20255] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:15 executing program 0: 02:13:15 executing program 2 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1292.547642][T20267] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1292.581772][T20271] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:15 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rfkill\x00', 0x101012, 0x0) r1 = memfd_create(&(0x7f0000000080)='/dev/dsp\x00', 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00bf18020003"], 0x6) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f0000000180)=ANY=[], @ANYRESDEC, @ANYBLOB="19363ee8af20de9c150dc3fa4dd66667f04f010ce72081115054226fd0baaa12", @ANYRESOCT]], 0xfffffee8) sendfile(r0, r1, &(0x7f0000000000), 0x7fffffffffffffff) 02:13:15 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) ioctl$PPPIOCGCHAN(r7, 0x80047437, &(0x7f0000000040)) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1292.686744][T20277] FAULT_INJECTION: forcing a failure. [ 1292.686744][T20277] name failslab, interval 1, probability 0, space 0, times 0 [ 1292.731463][T20277] CPU: 0 PID: 20277 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1292.739439][T20277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1292.749506][T20277] Call Trace: [ 1292.752805][T20277] dump_stack+0x1d8/0x2f8 [ 1292.757142][T20277] should_fail+0x555/0x770 [ 1292.761579][T20277] __should_failslab+0x11a/0x160 [ 1292.766521][T20277] ? ext4_mb_new_blocks+0x2ac/0x2cc0 [ 1292.771823][T20277] should_failslab+0x9/0x20 [ 1292.776409][T20277] kmem_cache_alloc+0x56/0x2e0 [ 1292.781172][T20277] ext4_mb_new_blocks+0x2ac/0x2cc0 [ 1292.786369][T20277] ? trace_kmalloc+0xcd/0x130 [ 1292.791047][T20277] ? kcalloc+0x2f/0x50 [ 1292.795112][T20277] ? __kmalloc+0x26c/0x340 [ 1292.799523][T20277] ? kcalloc+0x2f/0x50 [ 1292.803593][T20277] ? ext4_ext_search_right+0x4cb/0x940 [ 1292.809050][T20277] ? ext4_find_extent+0x8e0/0xaa0 [ 1292.814076][T20277] ? ext4_inode_to_goal_block+0x27b/0x3b0 [ 1292.819809][T20277] ext4_ext_map_blocks+0x4b8c/0x7170 [ 1292.825143][T20277] ext4_map_blocks+0x8f4/0x1e30 [ 1292.830012][T20277] ? __kasan_check_write+0x14/0x20 [ 1292.835129][T20277] ext4_getblk+0xae/0x460 [ 1292.839471][T20277] ext4_bread+0x4a/0x340 [ 1292.843714][T20277] ext4_append+0x175/0x310 [ 1292.848131][T20277] ext4_mkdir+0x7ad/0x1450 [ 1292.852560][T20277] vfs_mkdir+0x43f/0x610 [ 1292.856808][T20277] do_mkdirat+0x1d7/0x320 [ 1292.861243][T20277] __x64_sys_mkdir+0x60/0x70 [ 1292.865923][T20277] do_syscall_64+0xf7/0x1c0 [ 1292.870433][T20277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1292.876329][T20277] RIP: 0033:0x459357 [ 1292.880225][T20277] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1292.899830][T20277] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1292.908243][T20277] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1292.916243][T20277] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1292.924224][T20277] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 02:13:16 executing program 0: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000680)={0x7}, 0x7) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x40000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)=""/96, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x155) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 02:13:16 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfshlus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1292.932199][T20277] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1292.932445][T20391] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1292.940163][T20277] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1293.035255][T20391] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:16 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00), 0x40000000000037b, 0x0) 02:13:16 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:16 executing program 2 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r2, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r1) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 02:13:16 executing program 0: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 02:13:16 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsilus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1293.472906][T20510] FAULT_INJECTION: forcing a failure. [ 1293.472906][T20510] name failslab, interval 1, probability 0, space 0, times 0 [ 1293.497391][T20510] CPU: 0 PID: 20510 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1293.505343][T20510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1293.515397][T20510] Call Trace: [ 1293.518698][T20510] dump_stack+0x1d8/0x2f8 02:13:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_int(r0, 0x29, 0x10, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) wait4(0x0, 0x0, 0x0, 0x0) 02:13:16 executing program 5: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) [ 1293.523056][T20510] should_fail+0x555/0x770 [ 1293.527482][T20510] __should_failslab+0x11a/0x160 [ 1293.532420][T20510] ? kzalloc+0x1f/0x40 [ 1293.536483][T20510] should_failslab+0x9/0x20 [ 1293.540984][T20510] __kmalloc+0x7a/0x340 [ 1293.545142][T20510] kzalloc+0x1f/0x40 [ 1293.549037][T20510] smk_parse_smack+0x197/0x230 [ 1293.553806][T20510] smk_import_entry+0x27/0x590 [ 1293.558581][T20510] smack_d_instantiate+0x78f/0xd70 [ 1293.563696][T20510] ? lockdep_init_map+0x2a/0x680 [ 1293.568636][T20510] security_d_instantiate+0xa5/0x100 [ 1293.573918][T20510] d_instantiate_new+0x65/0x120 [ 1293.578765][T20510] ext4_mkdir+0xfa9/0x1450 [ 1293.583223][T20510] vfs_mkdir+0x43f/0x610 [ 1293.587469][T20510] do_mkdirat+0x1d7/0x320 [ 1293.591797][T20510] __x64_sys_mkdir+0x60/0x70 [ 1293.596382][T20510] do_syscall_64+0xf7/0x1c0 [ 1293.600887][T20510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1293.606775][T20510] RIP: 0033:0x459357 [ 1293.610670][T20510] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1293.630282][T20510] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1293.638807][T20510] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1293.646770][T20510] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1293.654744][T20510] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1293.662723][T20510] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 02:13:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) connect$bt_rfcomm(r7, &(0x7f0000000040)={0x1f, {0x5, 0x4, 0x6, 0x7f, 0x3f, 0x40}, 0x1}, 0xa) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1293.670692][T20510] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1293.731908][T20510] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:17 executing program 5: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) 02:13:17 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@hci, 0x80) sendmsg$can_bcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "7d4de30444adc043"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000700)=ANY=[@ANYBLOB="07000000c6081e0900000000003f0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="44adc0430100000000000000000000005deca2c94acb507247cc3684d1523426a929384a26451e7a4ffcd8265ebb8cbb1346759291752c6ce386315560dcc0bfc9e50bae16ef12cc89c135864deefbfb9b2febd1c4b58c81684a168e08e1a2ea9f0afcd1698a09382e9d5ff45839ded0e0635b40f255c87cfb106538e0385b41b68fd4477f54a194f9f72c79e7e8115ac033c1140be29dbcd8ec499c3e5d9e2de5d002468f9ac9c64a6706efabe8733e0d526989ed6af192d2"], 0x80}}, 0x0) 02:13:17 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsllus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:17 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, 0x0, 0x0, 0x0) 02:13:17 executing program 2 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) signalfd4(r7, &(0x7f0000000040)={0xb8}, 0x8, 0x1c00) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r9, 0x0, r8) r10 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000d40)='rxrpc\x00', 0x0, &(0x7f0000000dc0)="70edfcc054", 0x5, r10) r11 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="e98c49760ab81c8fb9fb6db7bc0b93e4b12638b5d0dec59106cf02716dd893c6cb0af5c2fb3888c85010116ba4afd370878e12352fc86555a0e5e8dbaee12dd656e9bf89cc25d9e368da55155ebc2ed640ba11f6799a9d36a30c2d4d4884ca539718dc1a5d8ed9b803b7e9d28505ab1d77e3fe9bfc8830111beba4482976ae7a208c7f8eeeedd4e30e74a0b9", 0x8c, r10) r12 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r13 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r12, r12, r13}, &(0x7f0000000280)=""/243, 0x20e, &(0x7f0000000240)={&(0x7f0000000080)={'crct10dif-generic\x00'}}) r14 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000d40)='rxrpc\x00', 0x0, &(0x7f0000000dc0)="70edfcc054", 0x5, r14) r15 = add_key(&(0x7f00000002c0)='trusted\x00', 0x0, &(0x7f00000004c0)="69229816f0a41877e72dfe6f574255f4af21a339da30f0c0391f0f07596debffa8fb87c9da86316bbe0254195e92497dc390b4dc1b40506a6760c5fed4a834b2611b76a7332cd9a4a29611a9e87ef239753f8fbee248463ec19245d1fc7f91180f2d19b8c343acbe4d15737b938f232f5bea3f36fee9c3ae9df743636a47cc48260f44cf6f96f4130548ce85c89a2ab673f8ae4e1f748383dc395fd2180d64f7c6171aeedc47522fb5e31ead2d875d6440e966e8ce2b97c8a9305aadbfb1e349b91faa372ed45d98dbe98961ebcf3aaaa80354acf4226c239c1fb6d7323766149231d1cabf113aba1cbc1f20e552251dea4f476d9b5c9411944baca7a9b335d772e644538888b7025bbdc957b949f39c822dd057f2b5863dd534c6f6230a94e08fce1394f8f88b82de21884b2f28bac55b5ece520f58383e499a458b65943583a80842e60356122f36e5f8e72d07d23f145fbed41d1b6e662d3b7273c7197d50a09d7f3c4751a136ee946f9638f126a30a30ff82ac3333a2b96be7edef68380a505257fbc14744a1b9f480e9fa5bfa7ccf5c9c40c80da1e4b8e004524c148c1f359ec0335b503363171d200bd83b5b687259d9b73e7b9b41dc0b14fc8b232f6fc0ac6e42325997d63280a92985ec0fe39aa2906bb376c558daf21dfc039428136e0c5d671e3bfdc50f279278410f8dce2454ec4a3cb8120ca535581a35b21ea5e9a9390f802b281b31875abfb38aa5fcb4b63ce3fc2c8f7c95e924b9c1d08804c47829613b607e910391b8ca1492a07039a07d2b241bb7b9196df6043cafcc324ac48b94900b9ca0385e61dbba8f8b9f82244a100c5582e3d21ec6546253a33b62ad76ae79359355932cabc9b51c0d2c7243d7596c3712db56fe9cc80423f0cf9f92f9da09de9ef1a40d84457f39e6fb9a052e733c11b2ab017ef254922f0d5b984504d06da2b1437ac989edd03e4e015ec55da27ba28ff5f55cef1d8b6a546a968c119dfbea3ae8575087a78bae528a59ffe36d2bf50835cd75e31471523536f3de710001a88acaa0a977e5962e4b9b0c1d5b7cdca1bedafe6ffaaa85a50653e53e42c8928ee7c8f0c3e286a293165f8e4f92073b17f4d14b8b351a7197d35e1c5eed6bb85ac56b661f4a0f89fb7b300718241e84a7841bb0b968eb017aa633a20b6a3d3c5fd6d475388ddb5661ccb681913226f0251c30ece4060b8ef066fe85c778d398c358dda19b767f9d56f02669320569640072688a5a22ced34afc9dfb85d7cf52f8b9f0fcde4accf1bfe94c2d6ee40933411de88bea99e9d9b5bc8e03ddeb32c94e41e891fa66205c646e22ba561a21ebdb09df7fed3d50074d8fee9fdd01a4f41cd87e8a65f3270eb10e5f9a950fbed02e8df3533e3d7710c3b9a3dcb1fba4b47097c1294d5fde6f6bce04938f1e3a0da38d43aba5fbc3f9224d803acc50b7cd0f05d6f71f7ad2e6e10e79acbff680442dcfc4d304c06ea9d102d60bfd91c461d2ee2752f4b4ba07807a6d01adcaa1e27db29f5d831b4ea4b10eea3d657f4259816d93424232a9fa8e49cb878e55a7f54f6b7c09ce52c38d7507b55fbba1b25219404eb846a3ba9534ed1ab4c2aa75ff2840edc7c5553750255bb49e929440c9e29175fa4324376174ba353d78b0fceb0ab1d35ef3e2867cbdf13310b9027514cfe15546edc6547865553fb34eedf7884c321306574ec874ffa0d1d0310593567f319d0c2bb6f26d157a013277376edc06f72f7c262ef74bff80adf29470189d6e1f3201d783bdb0f6bf53a80b2437b5661b983f1ca2f10d7dc6664a97608bddbfe7070d3592cb024724ac46976fcb595d05fb33e73c053c3b4ba406be5cf16b7f1527155aab4c1cfc5c5cd6ef6abdba6907bb9d3609250d3cb76e4c72adcb4a6c485349d468b17cf04c1a0799e25be4185b6c023cedb84f01e12f0ac957e835dc175b40ec54f457a4d49605f2c2dcca47eb8bd9ee61155168930979a22e62cfc593a60c12d5de32cc5662cdc3b118e84dfe422f632f26b208a75c41a8b6ed5bc2de260bebcf39e7497372c542dff39b3100ce394df85444df63da072b2186bbe02ad3af7dd7ec1f65250904d59a6a93c9e8bcf72ff98a3d69b275870a478a6696f6f40dc6f320b6354bae1bd69da359ba57ab1c9bc15c726c85c331943dee86f74fac93a53cfe567c9f81bd64b84b67e69e66f54a8699199236c389473c63e832db8f61260f4ab74b9be63a157d2d1ff872696552d1bb10d5a0390dd2931e2d512a3009fc147890db404afe6aadbb6fd7b0f3f8449862d3ca7187e75850b06beaee538b7d0fd4995d7a8eee004a9b1505a1eb60005afec6597be09397b624afb86e3d808ea96896ccd694b6444310df8265f12a27617a9041b693c74c060a9a56e14185610c29b5fbd32eeb974fab3cc73fe8f55eaf5dafeffed32d67f5320cdc7fb815dd078d8932fa179db1a121aefccdf29904b427127a1ac49c9816644d253fe2001c665bfef79ff0ee37063394176954e8f04c6fdda8685b671e4cb2723b0f9e98e3ef39c2c7ac38111e8cc53ab90b5604e26eb1fdf64d70b2c3f80fcb9983ab91ab3df3af9394683ac1b5196ae06158b58f1d5b4938f88d7aaa2e1b9c3f2a7441e81081b2cf294844320a498549ea6a4cacee21f656418be15ef68a7a56dfbd298a0f9baaf776b71f5624a90d70e5223bc7834c0fe402804d4bf2b51b2b2cb6460b4c77fa22b652cffe55708db6740b738ab4b6a44d3a220764108d7d28d5aec692d8dd6add5bbe2caaa8ea23f6c2e37e73195c2b972bddf8437f858854227fd54a520601838504c5f043c079f76859a776f258f61c3b74bacc1470e741a2da056fe3e7f368dce7874db1ffb24b686f452f421863a654e099a42562f5733e7540b72934b8511b2e9e4611e8e4730a48eb9137341825a2b36433a448a6658cbad3dbce8d17230052454d2d8cd8b3567bda8b367a5d61081b72824b1cb060d56e1ea9b0d49094e61464184d87d5f3eb470f024582ee37925add82209140d4f67d1089aa449e96d8ffef99aa5e7119bcd407b024282de0bb00fe5bba0ddce9ff46484b123a97aaca3c96ca7812ae8d94910918c75d4d9a5cc324631d83c1b8e77e0887034591e597388db41f7f652d1ccdf25ef5aca8db6443177d5a14d5124a4d608d47b2baa5251add42df948b29408380304819607d64199c7c14f278e734e9e850de8825ccb0f2b8fddcf4f34c33cd0166ea7428aafba4348d584b55938ceed05259f81436d44077e84f6229345c34d3f014d824b725499593781ec4632c1f25f21ec166133d406505555344735726bf8703e00831e79cea5cb17ab21896569840e63572fc52f65379b5df331ab5bd5e6b198d7cf9f04d33b1cac0c3e591832aff3b074a9a6fa47969485b4a4b2bfa5f7f3ba83beb068ac2e8a875f7f4c44e8045a3d3bcc149f6c1b47524ed3d41b5d666a65b72903745e7c4e51551d802d57a199a792c77e3a0f62eaca2ccab23342af6a9f99cd3707897833f99d544eb455802fa9fa31e92839a3b266884ba348515e3d95697bc267265d0f8fac0b7e0868fcda7423b17cf3417f2eca2a9edf3a8739c0683d65fefb856c88b5a1cc9faf95fda4455518468284fdc787c4217760a61eaae848f3f13cd83f76ed7b74cb4317e26f7165ca9bcea39d854f2162dbdd395184b15dda287f70c79763c95e74d5c96a26ff649e5186fea9b5b64c51a87dc86db594adbc7ddeb9b78dbaa53728ff57488a0d2df97278f944599ae33ce2d7c156234542dec4ed4d81eb1eec0d706fed52d0c52cb3b3d4cd8f07581294d709fdab6bf0135c4ddbb780cd02585c2ac605f863a37f059a49b5d344cbb083c2011d7bf9b89b1bfd2c02316bfec77c32833bdd43b478f74d3601241e2b0b39218f3f67d2b277f5e1f91df5448035184017dd1271d710162f9bc3ddee2a6885449e99f562af5dd97daf3973475ae5b906bfb3076e198696e987c6d7647f0873897ed575486ec30b5c77fa5a9f04e8e8c65d697a89d692ab459f110628bf901f7cf3461c63f5893c1c359674ecbcdd94a16a52374a170e28e953ff5e96e6988c8b44fc3801697a1458a4dfd43e7b1f75209582edfd36d80af0755d4eada04dfafa663e68861c48a04e0bc230d635e125fed536f34239b676a2cb3d92d71f56218fdc586d80e1584b3d828a8896b279abfa408dfc1eb32fe87bb30352dec043f3a7f0bcc7814b730e1a6d74c28f510a099c04a1113c7e52420644b2a6b720a38a2bd88b2f97d763395fe9549bbb6d9a578e199389a51e7e9c855e046547936419339d8e37782900139a8e08122f3347f8a2ac40339d0566cc038d02243d7425a7ec495f1d96f7e6cdae62f00ac0f1d34737ef0ef51f32a0bc33961bbcc117508c3127aba71ff34255127bfc1085d4cb1e17e5e0109087b6f62f5da4b54f174baccf389412af877d0d146ec0880438b3383c1132907d6681b0a6dd92976bf2ac86d5c6a42dd6462ad947d8b4c42c2915193e02489dd9ebe6e46ef1a9577ff798bcf32836cba49003eef62392d4f6a06ddb0749468f5cf58fa9c22c3c404ed3142219c2ae4390bc6f9db7357a910d84077cf30f4946c4af44f58703b1ce6d728dece16d6ad4568f4d272f43c69db5a32e13fa093b6bf4c48b271e2d686be3ce0271617bb4ff89b87acc684cded177afef8edf4995e1dae73e9a5d50615cdddfb709f9c02839fc281163e815ce7e2304f0583b2826a2c21fef23f3af971e25cc3af4d66746d1b7973892a5518b603cf63f90a40e3a1d8e201971e0e649da4afe5a0facb1db52bfee6134a558d0fc1024c0425c723ff23c361e5684eb3624f71cbc3ca701968b0f3071de38a12821ac44eb72e44f413e0468e1606868deed83cc48920c841eac935327f31a056696144d9c4a17456f70d2a2b8ed32e57229bb9f2ce91ff37157f8c719d84ea2006acb5e5834b7acb0ab7a68c76013147418415b7ef1d32167df531d5f8301494498045ea88cb22850ad0e1d05fff26ce6adbd1bc4bdf04276cc5d4d0fc8b9a8b60f1e6d7a0cb1ff77d3b2a990e68f7b9fada1bba3978f9c01173d5df55907d222e0add7e9531eaad154b84e6a27a8aabc759ec69f1c30b647be7a35594f1d584b428bc023b90e79e0ebf02623cde0b9b6d2f3910f733e2235b2469e33a3fff8f8791d82e6fcbbfce5786826aa64c1a78d1e6035ccac9bbb9fd6ea12f3bcc984e5f726ca63e42ba606a5cdafeca564445de9490cc12c9a8ff6513156ce03dc547954b24eda6077fc94bf344a494750cebab5ad6fea5b72bb681f085fafdd4bf36d86526ec768fa5293febe7a87b0a5d1496c5d77e52dfb6bda86f195320f38c7d8a0416664bd042bcf41cb49f1ce84aaa0b48fad0b9ba4f8e3f53d11fbfc138531dd5e1ae6dc0736d1c3b1dce6d1f4e5e8f4e2228f83cf503308902247582bfa0cad31a928a6a6d8d2d5c672437c5cc9a080632bb4cab0797f37d3f575997b7f487228ccda89256c124c83056c676c85b42f108e318524c3697aa46ae29c0abf9b2e72e32feebcc41410a9852890f45145c648d49ce0bcd436d190898a928a8025b023509df7c4b25e61e6d936f76c60931bc351cf3a4b7287be4d06329206ffb49aef889d752ad4ad74814ac8beea263ec4430c5e8712534f549d958eeea031bacada6db246ddb2ad945516b634b8722864931eab7e6a80dd932f2058b051de02e5a148eac97d3ca9deffe305aa6807b55c6c99f8713122d85294e34d1bc3fb4", 0x1000, r14) keyctl$dh_compute(0x17, &(0x7f0000000300)={r11, r13, r15}, &(0x7f00000014c0)=""/4096, 0x1000, &(0x7f0000000400)={&(0x7f0000000340)={'sha256_mb\x00'}, &(0x7f0000000380)="a8e0926081d0c03ef58f84856792dbadee8404734a87b3daf9455d20a3a1c741c59f59c261a9b48a68dbc8ecc38cc02a630b029c94b7a4f32ec912ff1d0d15f06a174e24b199f69046b973bca3c2899bd77e5eadcdce074571cfea6b41e2e5d9630e44e7d95bcc096e5c38fb2878c9b49e2acecf3e1ba6f28f189488", 0x7c}) writev(r9, &(0x7f0000000080)=[{&(0x7f00000000c0)="580000001400a9", 0x7}], 0x17c) write$binfmt_elf64(r2, &(0x7f00000024c0)=ANY=[@ANYBLOB="ff4562410680050001019fa5c5c4c76bffd7e14b393aff31495025397b2e4fec496856fcc7f5b82f68a1c84e1be96e4677e4efa2e202d83c4495f31b99e930c42dcfb1aae7464f37500fc8915af198f8b56c404d7d63afe2593c9540793e197ae959c1588c461ff143103263dd7a266454a2fac84b329cdf054938e52bb43de0eb3365a175be626acf1b20afc506c90d3d7efce1e383657914e370bd9eabb6e6f3ee039ba1e8390b7525c333f72584822efb"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:17 executing program 5: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) 02:13:17 executing program 0: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00), 0x40000000000037b, 0x0) 02:13:17 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsolus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:17 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1294.577867][T20646] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1294.591222][T20647] FAULT_INJECTION: forcing a failure. [ 1294.591222][T20647] name failslab, interval 1, probability 0, space 0, times 0 [ 1294.641095][T20647] CPU: 1 PID: 20647 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1294.649041][T20647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1294.659211][T20647] Call Trace: [ 1294.662514][T20647] dump_stack+0x1d8/0x2f8 [ 1294.666861][T20647] should_fail+0x555/0x770 [ 1294.671291][T20647] __should_failslab+0x11a/0x160 [ 1294.676229][T20647] ? ksys_mount+0x6a/0x100 [ 1294.680647][T20647] should_failslab+0x9/0x20 [ 1294.685151][T20647] __kmalloc_track_caller+0x79/0x340 [ 1294.690462][T20647] strndup_user+0x76/0x130 [ 1294.694884][T20647] ksys_mount+0x6a/0x100 [ 1294.699130][T20647] __x64_sys_mount+0xbf/0xd0 [ 1294.703731][T20647] do_syscall_64+0xf7/0x1c0 [ 1294.708235][T20647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1294.714126][T20647] RIP: 0033:0x45c98a [ 1294.718019][T20647] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1294.744230][T20647] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1294.752742][T20647] RAX: ffffffffffffffda RBX: 00007fe86f27fb40 RCX: 000000000045c98a [ 1294.760710][T20647] RDX: 00007fe86f27fae0 RSI: 0000000020000100 RDI: 00007fe86f27fb00 [ 1294.768676][T20647] RBP: 0000000000000001 R08: 00007fe86f27fb40 R09: 00007fe86f27fae0 [ 1294.776650][T20647] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 02:13:18 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1294.784623][T20647] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1294.818108][T20646] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r3) r5 = dup(r3) ioctl$TIOCGETD(r5, 0x5424, &(0x7f0000000040)) r6 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r7, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r6) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r6, 0x0, 0x80000001, 0x0) 02:13:18 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:18 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:18 executing program 2 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1294.958284][T20767] FAULT_INJECTION: forcing a failure. [ 1294.958284][T20767] name failslab, interval 1, probability 0, space 0, times 0 [ 1294.993803][T20767] CPU: 0 PID: 20767 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1295.001755][T20767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1295.011812][T20767] Call Trace: [ 1295.015106][T20767] dump_stack+0x1d8/0x2f8 [ 1295.019440][T20767] should_fail+0x555/0x770 [ 1295.023901][T20767] __should_failslab+0x11a/0x160 [ 1295.028861][T20767] ? __se_sys_memfd_create+0x10a/0x4b0 [ 1295.034317][T20767] should_failslab+0x9/0x20 [ 1295.038820][T20767] __kmalloc+0x7a/0x340 [ 1295.042985][T20767] __se_sys_memfd_create+0x10a/0x4b0 [ 1295.048266][T20767] ? do_syscall_64+0x1d/0x1c0 [ 1295.052941][T20767] __x64_sys_memfd_create+0x5b/0x70 [ 1295.058135][T20767] do_syscall_64+0xf7/0x1c0 [ 1295.062723][T20767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1295.068607][T20767] RIP: 0033:0x459f39 [ 1295.072499][T20767] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1295.092624][T20767] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1295.101038][T20767] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f39 [ 1295.109005][T20767] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004befd7 [ 1295.116968][T20767] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1295.124935][T20767] R10: 0000000000010000 R11: 0000000000000246 R12: 00007faba37fc6d4 [ 1295.132904][T20767] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1295.157905][T20772] FAULT_INJECTION: forcing a failure. [ 1295.157905][T20772] name failslab, interval 1, probability 0, space 0, times 0 [ 1295.170622][T20772] CPU: 0 PID: 20772 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1295.178511][T20772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1295.188564][T20772] Call Trace: [ 1295.191862][T20772] dump_stack+0x1d8/0x2f8 [ 1295.196198][T20772] should_fail+0x555/0x770 [ 1295.200622][T20772] __should_failslab+0x11a/0x160 [ 1295.205675][T20772] ? __es_insert_extent+0x7ba/0x17c0 [ 1295.210960][T20772] should_failslab+0x9/0x20 [ 1295.215465][T20772] kmem_cache_alloc+0x56/0x2e0 [ 1295.220240][T20772] __es_insert_extent+0x7ba/0x17c0 [ 1295.225373][T20772] ext4_es_insert_extent+0x250/0x2ea0 [ 1295.230761][T20772] ext4_map_blocks+0xe1c/0x1e30 [ 1295.235622][T20772] ? __kasan_check_write+0x14/0x20 [ 1295.240748][T20772] ext4_getblk+0xae/0x460 [ 1295.245092][T20772] ext4_bread+0x4a/0x340 [ 1295.249343][T20772] ext4_append+0x175/0x310 [ 1295.253772][T20772] ext4_mkdir+0x7ad/0x1450 [ 1295.258214][T20772] vfs_mkdir+0x43f/0x610 [ 1295.262477][T20772] do_mkdirat+0x1d7/0x320 [ 1295.266820][T20772] __x64_sys_mkdir+0x60/0x70 [ 1295.271420][T20772] do_syscall_64+0xf7/0x1c0 [ 1295.275931][T20772] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1295.281822][T20772] RIP: 0033:0x459357 [ 1295.285712][T20772] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1295.305316][T20772] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1295.313723][T20772] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1295.321692][T20772] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1295.329662][T20772] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1295.337629][T20772] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1295.345616][T20772] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1295.357994][T20772] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:18 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, 0x0, 0x0, 0x0) 02:13:18 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsslus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:18 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r1) write(r2, &(0x7f0000000240)="720e2dc9d1f4d46f4b63e4a718b067257a6e14bb109c7b4318d4968c5e56ff464ca2b0c6912e2c3ef6440f7a389c395bfca75e4b22661d3d36e181b5c32a5f9c2dfad241ebb519406ec869f122df4f03cb1f6e26239d1946d1de533c3711dc4dcdee51cfecc6ce104c94ca3ac12d574124faa949933bbd349688b1afb17adc038d372b1d59b005da7769198b40a4f8793f01bae48c9e93a266d9e17d63fc47a3115b3df40d0a9c984e9ba57c97f2", 0xae) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r6, 0x0, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r5) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 02:13:18 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:18 executing program 2 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1295.497348][T20780] FAULT_INJECTION: forcing a failure. [ 1295.497348][T20780] name failslab, interval 1, probability 0, space 0, times 0 [ 1295.558239][T20788] FAULT_INJECTION: forcing a failure. [ 1295.558239][T20788] name failslab, interval 1, probability 0, space 0, times 0 [ 1295.565239][T20780] CPU: 1 PID: 20780 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1295.578764][T20780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1295.588825][T20780] Call Trace: [ 1295.592117][T20780] dump_stack+0x1d8/0x2f8 [ 1295.596448][T20780] should_fail+0x555/0x770 [ 1295.600861][T20780] __should_failslab+0x11a/0x160 [ 1295.605789][T20780] ? shmem_alloc_inode+0x1b/0x40 [ 1295.610718][T20780] should_failslab+0x9/0x20 [ 1295.615235][T20780] kmem_cache_alloc+0x56/0x2e0 [ 1295.619995][T20780] ? shmem_match+0x180/0x180 [ 1295.624575][T20780] shmem_alloc_inode+0x1b/0x40 [ 1295.629328][T20780] ? shmem_match+0x180/0x180 [ 1295.633918][T20780] new_inode_pseudo+0x68/0x240 [ 1295.638674][T20780] new_inode+0x28/0x1c0 [ 1295.642915][T20780] ? __kasan_check_read+0x11/0x20 [ 1295.647943][T20780] shmem_get_inode+0x108/0x6e0 [ 1295.652709][T20780] __shmem_file_setup+0x129/0x280 [ 1295.657736][T20780] shmem_file_setup+0x2f/0x40 [ 1295.662407][T20780] __se_sys_memfd_create+0x28e/0x4b0 [ 1295.667685][T20780] ? do_syscall_64+0x1d/0x1c0 [ 1295.672353][T20780] __x64_sys_memfd_create+0x5b/0x70 [ 1295.677641][T20780] do_syscall_64+0xf7/0x1c0 [ 1295.682134][T20780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1295.688016][T20780] RIP: 0033:0x459f39 [ 1295.691898][T20780] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1295.711485][T20780] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1295.719979][T20780] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f39 [ 1295.727936][T20780] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004befd7 [ 1295.735984][T20780] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1295.743941][T20780] R10: 0000000000010000 R11: 0000000000000246 R12: 00007faba37fc6d4 [ 1295.752077][T20780] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1295.760057][T20788] CPU: 0 PID: 20788 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1295.767962][T20788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1295.778021][T20788] Call Trace: [ 1295.781327][T20788] dump_stack+0x1d8/0x2f8 [ 1295.785677][T20788] should_fail+0x555/0x770 [ 1295.790111][T20788] __should_failslab+0x11a/0x160 [ 1295.795058][T20788] ? kzalloc+0x1f/0x40 [ 1295.799133][T20788] should_failslab+0x9/0x20 [ 1295.803636][T20788] __kmalloc+0x7a/0x340 [ 1295.807793][T20788] kzalloc+0x1f/0x40 [ 1295.811677][T20788] smk_parse_smack+0x197/0x230 [ 1295.816447][T20788] smk_import_entry+0x27/0x590 [ 1295.821207][T20788] smack_d_instantiate+0x78f/0xd70 [ 1295.826321][T20788] ? lockdep_init_map+0x2a/0x680 [ 1295.831281][T20788] security_d_instantiate+0xa5/0x100 [ 1295.836571][T20788] d_instantiate_new+0x65/0x120 [ 1295.841438][T20788] ext4_mkdir+0xfa9/0x1450 [ 1295.845882][T20788] vfs_mkdir+0x43f/0x610 [ 1295.850130][T20788] do_mkdirat+0x1d7/0x320 [ 1295.854465][T20788] __x64_sys_mkdir+0x60/0x70 02:13:19 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x80000, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x10e) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:19 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1295.859057][T20788] do_syscall_64+0xf7/0x1c0 [ 1295.863691][T20788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1295.869582][T20788] RIP: 0033:0x459357 [ 1295.873479][T20788] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1295.893080][T20788] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1295.901492][T20788] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 02:13:19 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1295.909461][T20788] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1295.917425][T20788] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1295.925386][T20788] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1295.933370][T20788] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1295.970720][T20788] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:19 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfstlus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1296.013211][T20799] FAULT_INJECTION: forcing a failure. [ 1296.013211][T20799] name failslab, interval 1, probability 0, space 0, times 0 [ 1296.060777][T20799] CPU: 0 PID: 20799 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1296.068821][T20799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1296.078880][T20799] Call Trace: [ 1296.082269][T20799] dump_stack+0x1d8/0x2f8 [ 1296.086715][T20799] should_fail+0x555/0x770 [ 1296.091143][T20799] __should_failslab+0x11a/0x160 [ 1296.096081][T20799] ? security_inode_alloc+0x36/0x1e0 [ 1296.101469][T20799] should_failslab+0x9/0x20 [ 1296.105973][T20799] kmem_cache_alloc+0x56/0x2e0 02:13:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) accept$alg(r7, 0x0, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x38) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = socket$inet6(0xa, 0x2, 0x0) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) write$binfmt_elf64(r12, 0x0, 0xffffffb6) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1296.110771][T20799] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1296.116498][T20799] security_inode_alloc+0x36/0x1e0 [ 1296.121621][T20799] inode_init_always+0x3b5/0x920 [ 1296.126569][T20799] ? shmem_match+0x180/0x180 [ 1296.131172][T20799] new_inode_pseudo+0x7f/0x240 [ 1296.135951][T20799] new_inode+0x28/0x1c0 [ 1296.140109][T20799] ? __kasan_check_read+0x11/0x20 [ 1296.145140][T20799] shmem_get_inode+0x108/0x6e0 [ 1296.149935][T20799] __shmem_file_setup+0x129/0x280 [ 1296.154963][T20799] shmem_file_setup+0x2f/0x40 [ 1296.159636][T20799] __se_sys_memfd_create+0x28e/0x4b0 [ 1296.164921][T20799] ? do_syscall_64+0x1d/0x1c0 [ 1296.169599][T20799] __x64_sys_memfd_create+0x5b/0x70 [ 1296.174792][T20799] do_syscall_64+0xf7/0x1c0 [ 1296.179293][T20799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1296.185177][T20799] RIP: 0033:0x459f39 [ 1296.189067][T20799] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:13:19 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1296.208665][T20799] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1296.217068][T20799] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f39 [ 1296.225034][T20799] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004befd7 [ 1296.233000][T20799] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1296.240968][T20799] R10: 0000000000010000 R11: 0000000000000246 R12: 00007faba37fc6d4 [ 1296.248931][T20799] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:19 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, 0x0, 0x0, 0x0) 02:13:19 executing program 2 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:19 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:19 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x4000, 0x0) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000080)={0x1, 0x0, 0xf9, 0x7, 0x3d}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r5, 0x0, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r4) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 02:13:19 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsulus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1296.652263][T20820] FAULT_INJECTION: forcing a failure. [ 1296.652263][T20820] name failslab, interval 1, probability 0, space 0, times 0 [ 1296.666231][T20819] FAULT_INJECTION: forcing a failure. [ 1296.666231][T20819] name failslab, interval 1, probability 0, space 0, times 0 [ 1296.714945][T20819] CPU: 1 PID: 20819 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1296.722974][T20819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1296.733120][T20819] Call Trace: [ 1296.736410][T20819] dump_stack+0x1d8/0x2f8 [ 1296.740742][T20819] should_fail+0x555/0x770 [ 1296.745158][T20819] __should_failslab+0x11a/0x160 [ 1296.750087][T20819] ? __d_alloc+0x2d/0x6e0 [ 1296.754423][T20819] should_failslab+0x9/0x20 [ 1296.758935][T20819] kmem_cache_alloc+0x56/0x2e0 [ 1296.763701][T20819] __d_alloc+0x2d/0x6e0 [ 1296.767961][T20819] ? lockdep_init_map+0x2a/0x680 [ 1296.772894][T20819] d_alloc_pseudo+0x1d/0x70 [ 1296.777385][T20819] alloc_file_pseudo+0xc3/0x260 [ 1296.782252][T20819] __shmem_file_setup+0x1a2/0x280 [ 1296.787267][T20819] shmem_file_setup+0x2f/0x40 [ 1296.791934][T20819] __se_sys_memfd_create+0x28e/0x4b0 [ 1296.797225][T20819] ? do_syscall_64+0x1d/0x1c0 [ 1296.801894][T20819] __x64_sys_memfd_create+0x5b/0x70 [ 1296.807108][T20819] do_syscall_64+0xf7/0x1c0 [ 1296.811613][T20819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1296.817492][T20819] RIP: 0033:0x459f39 [ 1296.821388][T20819] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1296.840987][T20819] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1296.849408][T20819] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f39 [ 1296.857366][T20819] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004befd7 [ 1296.865324][T20819] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1296.873301][T20819] R10: 0000000000010000 R11: 0000000000000246 R12: 00007faba37fc6d4 [ 1296.881369][T20819] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1296.890321][T20820] CPU: 0 PID: 20820 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1296.898223][T20820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1296.908284][T20820] Call Trace: [ 1296.911578][T20820] dump_stack+0x1d8/0x2f8 [ 1296.915914][T20820] should_fail+0x555/0x770 [ 1296.920332][T20820] __should_failslab+0x11a/0x160 [ 1296.925268][T20820] should_failslab+0x9/0x20 [ 1296.930283][T20820] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1296.935559][T20820] ? smack_d_instantiate+0x962/0xd70 [ 1296.940839][T20820] smack_d_instantiate+0x962/0xd70 [ 1296.946406][T20820] ? lockdep_init_map+0x2a/0x680 [ 1296.951348][T20820] security_d_instantiate+0xa5/0x100 [ 1296.956663][T20820] d_instantiate_new+0x65/0x120 [ 1296.961514][T20820] ext4_mkdir+0xfa9/0x1450 [ 1296.965948][T20820] vfs_mkdir+0x43f/0x610 [ 1296.970191][T20820] do_mkdirat+0x1d7/0x320 [ 1296.974525][T20820] __x64_sys_mkdir+0x60/0x70 [ 1296.979114][T20820] do_syscall_64+0xf7/0x1c0 [ 1296.983613][T20820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1296.989496][T20820] RIP: 0033:0x459357 [ 1296.993392][T20820] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:13:20 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1297.013514][T20820] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1297.021922][T20820] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1297.029883][T20820] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1297.037850][T20820] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1297.045816][T20820] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1297.053869][T20820] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) r5 = socket$netlink(0x10, 0x3, 0x4) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000140)={'team_slave_0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x5c, r10, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r11}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}]}}]}, 0x5c}}, 0x0) r13 = socket$inet6(0xa, 0x2, 0x0) r14 = socket$inet6(0xa, 0x2, 0x0) r15 = fcntl$dupfd(r14, 0x0, r13) setsockopt$IP_VS_SO_SET_ADD(r15, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000380)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) r17 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r17, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r17, &(0x7f0000000040)={0x11, 0x0, r18}, 0x14) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r19, @ANYBLOB="00000000ffffffff000000810800010063627100180402000304060003000000003bae10ffffff9e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) r21 = socket$inet6(0xa, 0x2, 0x0) r22 = socket$inet6(0xa, 0x2, 0x0) r23 = fcntl$dupfd(r22, 0x0, r21) ioctl$PERF_EVENT_IOC_ENABLE(r23, 0x8912, 0x400200) getsockname(r23, &(0x7f0000000640)=@hci={0x1f, 0x0}, &(0x7f00000006c0)=0x80) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000900)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x60818210}, 0xc, &(0x7f00000008c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="8c010000", @ANYRES16=r10, @ANYBLOB="02002abd7000fcdbdf250000000008000100", @ANYRES32=r16, @ANYBLOB="700102003c000100240001006c625f74785f6d6574686f64040000000000000000000000000000000000179647ba0300050000000c00040068617368000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r19, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400020000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r20, @ANYBLOB="080007000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r24, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x18c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r25 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') r26 = socket$inet6(0xa, 0x2, 0x0) r27 = socket$inet6(0xa, 0x2, 0x0) r28 = fcntl$dupfd(r27, 0x0, r26) setsockopt$IP_VS_SO_SET_ADD(r28, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x4e21, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) sendmsg$TIPC_CMD_DISABLE_BEARER(r28, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000500)={0x28, r25, 0x401, 0xfffffffe, 0x0, {{}, 0x0, 0x4102, 0x0, {0xc, 0x13, @udp='udp:syz1\x00'}}}, 0x317}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(r8, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x410002}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x1c, r25, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [""]}, 0x4}, 0x1, 0x0, 0x0, 0x10000000}, 0x401c8c1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:20 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:20 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1297.121533][T20820] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:20 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsxlus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1297.185675][T20838] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1297.224070][T20838] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 1297.241529][T20838] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1297.263183][T20843] FAULT_INJECTION: forcing a failure. [ 1297.263183][T20843] name failslab, interval 1, probability 0, space 0, times 0 02:13:20 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1297.310135][T20838] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1297.357263][T20843] CPU: 0 PID: 20843 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1297.365214][T20843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1297.375271][T20843] Call Trace: [ 1297.378566][T20843] dump_stack+0x1d8/0x2f8 [ 1297.382890][T20843] should_fail+0x555/0x770 [ 1297.387314][T20843] __should_failslab+0x11a/0x160 [ 1297.392244][T20843] ? __alloc_file+0x2c/0x390 [ 1297.396828][T20843] should_failslab+0x9/0x20 [ 1297.401328][T20843] kmem_cache_alloc+0x56/0x2e0 [ 1297.406090][T20843] __alloc_file+0x2c/0x390 [ 1297.410506][T20843] alloc_empty_file+0xac/0x1b0 [ 1297.415283][T20843] alloc_file+0x60/0x4c0 [ 1297.419533][T20843] alloc_file_pseudo+0x1d4/0x260 [ 1297.424483][T20843] __shmem_file_setup+0x1a2/0x280 [ 1297.429515][T20843] shmem_file_setup+0x2f/0x40 [ 1297.434198][T20843] __se_sys_memfd_create+0x28e/0x4b0 [ 1297.439486][T20843] ? do_syscall_64+0x1d/0x1c0 [ 1297.444177][T20843] __x64_sys_memfd_create+0x5b/0x70 [ 1297.449382][T20843] do_syscall_64+0xf7/0x1c0 [ 1297.453892][T20843] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1297.459783][T20843] RIP: 0033:0x459f39 [ 1297.463681][T20843] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1297.483287][T20843] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1297.491698][T20843] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f39 [ 1297.499674][T20843] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004befd7 [ 1297.507643][T20843] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1297.515615][T20843] R10: 0000000000010000 R11: 0000000000000246 R12: 00007faba37fc6d4 [ 1297.523584][T20843] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:20 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:20 executing program 2 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:20 executing program 3 (fault-call:13 fault-nth:0): r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x0) [ 1297.553930][T20848] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:20 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1297.601658][T20952] FAULT_INJECTION: forcing a failure. [ 1297.601658][T20952] name failslab, interval 1, probability 0, space 0, times 0 02:13:20 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1297.668924][T20952] CPU: 1 PID: 20952 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1297.676311][T20961] FAULT_INJECTION: forcing a failure. [ 1297.676311][T20961] name failslab, interval 1, probability 0, space 0, times 0 [ 1297.676862][T20952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1297.700442][T20952] Call Trace: [ 1297.703741][T20952] dump_stack+0x1d8/0x2f8 [ 1297.708081][T20952] should_fail+0x555/0x770 [ 1297.712505][T20952] __should_failslab+0x11a/0x160 [ 1297.717448][T20952] ? tomoyo_encode2+0x273/0x5a0 [ 1297.722303][T20952] should_failslab+0x9/0x20 [ 1297.726811][T20952] __kmalloc+0x7a/0x340 [ 1297.730990][T20952] tomoyo_encode2+0x273/0x5a0 [ 1297.735683][T20952] tomoyo_realpath_from_path+0x769/0x7c0 [ 1297.741324][T20952] tomoyo_mount_permission+0x294/0xa30 [ 1297.746789][T20952] ? filename_lookup+0x4b0/0x690 [ 1297.751753][T20952] ? kmem_cache_free+0xd8/0xf0 [ 1297.756536][T20952] tomoyo_sb_mount+0x35/0x40 [ 1297.761149][T20952] security_sb_mount+0x84/0xe0 [ 1297.765908][T20952] do_mount+0x10a/0x2510 [ 1297.770150][T20952] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1297.775684][T20952] ? copy_mount_options+0x5f/0x3c0 [ 1297.780793][T20952] ? copy_mount_options+0x308/0x3c0 [ 1297.785989][T20952] ksys_mount+0xcc/0x100 [ 1297.790225][T20952] __x64_sys_mount+0xbf/0xd0 [ 1297.794810][T20952] do_syscall_64+0xf7/0x1c0 [ 1297.799317][T20952] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1297.805225][T20952] RIP: 0033:0x45c98a [ 1297.809115][T20952] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1297.828811][T20952] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1297.837227][T20952] RAX: ffffffffffffffda RBX: 00007fe86f27fb40 RCX: 000000000045c98a [ 1297.845203][T20952] RDX: 00007fe86f27fae0 RSI: 0000000020000100 RDI: 00007fe86f27fb00 [ 1297.853175][T20952] RBP: 0000000000000001 R08: 00007fe86f27fb40 R09: 00007fe86f27fae0 [ 1297.861232][T20952] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1297.869197][T20952] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1297.879944][T20961] CPU: 0 PID: 20961 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1297.887858][T20961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1297.897909][T20961] Call Trace: [ 1297.901200][T20961] dump_stack+0x1d8/0x2f8 [ 1297.905534][T20961] should_fail+0x555/0x770 [ 1297.909963][T20961] __should_failslab+0x11a/0x160 [ 1297.914373][T20952] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1297.914900][T20961] ? security_file_alloc+0x36/0x200 [ 1297.914914][T20961] should_failslab+0x9/0x20 [ 1297.914929][T20961] kmem_cache_alloc+0x56/0x2e0 [ 1297.936043][T20961] security_file_alloc+0x36/0x200 [ 1297.941066][T20961] __alloc_file+0xde/0x390 [ 1297.945480][T20961] alloc_empty_file+0xac/0x1b0 [ 1297.950246][T20961] alloc_file+0x60/0x4c0 [ 1297.954492][T20961] alloc_file_pseudo+0x1d4/0x260 [ 1297.959456][T20961] __shmem_file_setup+0x1a2/0x280 [ 1297.964485][T20961] shmem_file_setup+0x2f/0x40 [ 1297.969159][T20961] __se_sys_memfd_create+0x28e/0x4b0 [ 1297.974436][T20961] ? do_syscall_64+0x1d/0x1c0 [ 1297.979111][T20961] __x64_sys_memfd_create+0x5b/0x70 [ 1297.984302][T20961] do_syscall_64+0xf7/0x1c0 [ 1297.988806][T20961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1297.994708][T20961] RIP: 0033:0x459f39 [ 1297.998610][T20961] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:13:21 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x0) 02:13:21 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfszlus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:21 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1298.018214][T20961] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1298.026627][T20961] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f39 [ 1298.034608][T20961] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004befd7 [ 1298.042756][T20961] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1298.050731][T20961] R10: 0000000000010000 R11: 0000000000000246 R12: 00007faba37fc6d4 [ 1298.058702][T20961] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:21 executing program 0 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:21 executing program 2 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1298.221692][T21078] FAULT_INJECTION: forcing a failure. [ 1298.221692][T21078] name failslab, interval 1, probability 0, space 0, times 0 [ 1298.267426][T21078] CPU: 1 PID: 21078 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1298.275368][T21078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1298.285423][T21078] Call Trace: [ 1298.288722][T21078] dump_stack+0x1d8/0x2f8 [ 1298.293056][T21078] should_fail+0x555/0x770 [ 1298.297478][T21078] __should_failslab+0x11a/0x160 [ 1298.302415][T21078] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1298.308140][T21078] should_failslab+0x9/0x20 [ 1298.312640][T21078] __kmalloc+0x7a/0x340 [ 1298.316794][T21078] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1298.322538][T21078] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1298.328090][T21078] tomoyo_path_perm+0x192/0x850 [ 1298.332990][T21078] tomoyo_path_truncate+0x1c/0x20 [ 1298.338012][T21078] security_path_truncate+0xd5/0x150 [ 1298.343292][T21078] do_sys_ftruncate+0x493/0x710 [ 1298.348151][T21078] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1298.353867][T21078] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1298.359345][T21078] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1298.365058][T21078] ? do_syscall_64+0x1d/0x1c0 [ 1298.369732][T21078] __x64_sys_ftruncate+0x60/0x70 [ 1298.374686][T21078] do_syscall_64+0xf7/0x1c0 [ 1298.379191][T21078] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1298.385075][T21078] RIP: 0033:0x459f07 [ 1298.388960][T21078] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1298.408556][T21078] RSP: 002b:00007faba37fba88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d 02:13:21 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1298.416960][T21078] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f07 [ 1298.424925][T21078] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000004 [ 1298.432892][T21078] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1298.440858][T21078] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 1298.448819][T21078] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1298.486899][T21081] FAULT_INJECTION: forcing a failure. [ 1298.486899][T21081] name failslab, interval 1, probability 0, space 0, times 0 [ 1298.490382][T21078] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1298.511947][T21081] CPU: 1 PID: 21081 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1298.519907][T21081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1298.529969][T21081] Call Trace: [ 1298.533267][T21081] dump_stack+0x1d8/0x2f8 [ 1298.537609][T21081] should_fail+0x555/0x770 [ 1298.542040][T21081] __should_failslab+0x11a/0x160 [ 1298.546979][T21081] ? ksys_mount+0x6a/0x100 [ 1298.551391][T21081] should_failslab+0x9/0x20 [ 1298.555898][T21081] __kmalloc_track_caller+0x79/0x340 [ 1298.561204][T21081] strndup_user+0x76/0x130 [ 1298.565631][T21081] ksys_mount+0x6a/0x100 [ 1298.569875][T21081] __x64_sys_mount+0xbf/0xd0 [ 1298.574468][T21081] do_syscall_64+0xf7/0x1c0 [ 1298.578969][T21081] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1298.584856][T21081] RIP: 0033:0x45c98a [ 1298.588744][T21081] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1298.608948][T21081] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1298.617437][T21081] RAX: ffffffffffffffda RBX: 00007fe86f27fb40 RCX: 000000000045c98a [ 1298.625400][T21081] RDX: 00007fe86f27fae0 RSI: 0000000020000100 RDI: 00007fe86f27fb00 02:13:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000003400)=ANY=[@ANYBLOB="7f511f00000005dc45d8f120bf09000001"], 0xe) close(r3) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r10, 0x0, r9) r11 = openat$vimc2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video2\x00', 0x2, 0x0) r12 = socket$inet6(0xa, 0x2, 0x0) r13 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r13, 0x0, r12) r14 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video2\x00', 0x2, 0x0) r15 = socket$inet6(0xa, 0x2, 0x0) r16 = socket$inet6(0xa, 0x2, 0x0) r17 = fcntl$dupfd(r16, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) r18 = accept$ax25(r17, &(0x7f0000000380)={{0x3, @bcast}, [@default, @bcast, @null, @netrom, @remote, @netrom, @netrom, @netrom]}, &(0x7f0000000400)=0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x1d, &(0x7f0000000440)='lovboxnet1\'[&*){--procvmnet1\x00'}, 0x30) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) r21 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r21, &(0x7f0000001280), r22, 0x0, 0x800000a, 0x0) r23 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) splice(r23, &(0x7f0000001280)=0x2, 0xffffffffffffffff, 0x0, 0x800000a, 0x0) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) fsetxattr$system_posix_acl(r21, &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="020000000100eb000000000002000100", @ANYRES32=0x0, @ANYBLOB="040002000000000008000400", @ANYRES32=r24, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32=0x0, @ANYBLOB="1000000000000000200000000000"], 0xb, 0x1) r25 = socket$inet6(0xa, 0x2, 0x0) r26 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r26, 0x0, r25) r27 = socket$inet6(0xa, 0x2, 0x0) r28 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r28, 0x0, r27) r29 = socket$inet6(0xa, 0x2, 0x0) r30 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r30, 0x0, r29) r31 = syz_open_dev$radio(&(0x7f00000005c0)='/dev/radio#\x00', 0x0, 0x2) r32 = socket$inet6(0xa, 0x2, 0x0) r33 = socket$inet6(0xa, 0x2, 0x0) r34 = fcntl$dupfd(r33, 0x0, r32) ioctl$PERF_EVENT_IOC_ENABLE(r34, 0x8912, 0x400200) r35 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x221000) r36 = socket$inet6(0xa, 0x2, 0x0) r37 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r37, 0x0, r36) r38 = socket$inet6(0xa, 0x2, 0x0) r39 = socket$inet6(0xa, 0x2, 0x0) r40 = fcntl$dupfd(r39, 0x0, r38) ioctl$PERF_EVENT_IOC_ENABLE(r40, 0x8912, 0x400200) r41 = accept4$unix(r40, &(0x7f0000000640), &(0x7f00000006c0)=0x6e, 0x100000) r42 = socket$rds(0x15, 0x5, 0x0) r43 = socket$inet6(0xa, 0x2, 0x0) r44 = socket$inet6(0xa, 0x2, 0x0) r45 = fcntl$dupfd(r44, 0x0, r43) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) ioctl$TIOCGPGRP(r45, 0x540f, &(0x7f0000002d80)=0x0) r47 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r47, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r49 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r49, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r50) setresuid(0x0, r50, r48) r51 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r51, &(0x7f0000001280), r52, 0x0, 0x800000a, 0x0) r53 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) splice(r53, &(0x7f0000001280)=0x2, 0xffffffffffffffff, 0x0, 0x800000a, 0x0) getsockopt$sock_cred(r53, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) fsetxattr$system_posix_acl(r51, &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="020000000100eb000000000002000100", @ANYRES32=0x0, @ANYBLOB="040002000000000008000400", @ANYRES32=r54, @ANYBLOB="08100000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32=0x0, @ANYBLOB="1000000000000000200000000000"], 0xb, 0x1) r55 = socket$inet6(0xa, 0x2, 0x0) r56 = socket$inet6(0xa, 0x2, 0x0) r57 = fcntl$dupfd(r56, 0x0, r55) ioctl$PERF_EVENT_IOC_ENABLE(r57, 0x8912, 0x400200) ioctl$NS_GET_OWNER_UID(r57, 0xb704, &(0x7f0000002dc0)=0x0) getresgid(&(0x7f0000002e00)=0x0, &(0x7f0000002e40), &(0x7f0000002e80)) r60 = syz_open_dev$vivid(&(0x7f0000003180)='/dev/video#\x00', 0x2, 0x2) r61 = socket$inet6(0xa, 0x2, 0x0) r62 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r62, 0x0, r61) r63 = socket$inet6(0xa, 0x2, 0x0) r64 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r64, 0x0, r63) r65 = socket$inet6(0xa, 0x2, 0x0) r66 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r66, 0x0, r65) r67 = socket$inet6(0xa, 0x2, 0x0) r68 = socket$inet6(0xa, 0x2, 0x0) r69 = fcntl$dupfd(r68, 0x0, r67) ioctl$PERF_EVENT_IOC_ENABLE(r69, 0x8912, 0x400200) r70 = getpid() getpgrp(r70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6c, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r70, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000100)='proc&}nodevnodevlowlan0\x00', r71}, 0x30) r72 = syz_open_procfs(r70, &(0x7f00000031c0)='net/llc\x00') sendmmsg$unix(r8, &(0x7f0000003280)=[{&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000240)="622f60b2eb23a50570e6b700747ab3a1ea0aa477aea2805adbde4d5dc091bea330d32eda420ca5cc7007cbacf6f877c0d8137ec4c9144944be2267001158a0adb519433aaa3b278c86d5db8e19de2db0d0dd464ccdaf116a94bf20ddb2a17cee82e05c1a19d3794d82454111d8e72e599c887cd884396a1edae812a1d1580599ad94313c51bfb6e4ae30b9841989e0078917c7173262f9c189c3b10be3ebdd27b1ad7a71a664a8b41d1432c5cd96f2d2b20c720135005e35e6db36db1f4ede01482f924059e94c6603cf417358b4d2ef18c36e74ddc4fc486c39594d0e60776a82cfd080d44c26ca0a19d9f077c84048a2b65123b038", 0xf6}], 0x1, &(0x7f0000000700)=[@rights={{0x14, 0x1, 0x1, [r9]}}, @rights={{0x2c, 0x1, 0x1, [r5, r11, r12, 0xffffffffffffffff, r14, r18, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r19, r20, r24}}}, @rights={{0x34, 0x1, 0x1, [r25, r28, r29, r31, r34, r35, r37, r41, r42]}}], 0xa0, 0x8000}, {&(0x7f00000007c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000840)="7d6cf6fe18cb44ae80508be17088b163f75b1b3f21a9d1317edb025741b481bb784dd1afda481e1fb4c0540c654b2bb4e8929b3be1942949dccbe64158af577a9155fc4d66793513aa46298a0b624511c7677b70ab7b2fcbb4adf50090217a4029ca30307bb6ce6eaa96", 0x6a}, {&(0x7f00000008c0)="490ce4d7b8b23a28ea279816a26337e1af", 0x11}], 0x2, 0x0, 0x0, 0x4}, {&(0x7f0000000940)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000019c0)=[{&(0x7f00000009c0)="2ef0c6d615a6d1681b892f4967531de304689f11b3e80c9b771ceb4e9d15bfae36627df42515ce130b79358b6d48a7a6a0fe9ba2957d7a4a99932b4b4ca6317da4d05fb8843ca13a73b6ef5646fc274b7aeed02769623d48f0ef0fce19fdb19c46229e9dda090201139e3dbbf847f7874658644d29299a3d4bfb602d7d0ef326eec18f52430afbaf828997d6ff569563e4f5ac17375a01ecea6be913faa199e8725fd843ea947ec747c2ac6d9f82b6bc6c3ac0c22e3f965a77f0520fef839eb0f3845344a39c8311e3e834d99385d58d71af61ec8772d0700becb8ac3882aedfacacffa637a56170cefc4009cf55f5d11116adc24a2fdc2f0a4be0745a0b5451cafc5a33a8405464df50afb29f23cc88a9db5d92b62a76409695f88b41044104dcd34e10c6c4b3d79e5da2184f92eac254ab025fcc527a519b8ea96bd4be7578aa9a5cbaf09a22a0b33e9705e0c08369a836c96254df4ca44919cd763609d02b24a8000e60f0a1c3f9a3247f3b0cc2cbcefec3716ad5ee463fa79bf0ed8421bc764d1b1dee1e584a696e760aa2ae6484daf41543aca2ec4c56fc08bd85eae1a81364f3009b51777b19395e8f816cdb2533754a162977c4b50e8290a11850d86a4177eadbc2b7e19bd80acdc00191ed1b1ce9836c0fe74a03616ec9a56145e9cce98cee839659a44e4b0e43fa60ba3d262d7e5cdaee56c516302208a554fb09de63ad528f567379b9faf08c3823b285e5a7c64ac0acde54feaa09dbba14e53593ef254c090ee6f62aee8c9588adbb446acf0c03c9c695325e6e877eb4615c76c17b07e62b49f4ea91f4ffc58b1bc3f7470c723480b7dd46404aba27b99b65f9b25a6e0cdf092648672e786235c953ecd593c3b9b4f66c8b18dfe4f2c295fbbbf92d4cf3e98738e8f9c074330838952bc2ba12efb09b6868f2dd95b9c2b1d32c085539ac99804edc5f0346534ebaad355c96e48c5d63d999686b2908788c32082147d21224202b79d8544b3e89e810d71ec2a5c513045cf52d9639384acef4b8dcddab3cc6770b96cc8cf945c9fbf7a8cec195a426de97458eb935213e9cf9a2b08605c2466e6d1d0cd9dc8fa8280bb87618247080ceeccef1a94d007cbcc162786afb0bed5c30ef37e6dfe26f40e973a6425011d37bde560117a738cd0b5c9bf117ceb23b6f2805015bae904e09562d88d829c9305b2623f5dcd47320966f14c24367a6dcc00b412691fa6cc7dc67eda28eb701c2097f66defd2704a33a0a58c8a9e1d38078aa43297682fc425480bd0fa42fabbf3b018a84886adf08c7ad0ed55d16cce04bbd081b30759a9a82353dd43f1e9c0178ccf32678d1bc89588ad8590497f2ec4d049c920c8fa843844ffdd6200b437cf90e72b880ef3b2c0d09cc4e6cddc3b3325da65f9b0c44daf9337992d0f2eee9696358edc995b6cab3dd9fbb33b596407756125ec718c4a2aa771ed525d01cebbe33222c8f697ea8f80075f9ed02ff3238b088a6fc760d010eaadd7e61ed671ad4a73450a6b08444b42ab65c3331d4a82d1f2da2105aa198884883c86f73a9a092343e36246354e44a133591362ab81fa3d4df1de6690d96d21c55bb898d2752ba150aec306cb581ac12faddc7dac10fa8ffaa546a92b0b15f7e7527d5acab9a15ab09b1b1f4375d9eca4139178a5bf4b426927e834ef5facbbef51b48919684be92fe53d5582e36ff7be897434bfda627c134229edb0785dd45606b1dbe4ce958d81d7b77ff513e3f40482a2214f4cab5e108332db3f873c138cc86605c8e5f1c9a4f84f455cff5ae253ccfcc7d8c6f3746c35b341de37077e93936a0bf12f91911be7e87d09051d5b39966a837f53c17370b7678cdf366b8d01f379eb216038e2dde1edf34c1dbf5c686ba2a9db4df256b73c049eb79803b5cf877f2d757b23f72ade7d731993d912af809ce31b9170eb0401712b30b7cef028a4eb5a6ab870c71c6896ae6e5c9573594c0b6947b8383aa4df1cb13dcf66a1fb93d2ed9ae3ceeff01c1fba260bb0efa6f8df687e81ac21bac6460414341b4cc531a62e0bab61bd71b6f53f66e8c6ae0813982ee6d5790ffb98f4e421f0b9ded1e764f440d07258d9f3149a27f4190350e094cf13ec4949c0293fe7341a6befc50ec5acdd430cc4066909d0dbcbf21d00e299d2d3cda1c25b67ffa8fef522becf97bed687e053b2b6c3b2cf0a63cfb4f433dce92ac5ffeb5a4cb0d301415a0d389ba72ebb4ee4b89f08b66b4fa0070851f8b1462664860358c792b240fbb0f6f5956ad19861e427e593d5500b62d5ddb182c2d8817cf0852d175ff9cd444b5b0001ddaea1c774a30dcd081905c047c64fb7751b4d8e3389418c20078e7f47334b4f5ad1eaf502ab7fbf3a150579020207bec6f0281db5c1ba1111c9d3be80391c3df009f287a4e0151d0c8b4268d55ea5e89451a005e8bfbf501d8608c41a8c09c0ac6a941286c9beceafc03c3cb1d98cae6511053b607d0e10ac4f954dec0065ce3b6f78b54709d4eb38835d1df7100356777b6c288565fbee9de9308887e17eb56ba33b1fb6c1a798cd728c6efce13843dc6eb0ea5c6704d0b17337683815bbb60fb1a7c04381b311bca5f6e5355e9feabce66b66ad053bd1e3f5e28bb393c0b7fe7a3c182e2afba81cffb1abee04b3e25d43988be6505d98e5a39702e169712b9eb3f8131e1c7d0594590edaaf74e17a855cf2733af55a7549e74f715d59c9b9a2a67b7671016b3f8f7c254ddbafaefde9362fdd5bb9e7844df1ad193ed19986ec4c7b4c14d0a027943b5dacc13fc9b9110bab6362a8f186484d330168fdf381330f0a20cd0518460e8be2ae4763d80539f422dc4d3b98cb8fdd8fa2eebd6d5f8bfff4d42b60891ddad25b463d93093526b9e124e6f1c02aef5cc7786acc41a9848326cde5f72ce12df4d207369ff506d45278b42fb26aac7cef73363dcec8ad381d4f3343366a296ae967507b98f6507523ade10a13baf308f0b052c50a6d55979a29783aa36e45a2bfc1d498c4865a9ac247ddea8992eb411bf4d45aadac72c8e523ec4e9d241067e01756c7e59d5e04b979f80e68592de8959a68e7d800889940abe72bda0e10d089875689af427b0fc90af189d9d90de1c077d634d13509cf71981405315dcce4595482f6f0645c6f6db97bd141f80021517fa907d1319757b2c32016707609af5e0d8ad7b8b5689c808d3daa1e81485d8d0b29e192b322e724f92587ccead2e0855681a4e67c345fb41daa95d571aae7ae80eb8f49c0f94f29319614fc1edca631c59cc700a4e5fb24890f8d95574a6726c8fc833050a17178650f7dde710a6cb92c251fca6d2dbe4d58bfa04147066900375350d15731bffde8e4eadefef376660eb772c860d4d0f3c2bede2691fc3ee34849b61779e1fdc5e1fe9f8212506ddd7ae1b592e178e189cf8043437dd593af585f7c839bad1fac89cd79c18a15c3ef8adfc777c2cd7f04b748ec67abe206c3054afa4a6730e53bd1392c7571f5fda36c65eaf8b3925d57fd8e6462da33608b6c35ec682bf3105780c7884e578c69303c2f1de94bc6f45a360e1570f5cfe0eedf6ad49172581f08070e4f054e10c472cae6c980809c6906f244ef7f4138c49d9e95633e7d5870cb00328b360d15e6354b522b48f2d1f4fa9ca44f16825719e9332e9aba81e7e50555560495db55c649c500605b359aa59444b23b1699f0e7ec6c0ae28d19f92da3117410396f11e8c44664e65a168deba122cfd6baf9ee403dde6983b471e557f7c1a8b60b07bff100ea7ed9bb1e4e44767a01a0fa2e9f4fd103b8a08e30299620bd12b6bd6cd8befaffc3e872d410d0bd9d83d134b4831684424fda24dd5a67a87ce1fc5aad5ea1c897ae0f70a4f2033d09cbb2bf60c311f277c713876b7c7781444c2b8883322377d2241b89b620bc9a5f8f3fe16c4012039913f72e71d507903151e82381d6596845590a170c72212a0980d828033fd14c490fb80e9a401e012b07863d3c358219109585c79adcb63a36d18473363e7765ee53235ce05a94c81aa324b51021b527640ad750232e687232ff6495ee38d2c163b6a3138e1cbf9eb9cc7f25e97a863e7e00f15eb179ad4b5da75991e446c069afd5beb74365a72d4737cbf587a01005da957a289a7d19e1074f4e0d457ee6ba0d6daf3a5c8fc6a985f7d022049b586c0623731dbbee66eee05d640dc3d5e8f65e40a53fa4941eb9928852d0283ae9254bb5183b09ae5e3a575b189e46dc31ea125db57962a2c7f53ba94dd51fce908cd43d59f5004cf64701978f995e16d18bc75eb7a736d5dd3657d940ba07303f9cd3509bb9fbf0d9bee92db9840598996eb34fa37157f1be026325f65a2e00d34da223f86b90e7a81b8f8f7a50709cb0ee5efcfdb1baab3446f1bf1febffaf6eb384fc4c6f23e4a4cac630142a84f110848238ac49a842266f7081f4a2b6b2abadb83d3733afe723b1d3993bc05ebe0824d3d14f7ea72234ad8de8ed56a7ca8c1bbbcb2ea199385033c1864e5e4ca1895334755ffc008f726f371be519530bb8bbca6dc8e4c4f2140b6bc10e7a12ec77b476e8b09d06d9918852f096c32facaa2f5b44aacbcd9035318979335cbe6878c79ecf799a1051a61fd30d56205e47ed1c58fc08d3c7a71931f6dca37c646fafa43584cb9a2e967db359c844fc621d11d15fbfc18bc807836aba390e054d1dc481ecad756914539956a0e57866d2b761310cb2b048636b2ec7ce15e5571d3ff35b14b5bb53e80868ec57ab07fd82941493027a86b3d2673593c631a08c2c11a2f7d78c1ace442b74e62cae53a5f0de6965dd9c5fa8cbc96c3ff058aa07e287fef4ad603bc183bde84eb959d677f5d0d718ba6998ea5b5d5c7b8f026c23952f206a6eef280efc2df07ae6f64b5e8001c8ed6e1bc5732a78f1b55e9ba1d35235dd2c627d7156f18480ddd7eae6f7e4992af5c568376206b424ef3fac827b19e0165a0509fbee2174bd7c69456ecafcde7e536d08e814072a32ad5f110a9b9f34f1fa8a082665538e50af39d70ea807bcdbb5c7a892777895755e00cdd608d24b136021f4ef761fd6c125f31d1926303633004704e87f17628df0a1c983cf431491738ec23c22eb2b505a611bfaf525adbcc7986ebacba0ee4f7a73e7346604642febe1ba21cd89bf9d9d6d16fba7cc6bbe7658634606bf2dea6e03e632694e8a3d1ca5810db7aa89cbcf55e6a2c818b5d5911895dbdca92bc977de23aa5704a6bf2615a81b53858fa45e3aaeee6bc2f3d2a556ab5e5be3a0f8c6ab0b10c05fa0865b260a657dc550e87237534e5885fdd3855999a1214e2536647713bb35a5fccdfec704d6ee944b61a2d82d033a3595fbc22523bb852671a88f02a7a3bb6c8621b2c8bd04f893798979b9343a6da747f0cc5852ecfb677799cc60484111948f71429e7845a9511a1dd84ea78105b57c7a6ea4ccb0bd0655084a9f3669c79ea8fdc1cfb09ef8d0bd72610df7e9d2073030fa6f979603da046d573714885f64d551f25c53f8d9521e91a932b8d3a68316357f9bb345e9c51d2a47c66b1c48b590edab13cdcc5a6a58749b538c4d1520afbb49df65c97112d94199e53b4dbff80c10ea46d3f9b3e502182122e6113cfb2939c190ac6bedbacb236a9fdb2b1a7d65fbaa3171699287689725650ea101aec90663e785b331372180d8cad16b20e084e270e5956b24ef3673efce5d8ba1167d1578586fef223bf0b6e0b53440985965f06ab14d32b7b326ec9f755e0623bd25639fce9e302f61952", 0x1000}], 0x1, 0x0, 0x0, 0x4004}, {&(0x7f0000001a00)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000002c00)=[{&(0x7f0000001a80)="5ea4c5d76094d74d1129af5cbc68f78a0bad221b3d161900df166a61d0c5acab7c4a623135ad18218937916f92abaf2960cf9923ab3972e35cc901c308b29aaeecb717ed77ca26718c1b5f1967657648b2965b086331d54df914c7ef89124affc4cd3ccf8591654d74b9029b2134a1c0b88b4ac7333b2a5e030736db4d3a959019f9a92247c8c08575c25911b052b8bc269e5ad585880718b82f7863bec440d778818c061d69b0ba777ef9bebd", 0xad}, {&(0x7f0000001b40)="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", 0x1000}, {&(0x7f0000002b40)="5ba45e984af8569954b7bbff3b2855209fca96c76dae6e0b48d5b9830688a214f2591080422f769cda9983607405de95d785461ee7b89540ed80a2888aea846dc29e45e4d27f6bf921b5a6d5abd9f0119f0fe94bb012d037191a1024146dbbc4f623eb4d95b79383477fd0d58c14a0251ef56d02b8cef2c137ec1de5042dfe036b07001daf07", 0x86}], 0x3, 0x0, 0x0, 0x4000}, {&(0x7f0000002c40)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000002d40)=[{&(0x7f0000002cc0)="d3c43ff573b831bcf9e6d607c5cf550071a11c87b5a2b14f196fa9de2497957963fb57950805066000dcb122826572c69eeabeb0bce20ef3bb6979e43bc2a13d3b150082", 0x44}], 0x1, &(0x7f0000002ec0)=[@cred={{0x1c, 0x1, 0x2, {r46, r50, r54}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r58, r59}}}], 0x40, 0x4}, {&(0x7f0000002f00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003140)=[{&(0x7f0000002f80)="0c1b22f85637fc624d7f300c1f3d88985b00ab4a56d966e0a33e835c1107692614873ab7dbab509f34220c7ba5ad7118cd675764befb61fd1dd2a8dacab4c41557", 0x41}, {&(0x7f0000003000)="57f9b8a44fff9bdca2cb86366a61b5f441a189b1a7d43be38169eac04b0b6ce343f1f276771717d2766e40b6e7f6ec3f652a0830e63fe2b6843a58a6f973bb23a77074f89bd4a9fafaec9e25223054da94989a421f229c36fec06b2a911aee989dac5687bcf21888ce7c7342f21f3b9cae2e33631d29efad11226a02ca77b55fead2b59747348f4ed776129b0a549cbadb3b21063b35afa3ddfb336907897c4784142919b4c4741dbad43c23c8869f0b55b1eb2fdd3997cf9a2ef2361fded20179da29a9dc5e6e2f95d4e275dc3a26a7683a847671b4713343b0fe476c7541", 0xdf}, {&(0x7f0000003100)="2b5090debc9d1ac353e4d2beb0c3622762bdd71e54f73d1ffb9926178b9777753e916f00e9d1985f8cda806439942227539f5de98b", 0x35}], 0x3, &(0x7f0000003200)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r60, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r62, @ANYRES32=r0, @ANYBLOB="1c000800000000000100000001000000", @ANYRES32=r64, @ANYRES32=r66, @ANYRES32=r69, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r72, @ANYBLOB='\x00\x00\x00\x00'], 0x68, 0x800}], 0x6, 0x20000000) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1298.633384][T21081] RBP: 0000000000000001 R08: 00007fe86f27fb40 R09: 00007fe86f27fae0 [ 1298.641343][T21081] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1298.649306][T21081] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:21 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp\nus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:22 executing program 0 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1298.699835][T21087] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:22 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c41ff03000000000000d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:22 executing program 2 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1298.808859][T21095] FAULT_INJECTION: forcing a failure. [ 1298.808859][T21095] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1298.822140][T21095] CPU: 0 PID: 21095 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1298.830127][T21095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1298.840182][T21095] Call Trace: [ 1298.843477][T21095] dump_stack+0x1d8/0x2f8 [ 1298.847820][T21095] should_fail+0x555/0x770 [ 1298.852243][T21095] should_fail_alloc_page+0x55/0x60 [ 1298.857537][T21095] prepare_alloc_pages+0x283/0x460 [ 1298.862657][T21095] __alloc_pages_nodemask+0xb2/0x5d0 [ 1298.867953][T21095] kmem_getpages+0x4d/0xa00 [ 1298.872458][T21095] cache_grow_begin+0x7e/0x2c0 [ 1298.877329][T21095] cache_alloc_refill+0x311/0x3f0 [ 1298.882353][T21095] ? check_preemption_disabled+0xb7/0x2a0 [ 1298.888184][T21095] __kmalloc+0x318/0x340 [ 1298.892420][T21095] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1298.898135][T21095] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1298.903681][T21095] tomoyo_path_perm+0x192/0x850 02:13:22 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x2) 02:13:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1, 0x0) ioctl$VIDIOC_G_FREQUENCY(r3, 0xc02c5638, &(0x7f0000000080)={0x9, 0x1, 0x1ca}) r4 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r5, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) close(r4) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r4, 0x0, 0x80000001, 0x0) [ 1298.908556][T21095] tomoyo_path_truncate+0x1c/0x20 [ 1298.913575][T21095] security_path_truncate+0xd5/0x150 [ 1298.918856][T21095] do_sys_ftruncate+0x493/0x710 [ 1298.923711][T21095] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1298.929430][T21095] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1298.934921][T21095] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1298.940644][T21095] ? do_syscall_64+0x1d/0x1c0 [ 1298.945321][T21095] __x64_sys_ftruncate+0x60/0x70 [ 1298.950257][T21095] do_syscall_64+0xf7/0x1c0 [ 1298.954763][T21095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1298.960648][T21095] RIP: 0033:0x459f07 [ 1298.960658][T21095] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1298.960664][T21095] RSP: 002b:00007faba37fba88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1298.960673][T21095] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f07 [ 1298.960679][T21095] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000004 02:13:22 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1298.960684][T21095] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1298.960689][T21095] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 1298.960694][T21095] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1299.051743][T21137] FAULT_INJECTION: forcing a failure. [ 1299.051743][T21137] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.105175][T21137] CPU: 1 PID: 21137 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1299.113108][T21137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1299.123299][T21137] Call Trace: [ 1299.126600][T21137] dump_stack+0x1d8/0x2f8 [ 1299.130958][T21137] should_fail+0x555/0x770 [ 1299.135382][T21137] __should_failslab+0x11a/0x160 [ 1299.135398][T21137] should_failslab+0x9/0x20 [ 1299.135410][T21137] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1299.135419][T21137] ? copy_mount_options+0x5f/0x3c0 [ 1299.135430][T21137] copy_mount_options+0x5f/0x3c0 [ 1299.144848][T21137] ksys_mount+0xa0/0x100 [ 1299.144862][T21137] __x64_sys_mount+0xbf/0xd0 [ 1299.144879][T21137] do_syscall_64+0xf7/0x1c0 [ 1299.144892][T21137] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1299.144903][T21137] RIP: 0033:0x45c98a [ 1299.183373][T21137] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 02:13:22 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1299.202981][T21137] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1299.211394][T21137] RAX: ffffffffffffffda RBX: 00007fe86f27fb40 RCX: 000000000045c98a [ 1299.219369][T21137] RDX: 00007fe86f27fae0 RSI: 0000000020000100 RDI: 00007fe86f27fb00 [ 1299.227342][T21137] RBP: 0000000000000001 R08: 00007fe86f27fb40 R09: 00007fe86f27fae0 [ 1299.235395][T21137] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1299.243361][T21137] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:22 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp#us\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:22 executing program 0 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:22 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:22 executing program 2 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1299.466484][T21327] FAULT_INJECTION: forcing a failure. [ 1299.466484][T21327] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.515758][T21327] CPU: 1 PID: 21327 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1299.523715][T21327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1299.533769][T21327] Call Trace: [ 1299.537073][T21327] dump_stack+0x1d8/0x2f8 [ 1299.541401][T21327] should_fail+0x555/0x770 [ 1299.545819][T21327] __should_failslab+0x11a/0x160 [ 1299.550751][T21327] ? tomoyo_encode2+0x273/0x5a0 [ 1299.555594][T21327] should_failslab+0x9/0x20 [ 1299.560091][T21327] __kmalloc+0x7a/0x340 [ 1299.564327][T21327] tomoyo_encode2+0x273/0x5a0 [ 1299.569004][T21327] ? dynamic_dname+0xf0/0xf0 [ 1299.573593][T21327] tomoyo_realpath_from_path+0x769/0x7c0 [ 1299.579229][T21327] tomoyo_path_perm+0x192/0x850 [ 1299.584119][T21327] tomoyo_path_truncate+0x1c/0x20 [ 1299.589228][T21327] security_path_truncate+0xd5/0x150 [ 1299.594510][T21327] do_sys_ftruncate+0x493/0x710 [ 1299.599361][T21327] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1299.605089][T21327] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1299.610544][T21327] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1299.616254][T21327] ? do_syscall_64+0x1d/0x1c0 [ 1299.620925][T21327] __x64_sys_ftruncate+0x60/0x70 [ 1299.625854][T21327] do_syscall_64+0xf7/0x1c0 [ 1299.630349][T21327] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1299.636227][T21327] RIP: 0033:0x459f07 [ 1299.640111][T21327] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1299.659719][T21327] RSP: 002b:00007faba37fba88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1299.668130][T21327] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f07 [ 1299.676091][T21327] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000004 [ 1299.684057][T21327] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1299.692017][T21327] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 1299.699977][T21327] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:23 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1299.719063][T21327] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1299.751383][T21332] FAULT_INJECTION: forcing a failure. [ 1299.751383][T21332] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.764305][T21332] CPU: 1 PID: 21332 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1299.772189][T21332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1299.782227][T21332] Call Trace: [ 1299.785509][T21332] dump_stack+0x1d8/0x2f8 [ 1299.789830][T21332] should_fail+0x555/0x770 [ 1299.794414][T21332] __should_failslab+0x11a/0x160 [ 1299.799355][T21332] ? __sigqueue_alloc+0x2ce/0x440 [ 1299.804371][T21332] should_failslab+0x9/0x20 [ 1299.804385][T21332] kmem_cache_alloc+0x56/0x2e0 [ 1299.804400][T21332] __sigqueue_alloc+0x2ce/0x440 [ 1299.804413][T21332] __send_signal+0x508/0xcd0 [ 1299.804431][T21332] send_signal+0x6e0/0x830 [ 1299.804446][T21332] force_sig_info_to_task+0x247/0x2e0 [ 1299.804461][T21332] force_sig_fault+0xbf/0x130 [ 1299.837805][T21332] __bad_area_nosemaphore+0x307/0x470 [ 1299.843194][T21332] bad_area+0x6b/0x80 [ 1299.847176][T21332] do_user_addr_fault+0xacc/0xaf0 [ 1299.852300][T21332] __do_page_fault+0xd3/0x1f0 [ 1299.857059][T21332] do_page_fault+0x99/0xb0 [ 1299.861469][T21332] page_fault+0x39/0x40 [ 1299.865620][T21332] RIP: 0033:0x453b3f [ 1299.869598][T21332] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 1299.889194][T21332] RSP: 002b:00007fe86f27fa88 EFLAGS: 00010283 [ 1299.895258][T21332] RAX: 00007fe86f27fb40 RBX: 0000000020000068 RCX: 0000000000000000 [ 1299.903231][T21332] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007fe86f27fb40 [ 1299.911199][T21332] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a 02:13:23 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp%us\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1299.919165][T21332] R10: 0000000000000075 R11: 00000000004e6840 R12: 0000000000000004 [ 1299.927215][T21332] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:23 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x3) [ 1299.973369][T21332] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:13:23 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$KVM_GET_XCRS(r5, 0x8188aea6, &(0x7f0000000240)={0x8, 0x7f, [{0xfffffff9, 0x0, 0x9}, {0x1000, 0x0, 0xfffffffffffffff9}, {0x80000000, 0x0, 0x4}, {0x4466a50, 0x0, 0xfff}, {0x4, 0x0, 0x101}, {0xf52, 0x0, 0xffffffffffff2390}, {0xc99b, 0x0, 0x1}, {0xb34, 0x0, 0x7}]}) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:23 executing program 2 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:23 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:23 executing program 0 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:23 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp*us\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1300.203782][T21454] FAULT_INJECTION: forcing a failure. [ 1300.203782][T21454] name failslab, interval 1, probability 0, space 0, times 0 02:13:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008910, &(0x7f0000000080)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x17) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) ioctl$LOOP_GET_STATUS(r7, 0x4c03, &(0x7f0000000140)) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00'/14], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 1300.289457][T21454] CPU: 1 PID: 21454 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1300.297494][T21454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1300.307555][T21454] Call Trace: [ 1300.310850][T21454] dump_stack+0x1d8/0x2f8 [ 1300.315178][T21454] should_fail+0x555/0x770 [ 1300.319598][T21454] __should_failslab+0x11a/0x160 [ 1300.324545][T21454] should_failslab+0x9/0x20 [ 1300.329044][T21454] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1300.334321][T21454] ? copy_mount_options+0x5f/0x3c0 [ 1300.339432][T21454] copy_mount_options+0x5f/0x3c0 [ 1300.344368][T21454] ksys_mount+0xa0/0x100 [ 1300.348607][T21454] __x64_sys_mount+0xbf/0xd0 [ 1300.353195][T21454] do_syscall_64+0xf7/0x1c0 [ 1300.357824][T21454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1300.363705][T21454] RIP: 0033:0x45c98a [ 1300.367591][T21454] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1300.387185][T21454] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1300.395587][T21454] RAX: ffffffffffffffda RBX: 00007fe86f27fb40 RCX: 000000000045c98a [ 1300.403547][T21454] RDX: 00007fe86f27fae0 RSI: 0000000020000100 RDI: 00007fe86f27fb00 [ 1300.411582][T21454] RBP: 0000000000000001 R08: 00007fe86f27fb40 R09: 00007fe86f27fae0 [ 1300.419555][T21454] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1300.427517][T21454] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1300.437729][T21465] FAULT_INJECTION: forcing a failure. [ 1300.437729][T21465] name failslab, interval 1, probability 0, space 0, times 0 [ 1300.450710][T21465] CPU: 1 PID: 21465 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1300.458593][T21465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1300.468643][T21465] Call Trace: [ 1300.471942][T21465] dump_stack+0x1d8/0x2f8 [ 1300.476393][T21465] should_fail+0x555/0x770 [ 1300.480817][T21465] __should_failslab+0x11a/0x160 [ 1300.485810][T21465] ? xas_create+0x1197/0x1910 [ 1300.490481][T21465] should_failslab+0x9/0x20 [ 1300.494978][T21465] kmem_cache_alloc+0x56/0x2e0 [ 1300.499751][T21465] xas_create+0x1197/0x1910 [ 1300.504265][T21465] xas_create_range+0x142/0x700 [ 1300.509558][T21465] shmem_add_to_page_cache+0x91e/0x1290 [ 1300.515116][T21465] shmem_getpage_gfp+0x121e/0x2a90 [ 1300.520248][T21465] shmem_write_begin+0xcb/0x1b0 [ 1300.525091][T21465] generic_perform_write+0x25d/0x4e0 [ 1300.530384][T21465] __generic_file_write_iter+0x235/0x500 [ 1300.536012][T21465] generic_file_write_iter+0x48e/0x630 [ 1300.541470][T21465] __vfs_write+0x5a1/0x740 [ 1300.546757][T21465] vfs_write+0x275/0x590 [ 1300.550998][T21465] __x64_sys_pwrite64+0x162/0x1d0 [ 1300.556019][T21465] do_syscall_64+0xf7/0x1c0 [ 1300.560517][T21465] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1300.566570][T21465] RIP: 0033:0x413d37 [ 1300.570458][T21465] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 02:13:23 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9d"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1300.590050][T21465] RSP: 002b:00007faba37fba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1300.598455][T21465] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000413d37 [ 1300.606417][T21465] RDX: 0000000000000048 RSI: 0000000020000240 RDI: 0000000000000004 [ 1300.614395][T21465] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1300.622453][T21465] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 1300.630411][T21465] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:24 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9d"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1300.699552][T21474] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_CROP(r7, 0xc038563b, &(0x7f0000000040)={0x0, 0x0, {0x3, 0x800000, 0x2, 0x10000}}) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:24 executing program 2 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:24 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x4) 02:13:24 executing program 0 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:24 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp+us\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:24 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9d"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fallocate(r5, 0x9, 0x5, 0x40) r6 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$binfmt_elf64(r7, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="b3b1"], 0xe) close(r6) socket$netlink(0x10, 0x3, 0x4) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = socket$inet(0x2, 0x4000000805, 0x0) r10 = socket$inet_sctp(0x2, 0x5, 0x84) r11 = dup3(r9, r10, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r11, 0x84, 0x6f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x0, 0x0, 0x100}, &(0x7f0000000180)=0x98) connect$pppoe(r1, &(0x7f00000002c0)={0x18, 0x0, {0x4, @random="782dc7b1f926", 'team_slave_0\x00'}}, 0x1e) r12 = socket$inet6(0xa, 0x2, 0x0) r13 = fcntl$dupfd(r12, 0x0, r8) setsockopt$IP_VS_SO_SET_ADD(r13, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYRES64=0x0, @ANYRESDEC, @ANYRESOCT=r13], 0xfe43) r14 = socket$inet6(0xa, 0x2, 0x0) r15 = socket$inet6(0xa, 0x2, 0x0) r16 = fcntl$dupfd(r15, 0x0, r14) setsockopt$IP_VS_SO_SET_ADD(r16, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) [ 1301.030028][T21489] FAULT_INJECTION: forcing a failure. [ 1301.030028][T21489] name failslab, interval 1, probability 0, space 0, times 0 [ 1301.073046][T21497] FAULT_INJECTION: forcing a failure. [ 1301.073046][T21497] name failslab, interval 1, probability 0, space 0, times 0 [ 1301.085678][T21497] CPU: 0 PID: 21497 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1301.093588][T21497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1301.103639][T21497] Call Trace: [ 1301.106928][T21497] dump_stack+0x1d8/0x2f8 [ 1301.111258][T21497] should_fail+0x555/0x770 [ 1301.115689][T21497] __should_failslab+0x11a/0x160 [ 1301.120629][T21497] ? xas_create+0x1197/0x1910 [ 1301.125304][T21497] should_failslab+0x9/0x20 [ 1301.129802][T21497] kmem_cache_alloc+0x56/0x2e0 [ 1301.134561][T21497] xas_create+0x1197/0x1910 [ 1301.139071][T21497] xas_create_range+0x142/0x700 [ 1301.143927][T21497] shmem_add_to_page_cache+0x91e/0x1290 [ 1301.149486][T21497] shmem_getpage_gfp+0x121e/0x2a90 [ 1301.154612][T21497] shmem_write_begin+0xcb/0x1b0 [ 1301.159523][T21497] generic_perform_write+0x25d/0x4e0 [ 1301.164817][T21497] __generic_file_write_iter+0x235/0x500 [ 1301.170453][T21497] generic_file_write_iter+0x48e/0x630 [ 1301.175911][T21497] __vfs_write+0x5a1/0x740 [ 1301.180335][T21497] vfs_write+0x275/0x590 [ 1301.184570][T21497] __x64_sys_pwrite64+0x162/0x1d0 [ 1301.189594][T21497] do_syscall_64+0xf7/0x1c0 [ 1301.194092][T21497] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1301.200079][T21497] RIP: 0033:0x413d37 [ 1301.203956][T21497] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 02:13:24 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaef"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1301.223555][T21497] RSP: 002b:00007faba37fba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1301.231965][T21497] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000413d37 [ 1301.239934][T21497] RDX: 0000000000000048 RSI: 0000000020000240 RDI: 0000000000000004 [ 1301.247895][T21497] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1301.255964][T21497] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 1301.263929][T21497] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1301.283617][T21489] CPU: 1 PID: 21489 Comm: syz-executor.2 Not tainted 5.4.0-rc4+ #0 [ 1301.285100][T21501] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1301.291542][T21489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1301.291548][T21489] Call Trace: [ 1301.291564][T21489] dump_stack+0x1d8/0x2f8 [ 1301.291579][T21489] should_fail+0x555/0x770 [ 1301.291596][T21489] __should_failslab+0x11a/0x160 [ 1301.291610][T21489] should_failslab+0x9/0x20 [ 1301.291620][T21489] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1301.291633][T21489] ? copy_mount_options+0x5f/0x3c0 [ 1301.307837][T21501] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1301.312167][T21489] copy_mount_options+0x5f/0x3c0 [ 1301.312184][T21489] ksys_mount+0xa0/0x100 [ 1301.363662][T21489] __x64_sys_mount+0xbf/0xd0 [ 1301.368255][T21489] do_syscall_64+0xf7/0x1c0 [ 1301.372755][T21489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1301.378639][T21489] RIP: 0033:0x45c98a [ 1301.382534][T21489] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1301.402129][T21489] RSP: 002b:00007fe86f27fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1301.410549][T21489] RAX: ffffffffffffffda RBX: 00007fe86f27fb40 RCX: 000000000045c98a [ 1301.418518][T21489] RDX: 00007fe86f27fae0 RSI: 0000000020000100 RDI: 00007fe86f27fb00 [ 1301.426480][T21489] RBP: 0000000000000001 R08: 00007fe86f27fb40 R09: 00007fe86f27fae0 02:13:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_G_STD(r7, 0x80085617, &(0x7f0000000040)) [ 1301.434445][T21489] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1301.442408][T21489] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:24 executing program 0 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:24 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaef"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:24 executing program 1: iopl(0x3f) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$MON_IOCT_RING_SIZE(r7, 0x9204, 0x87640) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:24 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaef"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1301.586208][T21517] FAULT_INJECTION: forcing a failure. [ 1301.586208][T21517] name failslab, interval 1, probability 0, space 0, times 0 [ 1301.617585][T21517] CPU: 0 PID: 21517 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1301.625524][T21517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1301.635685][T21517] Call Trace: [ 1301.638984][T21517] dump_stack+0x1d8/0x2f8 [ 1301.643324][T21517] should_fail+0x555/0x770 [ 1301.647766][T21517] __should_failslab+0x11a/0x160 [ 1301.652709][T21517] ? getname_flags+0xba/0x640 [ 1301.657475][T21517] should_failslab+0x9/0x20 [ 1301.661977][T21517] kmem_cache_alloc+0x56/0x2e0 [ 1301.666740][T21517] ? check_preemption_disabled+0xb7/0x2a0 [ 1301.672459][T21517] getname_flags+0xba/0x640 [ 1301.676968][T21517] getname+0x19/0x20 [ 1301.680858][T21517] do_sys_open+0x261/0x560 [ 1301.685273][T21517] __x64_sys_open+0x87/0x90 [ 1301.689773][T21517] do_syscall_64+0xf7/0x1c0 [ 1301.694274][T21517] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1301.700157][T21517] RIP: 0033:0x413cd1 [ 1301.704043][T21517] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1301.723654][T21517] RSP: 002b:00007faba37fba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1301.732058][T21517] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413cd1 [ 1301.740024][T21517] RDX: 00007faba37fbb0a RSI: 0000000000000002 RDI: 00007faba37fbb00 [ 1301.748069][T21517] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1301.756026][T21517] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1301.763987][T21517] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:25 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x5) 02:13:25 executing program 0 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:25 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp-us\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:25 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1b"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r6, 0x0, r5) write(r5, &(0x7f0000000040)="d58943e0c61dd8a7a099dc609b2e222388804ca67e6304b1e3f01f964cf39f9c", 0x20) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1301.908620][T21528] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 [ 1301.989610][T21537] FAULT_INJECTION: forcing a failure. [ 1301.989610][T21537] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1302.002959][T21537] CPU: 1 PID: 21537 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1302.002966][T21537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1302.002971][T21537] Call Trace: [ 1302.002989][T21537] dump_stack+0x1d8/0x2f8 [ 1302.003004][T21537] should_fail+0x555/0x770 [ 1302.003021][T21537] should_fail_alloc_page+0x55/0x60 [ 1302.020946][T21537] prepare_alloc_pages+0x283/0x460 [ 1302.020963][T21537] __alloc_pages_nodemask+0xb2/0x5d0 [ 1302.020975][T21537] ? __kasan_check_write+0x14/0x20 [ 1302.020992][T21537] kmem_getpages+0x4d/0xa00 [ 1302.058085][T21537] cache_grow_begin+0x7e/0x2c0 [ 1302.062844][T21537] cache_alloc_refill+0x311/0x3f0 [ 1302.067871][T21537] ? check_preemption_disabled+0xb7/0x2a0 [ 1302.073615][T21537] kmem_cache_alloc+0x2b9/0x2e0 [ 1302.078467][T21537] ? getname_flags+0xba/0x640 [ 1302.083145][T21537] getname_flags+0xba/0x640 [ 1302.087653][T21537] getname+0x19/0x20 [ 1302.091554][T21537] do_sys_open+0x261/0x560 [ 1302.095974][T21537] __x64_sys_open+0x87/0x90 [ 1302.100480][T21537] do_syscall_64+0xf7/0x1c0 [ 1302.105067][T21537] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1302.110949][T21537] RIP: 0033:0x413cd1 [ 1302.114837][T21537] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 02:13:25 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1b"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1302.134440][T21537] RSP: 002b:00007faba37fba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1302.142845][T21537] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413cd1 [ 1302.150809][T21537] RDX: 00007faba37fbb0a RSI: 0000000000000002 RDI: 00007faba37fbb00 [ 1302.158772][T21537] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1302.166740][T21537] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1302.174705][T21537] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='\ntrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:25 executing program 0 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:25 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1b"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:25 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp.us\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:25 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) accept$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000003c0)=0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r7, 0x0, r6) close(r6) socket$netlink(0x10, 0x3, 0x4) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r9, 0x0, r8) setsockopt$inet6_tcp_TCP_ULP(r8, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) write$FUSE_BMAP(r0, &(0x7f0000000340)={0x18, 0xfffffffffffffff5, 0x3, {0x6}}, 0x18) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd6e) r10 = semget$private(0x0, 0x7, 0x0) semop(r10, &(0x7f0000000240)=[{0x0, 0x7fff}], 0x1) ioctl$USBDEVFS_SETINTERFACE(r1, 0x80085504, &(0x7f0000000080)={0x2, 0x6}) semtimedop(r10, 0x0, 0x0, &(0x7f0000000040)) semctl$SEM_INFO(r10, 0x4, 0x13, &(0x7f00000001c0)=""/24) semop(r10, &(0x7f0000000140)=[{0x1, 0x9}, {}], 0x2) r11 = socket$inet6(0xa, 0x2, 0x0) r12 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r12, 0x0, r11) fstatfs(r12, &(0x7f0000000280)=""/190) semctl$IPC_RMID(r10, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 02:13:25 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1302.476281][T21661] FAULT_INJECTION: forcing a failure. [ 1302.476281][T21661] name failslab, interval 1, probability 0, space 0, times 0 [ 1302.489637][T21661] CPU: 0 PID: 21661 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1302.497538][T21661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1302.497544][T21661] Call Trace: [ 1302.497563][T21661] dump_stack+0x1d8/0x2f8 [ 1302.497580][T21661] should_fail+0x555/0x770 [ 1302.497596][T21661] __should_failslab+0x11a/0x160 [ 1302.497607][T21661] ? security_file_alloc+0x36/0x200 [ 1302.497619][T21661] should_failslab+0x9/0x20 [ 1302.497630][T21661] kmem_cache_alloc+0x56/0x2e0 [ 1302.497643][T21661] security_file_alloc+0x36/0x200 [ 1302.497654][T21661] __alloc_file+0xde/0x390 [ 1302.497666][T21661] alloc_empty_file+0xac/0x1b0 [ 1302.497676][T21661] path_openat+0x9e/0x4420 [ 1302.497685][T21661] ? __kasan_kmalloc+0x178/0x1b0 [ 1302.497700][T21661] ? __lock_acquire+0xc75/0x1be0 [ 1302.497720][T21661] ? __kasan_check_write+0x14/0x20 [ 1302.497745][T21661] do_filp_open+0x192/0x3d0 [ 1302.497760][T21661] ? _raw_spin_unlock+0x2c/0x50 [ 1302.497783][T21661] do_sys_open+0x29f/0x560 [ 1302.515931][T21661] __x64_sys_open+0x87/0x90 [ 1302.515945][T21661] do_syscall_64+0xf7/0x1c0 [ 1302.515958][T21661] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1302.601765][T21661] RIP: 0033:0x413cd1 [ 1302.605656][T21661] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1302.625345][T21661] RSP: 002b:00007faba37fba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1302.633757][T21661] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413cd1 [ 1302.644081][T21661] RDX: 00007faba37fbb0a RSI: 0000000000000002 RDI: 00007faba37fbb00 [ 1302.652044][T21661] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1302.660015][T21661] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1302.667980][T21661] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1302.678836][T21667] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1302.756686][T21674] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:26 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x6) 02:13:26 executing program 0 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='%trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:26 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x8) r5 = socket$inet6(0xa, 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) socket$unix(0x1, 0x4, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x4100, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = socket$inet6(0xa, 0x2, 0x0) r12 = socket$inet6(0xa, 0x2, 0x0) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r13, 0xc0406619, &(0x7f0000000240)={{0x1, 0x0, @identifier="657e58c7cc5caaa907610d353efb036c"}}) fcntl$dupfd(r10, 0x0, r9) fcntl$dupfd(r8, 0x0, r10) writev(r5, &(0x7f0000000040), 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4106405a0000009fa5d4b350cbb7b621de9dcad6a65d3d590b3427e73757e5705878e9ff9b23d043a944a6573b2ae6068a5ab27e7e77152d81f60e451d1ad512c14435c54580b694e68a1532ee1abb147ff394350e55abcf9ccd72afab9991a59134d469845d7ca45b78c364e07d6d106fa54b8c18f368321b8bb250b8ec128730e7e6278469c989f0d7f367bfedee17963f96ca0027efe95adf94e34fcd37806a4a1fa2e24f420824f02936ccf2134fbd684abc"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x5) 02:13:26 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp/us\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1303.130214][T21695] FAULT_INJECTION: forcing a failure. [ 1303.130214][T21695] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1303.143458][T21695] CPU: 0 PID: 21695 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1303.151356][T21695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1303.161409][T21695] Call Trace: [ 1303.164713][T21695] dump_stack+0x1d8/0x2f8 [ 1303.166154][T21698] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1303.169047][T21695] should_fail+0x555/0x770 [ 1303.169066][T21695] should_fail_alloc_page+0x55/0x60 [ 1303.169075][T21695] prepare_alloc_pages+0x283/0x460 [ 1303.169089][T21695] __alloc_pages_nodemask+0xb2/0x5d0 [ 1303.169110][T21695] kmem_getpages+0x4d/0xa00 [ 1303.169124][T21695] cache_grow_begin+0x7e/0x2c0 [ 1303.169138][T21695] cache_alloc_refill+0x311/0x3f0 [ 1303.169153][T21695] ? check_preemption_disabled+0xb7/0x2a0 [ 1303.219546][T21695] __kmalloc+0x318/0x340 [ 1303.223790][T21695] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1303.229513][T21698] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1303.229522][T21695] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1303.229539][T21695] tomoyo_check_open_permission+0x1ce/0x9d0 [ 1303.251467][T21695] tomoyo_file_open+0x141/0x190 [ 1303.256320][T21695] security_file_open+0x65/0x2f0 [ 1303.261259][T21695] do_dentry_open+0x351/0x10c0 [ 1303.266030][T21695] vfs_open+0x73/0x80 [ 1303.270011][T21695] path_openat+0x1397/0x4420 [ 1303.274648][T21695] do_filp_open+0x192/0x3d0 [ 1303.279176][T21695] do_sys_open+0x29f/0x560 [ 1303.283590][T21695] __x64_sys_open+0x87/0x90 [ 1303.283605][T21695] do_syscall_64+0xf7/0x1c0 [ 1303.283618][T21695] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1303.283630][T21695] RIP: 0033:0x413cd1 [ 1303.298476][T21695] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1303.298483][T21695] RSP: 002b:00007faba37fba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 02:13:26 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000240)={@null=' \x00', 0xd, 'teql0\x00'}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r5, 0x0, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) r6 = socket$inet6(0xa, 0x2, 0x0) socket$kcm(0x29, 0x5, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r7, 0x0, r6) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_selinux(r7, &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:getty_log_t:s0\x00', 0x21, 0xa4cdff99aa2ef263) write$binfmt_elf64(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r4) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) [ 1303.298493][T21695] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413cd1 [ 1303.298499][T21695] RDX: 00007faba37fbb0a RSI: 0000000000000002 RDI: 00007faba37fbb00 [ 1303.298505][T21695] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1303.298510][T21695] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1303.298515][T21695] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:26 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc873"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:26 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000d40)='rxrpc\x00', 0x0, &(0x7f0000000dc0)="70edfcc054", 0x5, r0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$negate(0xd, r0, 0xffffffff, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) setsockopt$IP_VS_SO_SET_ADD(r9, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) write$apparmor_exec(r9, &(0x7f0000000180)={'exec ', 'keyring\bvmnet1vboxnet0*selfbselinuxtrusted:vboxnet1#selinux$\x00'}, 0x42) write$binfmt_elf64(r6, 0x0, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r5) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 02:13:26 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc873"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:26 executing program 0 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1303.692728][T21825] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1303.724557][T21826] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1303.783859][T21828] FAULT_INJECTION: forcing a failure. [ 1303.783859][T21828] name failslab, interval 1, probability 0, space 0, times 0 [ 1303.807399][T21828] CPU: 1 PID: 21828 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1303.815331][T21828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1303.825404][T21828] Call Trace: [ 1303.828696][T21828] dump_stack+0x1d8/0x2f8 [ 1303.833022][T21828] should_fail+0x555/0x770 [ 1303.837441][T21828] __should_failslab+0x11a/0x160 [ 1303.842377][T21828] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1303.848091][T21828] should_failslab+0x9/0x20 [ 1303.852599][T21828] __kmalloc+0x7a/0x340 [ 1303.856748][T21828] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1303.862485][T21828] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1303.868051][T21828] tomoyo_check_open_permission+0x1ce/0x9d0 [ 1303.873974][T21828] tomoyo_file_open+0x141/0x190 [ 1303.878825][T21828] security_file_open+0x65/0x2f0 [ 1303.883849][T21828] do_dentry_open+0x351/0x10c0 [ 1303.888618][T21828] vfs_open+0x73/0x80 [ 1303.892590][T21828] path_openat+0x1397/0x4420 [ 1303.897336][T21828] do_filp_open+0x192/0x3d0 [ 1303.901855][T21828] do_sys_open+0x29f/0x560 [ 1303.906268][T21828] __x64_sys_open+0x87/0x90 [ 1303.910774][T21828] do_syscall_64+0xf7/0x1c0 [ 1303.915276][T21828] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1303.921154][T21828] RIP: 0033:0x413cd1 [ 1303.925060][T21828] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1303.944673][T21828] RSP: 002b:00007faba37fba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1303.953076][T21828] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413cd1 [ 1303.961039][T21828] RDX: 00007faba37fbb0a RSI: 0000000000000002 RDI: 00007faba37fbb00 [ 1303.968997][T21828] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1303.976975][T21828] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1303.984935][T21828] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1303.998087][T21828] ERROR: Out of memory at tomoyo_realpath_from_path. 02:13:27 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x7) 02:13:27 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp0us\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='\\trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:27 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc873"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) connect$rxrpc(r7, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e20, 0x9, @ipv4={[], [], @empty}, 0x6}}, 0x24) 02:13:27 executing program 0 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1304.214561][T21837] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1304.220809][T21840] FAULT_INJECTION: forcing a failure. [ 1304.220809][T21840] name failslab, interval 1, probability 0, space 0, times 0 [ 1304.274182][T21846] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1304.286620][T21840] CPU: 0 PID: 21840 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1304.294542][T21840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1304.304604][T21840] Call Trace: [ 1304.307902][T21840] dump_stack+0x1d8/0x2f8 [ 1304.312247][T21840] should_fail+0x555/0x770 [ 1304.316702][T21840] __should_failslab+0x11a/0x160 [ 1304.321641][T21840] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1304.327358][T21840] should_failslab+0x9/0x20 [ 1304.331861][T21840] __kmalloc+0x7a/0x340 [ 1304.336016][T21840] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1304.341732][T21840] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1304.347283][T21840] tomoyo_check_open_permission+0x1ce/0x9d0 [ 1304.353206][T21840] tomoyo_file_open+0x141/0x190 [ 1304.358051][T21840] security_file_open+0x65/0x2f0 [ 1304.362990][T21840] do_dentry_open+0x351/0x10c0 [ 1304.367766][T21840] vfs_open+0x73/0x80 [ 1304.371742][T21840] path_openat+0x1397/0x4420 [ 1304.376371][T21840] do_filp_open+0x192/0x3d0 [ 1304.380889][T21840] do_sys_open+0x29f/0x560 [ 1304.385310][T21840] __x64_sys_open+0x87/0x90 [ 1304.389811][T21840] do_syscall_64+0xf7/0x1c0 [ 1304.394311][T21840] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1304.400195][T21840] RIP: 0033:0x413cd1 [ 1304.404082][T21840] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 02:13:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) r5 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x2, 0x101000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:27 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1304.423762][T21840] RSP: 002b:00007faba37fba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1304.432168][T21840] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413cd1 [ 1304.440131][T21840] RDX: 00007faba37fbb0a RSI: 0000000000000002 RDI: 00007faba37fbb00 [ 1304.448097][T21840] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1304.456060][T21840] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1304.464022][T21840] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1304.496149][T21840] ERROR: Out of memory at tomoyo_realpath_from_path. 02:13:27 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) ioctl$KVM_ARM_SET_DEVICE_ADDR(r3, 0x4010aeab, &(0x7f0000000040)={0x2, 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r7, 0x0, 0x0) writev(r5, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r5, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r6) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r4, 0x0, r6, 0x0, 0x80000001, 0x0) 02:13:27 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspHus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='b\x02rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1304.788290][T21868] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:28 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x8) 02:13:28 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:28 executing program 0 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="00000000000000000000000000001f0eb9b00dff188a318b143aca26c5edfae5f6de191dd7432255f0f4fc54589586a6d5d40623fc5b00550e9954045241036b08a513093f5b1ed58112d498e581c7d5a3338d5cabaefd6da35edbb9c885715ebe106bafdd7b4829a24d1efffdb8821e3468fd36788600da6472fc602a484de4b982f6e8a157ca3acfd549283207d33473273c4d1f12249934514b6813bf885b47e80692d4b35233702a0f2cb100fba02593f4b7b4b9a604c50000000000000000000000000000653f8d95f07b48ee976d5ae1737c819e2d13b6051485f4c9f1494bc3f2bfc57aa954291c9527e7736c1676ca7e9fbd5f847ae392f393a7b1bbd9e597ffdc1d2990af4633f750744a7939817cc2ae51c0595e63f4006b9713c7ea529d4b4ea17714e935fdfba0af40b9f3569c05008c38ede1625c4e501e5c8af9829f750dc548f34507a1ccb51fcbad2369ac3ddcbdb60f8e81b63e4d3cbfa6262f8653774b28fc00dd883c0ca68c3fc8dbb537b22e7ad74b3b561b77affe807fea097b4129f1129ff53049aa7b93c83b61aca5adb61144c08eec0661061ce21f6b90b2aaeda6d938bdf47a9fffd198f71078f3fd56e29ee67e45905f1a0886343c22988be2cd08a365acc4b56e5736b0acaade626b725f191874c22f9dba45ce2cab6a875d178f1baf4e3ff7becb80034ebda993a9780f82a6699ce15cb3a0d82f4b0fb5b84d9040eb42564a269daa71c31cb3795e4b5993261c55ea4101ea1a101fd2c74c6cef2781d47353beca3fe1e9ec07aefd1ad3d3b194fef2a4131403ba134f397323b1cd4c7701ab0fa82050941b7ef801441f2bfd403305774a2f9a38c2b495299b59f961a22cb4a3da1e20fd0324d9e33c62b52693cd80c841f18999adcd4d2bb45d306abf"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:28 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspLus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='b\nrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1305.233700][T21897] FAULT_INJECTION: forcing a failure. [ 1305.233700][T21897] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1305.247055][T21897] CPU: 0 PID: 21897 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1305.247063][T21897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1305.247067][T21897] Call Trace: [ 1305.247087][T21897] dump_stack+0x1d8/0x2f8 [ 1305.247102][T21897] should_fail+0x555/0x770 [ 1305.247117][T21897] should_fail_alloc_page+0x55/0x60 [ 1305.247126][T21897] prepare_alloc_pages+0x283/0x460 [ 1305.247140][T21897] __alloc_pages_nodemask+0xb2/0x5d0 [ 1305.247159][T21897] kmem_getpages+0x4d/0xa00 [ 1305.247171][T21897] cache_grow_begin+0x7e/0x2c0 [ 1305.247185][T21897] cache_alloc_refill+0x311/0x3f0 [ 1305.247196][T21897] ? check_preemption_disabled+0xb7/0x2a0 [ 1305.247210][T21897] __kmalloc+0x318/0x340 [ 1305.265186][T21897] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1305.322557][T21897] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1305.328124][T21897] tomoyo_check_open_permission+0x1ce/0x9d0 [ 1305.334044][T21897] tomoyo_file_open+0x141/0x190 [ 1305.338891][T21897] security_file_open+0x65/0x2f0 [ 1305.343826][T21897] do_dentry_open+0x351/0x10c0 [ 1305.348604][T21897] vfs_open+0x73/0x80 [ 1305.352599][T21897] path_openat+0x1397/0x4420 [ 1305.357235][T21897] do_filp_open+0x192/0x3d0 [ 1305.361760][T21897] do_sys_open+0x29f/0x560 [ 1305.366179][T21897] __x64_sys_open+0x87/0x90 [ 1305.370684][T21897] do_syscall_64+0xf7/0x1c0 [ 1305.375189][T21897] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1305.381082][T21897] RIP: 0033:0x413cd1 [ 1305.384977][T21897] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1305.404586][T21897] RSP: 002b:00007faba37fba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1305.413002][T21897] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413cd1 [ 1305.420980][T21897] RDX: 00007faba37fbb0a RSI: 0000000000000002 RDI: 00007faba37fbb00 02:13:28 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1305.428959][T21897] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1305.436937][T21897] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1305.444912][T21897] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) ioctl$FUSE_DEV_IOC_CLONE(r7, 0x8004e500, &(0x7f0000000040)=r1) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:28 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1305.596019][T21912] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:28 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspXus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1305.647656][T21913] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:28 executing program 0 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:29 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1305.928018][T21926] FAULT_INJECTION: forcing a failure. [ 1305.928018][T21926] name failslab, interval 1, probability 0, space 0, times 0 [ 1305.952211][T21926] CPU: 0 PID: 21926 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1305.960151][T21926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1305.970201][T21926] Call Trace: [ 1305.973492][T21926] dump_stack+0x1d8/0x2f8 [ 1305.977820][T21926] should_fail+0x555/0x770 [ 1305.982234][T21926] __should_failslab+0x11a/0x160 [ 1305.987168][T21926] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1305.992878][T21926] should_failslab+0x9/0x20 [ 1305.997377][T21926] __kmalloc+0x7a/0x340 [ 1306.001522][T21926] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1306.007349][T21926] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1306.012902][T21926] tomoyo_path_number_perm+0x166/0x640 [ 1306.018385][T21926] ? smack_file_ioctl+0x226/0x2e0 [ 1306.023405][T21926] ? __fget+0x411/0x510 [ 1306.027576][T21926] tomoyo_file_ioctl+0x23/0x30 [ 1306.032437][T21926] security_file_ioctl+0x6d/0xd0 [ 1306.037370][T21926] __x64_sys_ioctl+0xa3/0x120 [ 1306.042043][T21926] do_syscall_64+0xf7/0x1c0 [ 1306.046540][T21926] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1306.052423][T21926] RIP: 0033:0x459da7 [ 1306.056306][T21926] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1306.075900][T21926] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1306.084302][T21926] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1306.092268][T21926] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1306.100232][T21926] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1306.108283][T21926] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1306.116241][T21926] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1306.127252][T21926] ERROR: Out of memory at tomoyo_realpath_from_path. 02:13:29 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000100100000100000005e8000000b47fc9c858c598ba4909000000000000000a2e834efe3f87695931515781ae36a4d148f269399022f544be4fac9508cce4df4d7015eb590bbfb45f7b815bdb2281145dd688759944bd09b0f55e7ca54b07bd9189de8daeb173aca360f4bca4f5019235efcea227e56f94ddc8d5e02f38fdcdad2e5cc22b1f090ecf60605f3d9129670000000000000000000000000000000eab3ccfade12420421726b120b1ce8ad1642bb195935f9751facf178c4a3b74eeffcfe0312cd4a5cea34746dea9f76bf16244b5bc1bace51a63e67806440fbab6d8cd3ef5e19c077dbc02efed0840d26dbf3f84d5a39b30564d998a2f9293c470f0896ef88805670ed1220cf77ea1c692ee2053565d6529987f514b384013576ab56e1dc4f444be4a13aa637cea74ca6ebce21635"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x9) 02:13:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='b%rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_NUM(r3, 0x4008af10, &(0x7f0000000040)={0x0, 0x5}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) r5 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000000300)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000002c0)={r7, 0x7ff}, 0x8) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r9, 0x0, r8) fsetxattr(r9, &(0x7f0000000080)=@random={'user.', '\x00'}, &(0x7f0000000180)='md5sum\'selinux(mime_type.eth0ppp1,+}&Qvboxnet0vmnet0\x00', 0x35, 0x2) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = socket$inet6(0xa, 0x2, 0x0) r12 = fcntl$dupfd(r11, 0x0, r10) setsockopt$IP_VS_SO_SET_ADD(r12, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) r13 = socket$inet6(0xa, 0x2, 0x0) r14 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r14, 0x0, r13) r15 = socket$inet6(0xa, 0x2, 0x0) r16 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r16, 0x0, r15) r17 = socket$inet6(0xa, 0x2, 0x0) r18 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r18, 0x0, r17) write$binfmt_elf64(r14, &(0x7f00000004c0)=ANY=[@ANYRESDEC=r17, @ANYRESDEC=r15, @ANYBLOB="8c51c722f7ddfec24e1165d8df7469ec74c28ce2e432d573e820f958b198384cf1bcc33b990c7f1b553d9d809ef279f62295979e19e899711d70b5d02f20bd00"/79], 0x12f) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r21 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r22, 0x0, 0x0) writev(r20, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r20, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r21) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r20, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r19, 0x0, r21, 0x0, 0x80000001, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r19, 0x84, 0x1d, &(0x7f0000000280)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x20) 02:13:29 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:29 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp\\us\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:29 executing program 0 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:29 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1306.335688][T21947] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:29 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1306.438028][T21953] FAULT_INJECTION: forcing a failure. [ 1306.438028][T21953] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1306.451282][T21953] CPU: 0 PID: 21953 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1306.459162][T21953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1306.469384][T21953] Call Trace: [ 1306.472679][T21953] dump_stack+0x1d8/0x2f8 [ 1306.477012][T21953] should_fail+0x555/0x770 [ 1306.481553][T21953] should_fail_alloc_page+0x55/0x60 [ 1306.486743][T21953] prepare_alloc_pages+0x283/0x460 [ 1306.491849][T21953] __alloc_pages_nodemask+0xb2/0x5d0 [ 1306.497236][T21953] ? stack_trace_save+0x150/0x150 [ 1306.502270][T21953] kmem_getpages+0x4d/0xa00 [ 1306.506771][T21953] cache_grow_begin+0x7e/0x2c0 [ 1306.511535][T21953] cache_alloc_refill+0x311/0x3f0 [ 1306.516555][T21953] ? check_preemption_disabled+0xb7/0x2a0 [ 1306.522360][T21953] __kmalloc+0x318/0x340 [ 1306.526600][T21953] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1306.532315][T21953] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1306.537866][T21953] tomoyo_path_number_perm+0x166/0x640 [ 1306.543344][T21953] ? smack_file_ioctl+0x226/0x2e0 [ 1306.548359][T21953] ? __fget+0x411/0x510 [ 1306.552513][T21953] tomoyo_file_ioctl+0x23/0x30 [ 1306.557281][T21953] security_file_ioctl+0x6d/0xd0 [ 1306.562213][T21953] __x64_sys_ioctl+0xa3/0x120 [ 1306.566976][T21953] do_syscall_64+0xf7/0x1c0 [ 1306.571477][T21953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1306.577360][T21953] RIP: 0033:0x459da7 [ 1306.581244][T21953] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1306.600839][T21953] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1306.609248][T21953] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1306.617236][T21953] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1306.625315][T21953] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 02:13:29 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) [ 1306.633277][T21953] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1306.641238][T21953] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='b\\rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:30 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp`us\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:30 executing program 0 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1306.958228][T21973] FAULT_INJECTION: forcing a failure. [ 1306.958228][T21973] name failslab, interval 1, probability 0, space 0, times 0 [ 1306.980626][T21973] CPU: 0 PID: 21973 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1306.988546][T21973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1306.998602][T21973] Call Trace: [ 1307.001890][T21973] dump_stack+0x1d8/0x2f8 [ 1307.006226][T21973] should_fail+0x555/0x770 [ 1307.010638][T21973] __should_failslab+0x11a/0x160 [ 1307.015567][T21973] ? tomoyo_encode2+0x273/0x5a0 [ 1307.020406][T21973] should_failslab+0x9/0x20 [ 1307.024899][T21973] __kmalloc+0x7a/0x340 [ 1307.029057][T21973] tomoyo_encode2+0x273/0x5a0 [ 1307.033733][T21973] tomoyo_realpath_from_path+0x769/0x7c0 [ 1307.039364][T21973] tomoyo_path_number_perm+0x166/0x640 [ 1307.044837][T21973] ? smack_file_ioctl+0x226/0x2e0 [ 1307.049852][T21973] ? __fget+0x411/0x510 [ 1307.054009][T21973] tomoyo_file_ioctl+0x23/0x30 [ 1307.058762][T21973] security_file_ioctl+0x6d/0xd0 [ 1307.063693][T21973] __x64_sys_ioctl+0xa3/0x120 [ 1307.068373][T21973] do_syscall_64+0xf7/0x1c0 [ 1307.072871][T21973] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1307.078750][T21973] RIP: 0033:0x459da7 [ 1307.082638][T21973] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1307.102231][T21973] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1307.110632][T21973] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1307.118593][T21973] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1307.126553][T21973] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1307.134521][T21973] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1307.142490][T21973] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1307.159443][T21977] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1307.168948][T21973] ERROR: Out of memory at tomoyo_realpath_from_path. 02:13:30 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0xa) 02:13:30 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) 02:13:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='bt\nfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:30 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsphus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x9, 0x3, 0x2f8, 0x118, 0x118, 0x118, 0x118, 0x118, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, &(0x7f0000000180), {[{{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x3ff, 0x0, 0x8}, {0x2, 0x8, 0xf}, 0xb3, 0x1}}}, {{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="0d755fd30b9a", 0x3, 0xa, [0x13, 0xc, 0x3a, 0xb, 0x32, 0x12, 0x9, 0x1, 0x20, 0x26, 0x10, 0x31, 0x21, 0x22, 0x3c, 0x35], 0x0, 0x9, 0x401}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x358) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r7, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) writev(r5, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r5, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r6) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r4, 0x0, r6, 0x0, 0x80000001, 0x0) 02:13:30 executing program 0 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:30 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) [ 1307.355539][T21992] FAULT_INJECTION: forcing a failure. [ 1307.355539][T21992] name failslab, interval 1, probability 0, space 0, times 0 [ 1307.377674][T21991] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1307.420877][T21992] CPU: 1 PID: 21992 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1307.428815][T21992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1307.438875][T21992] Call Trace: [ 1307.442168][T21992] dump_stack+0x1d8/0x2f8 [ 1307.446505][T21992] should_fail+0x555/0x770 [ 1307.450928][T21992] __should_failslab+0x11a/0x160 [ 1307.455862][T21992] ? tomoyo_encode2+0x273/0x5a0 [ 1307.460706][T21992] should_failslab+0x9/0x20 [ 1307.465201][T21992] __kmalloc+0x7a/0x340 [ 1307.469355][T21992] tomoyo_encode2+0x273/0x5a0 [ 1307.474032][T21992] tomoyo_realpath_from_path+0x769/0x7c0 [ 1307.479664][T21992] tomoyo_path_number_perm+0x166/0x640 [ 1307.485147][T21992] ? smack_file_ioctl+0x226/0x2e0 [ 1307.490167][T21992] ? __fget+0x411/0x510 [ 1307.494321][T21992] tomoyo_file_ioctl+0x23/0x30 [ 1307.499076][T21992] security_file_ioctl+0x6d/0xd0 [ 1307.504008][T21992] __x64_sys_ioctl+0xa3/0x120 [ 1307.508682][T21992] do_syscall_64+0xf7/0x1c0 [ 1307.513184][T21992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1307.519066][T21992] RIP: 0033:0x459da7 [ 1307.522957][T21992] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1307.542553][T21992] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1307.550958][T21992] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1307.558922][T21992] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 02:13:30 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, 0x0) [ 1307.566881][T21992] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1307.574841][T21992] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1307.582801][T21992] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x81d00, 0x0) bind$isdn_base(r1, &(0x7f0000000180)={0x22, 0x70, 0x20, 0x8, 0x2}, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f00000001c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r5, 0x0, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x0) close(r4) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd6e) socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = socket$inet6(0xa, 0x800, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r9, 0x0, r8) r10 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r10) r11 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r11, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000002611bfb6f280ef63b7edcce98e2cdeba2b4a6145dc48215d7298702622a76fc586b699417dd47101c9199d00000000000000063c38fccb792d489d0bc24c7e3586690fa2ad467e567b6591378ea85d6d8bd75ca2685abafa6ed4aedca49ccd0289f3089fffef5e18ee905afaabfc4f8391d81f1355bd20f53c4699c6ad85b05f875f091869141eb330d4220e2de81e17084086d59dac1236f7ccada93c0bb308c9edb785", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r10, 0x84, 0xe, &(0x7f0000000300)={r12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r8, 0x84, 0x1f, &(0x7f0000000300)={r12, @in6={{0xa, 0x4e22, 0x101, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}}, 0x8, 0xeff4}, &(0x7f00000003c0)=0x90) r13 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r13, 0x0, r7) r14 = accept$inet6(r13, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}, &(0x7f0000000280)=0x1c) bind$inet6(r14, &(0x7f00000002c0)={0xa, 0x4e24, 0x2, @mcast1, 0xffff66eb}, 0x1c) r15 = socket$inet6(0xa, 0x2, 0x0) r16 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r16, 0x0, r15) r17 = fcntl$dupfd(r6, 0x406, r15) setsockopt$IP_VS_SO_SET_ADD(r17, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) ioctl$EVIOCGABS2F(r17, 0x8018456f, &(0x7f0000000040)=""/18) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) [ 1307.662117][T21992] ERROR: Out of memory at tomoyo_realpath_from_path. 02:13:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='bt%fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:31 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, 0x0) 02:13:31 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsptus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1307.873519][T22012] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:31 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0xb) 02:13:31 executing program 0 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:31 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, 0x0) 02:13:31 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspuus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='bt\\fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1308.259290][T22039] FAULT_INJECTION: forcing a failure. [ 1308.259290][T22039] name failslab, interval 1, probability 0, space 0, times 0 [ 1308.284431][T22039] CPU: 1 PID: 22039 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1308.292368][T22039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1308.302425][T22039] Call Trace: [ 1308.305723][T22039] dump_stack+0x1d8/0x2f8 [ 1308.310060][T22039] should_fail+0x555/0x770 [ 1308.314481][T22039] __should_failslab+0x11a/0x160 [ 1308.319413][T22039] ? __kernfs_new_node+0x97/0x6b0 [ 1308.324446][T22039] should_failslab+0x9/0x20 [ 1308.328941][T22039] kmem_cache_alloc+0x56/0x2e0 [ 1308.333705][T22039] __kernfs_new_node+0x97/0x6b0 [ 1308.338553][T22039] ? mutex_unlock+0xd/0x10 [ 1308.342964][T22039] ? kernfs_activate+0x4c7/0x4e0 [ 1308.347899][T22039] kernfs_new_node+0x97/0x170 [ 1308.352572][T22039] __kernfs_create_file+0x4a/0x2f0 [ 1308.357679][T22039] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1308.363158][T22039] internal_create_group+0x4be/0xd80 [ 1308.368453][T22039] sysfs_create_group+0x1f/0x30 [ 1308.373298][T22039] loop_set_fd+0xf54/0x1470 [ 1308.377811][T22039] lo_ioctl+0xd5/0x2200 [ 1308.381956][T22039] ? __kasan_slab_free+0x12a/0x1e0 [ 1308.387055][T22039] ? kasan_slab_free+0xe/0x10 [ 1308.391721][T22039] ? kfree+0x115/0x200 [ 1308.395780][T22039] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1308.401402][T22039] ? tomoyo_file_ioctl+0x23/0x30 [ 1308.406333][T22039] ? security_file_ioctl+0x6d/0xd0 [ 1308.411434][T22039] ? __x64_sys_ioctl+0xa3/0x120 [ 1308.416278][T22039] ? do_syscall_64+0xf7/0x1c0 [ 1308.420950][T22039] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1308.427016][T22039] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1308.432748][T22039] ? rcu_lock_release+0x9/0x30 [ 1308.437513][T22039] ? rcu_lock_release+0x9/0x30 [ 1308.442274][T22039] ? lo_release+0x1f0/0x1f0 [ 1308.446795][T22039] blkdev_ioctl+0x807/0x2980 [ 1308.451384][T22039] ? tomoyo_path_number_perm+0x53e/0x640 [ 1308.457033][T22039] block_ioctl+0xbd/0x100 [ 1308.461353][T22039] ? blkdev_iopoll+0x100/0x100 [ 1308.466111][T22039] do_vfs_ioctl+0x744/0x1730 [ 1308.470692][T22039] ? __fget+0x411/0x510 [ 1308.474849][T22039] ? tomoyo_file_ioctl+0x23/0x30 [ 1308.479780][T22039] ? security_file_ioctl+0xa1/0xd0 [ 1308.484890][T22039] __x64_sys_ioctl+0xe3/0x120 [ 1308.489585][T22039] do_syscall_64+0xf7/0x1c0 [ 1308.494088][T22039] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1308.499975][T22039] RIP: 0033:0x459da7 [ 1308.503863][T22039] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1308.523578][T22039] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1308.531985][T22039] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1308.539970][T22039] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1308.548070][T22039] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 02:13:31 executing program 5 (fault-call:4 fault-nth:0): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1308.556042][T22039] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1308.564009][T22039] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1308.632118][T22051] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1308.678638][T22055] FAULT_INJECTION: forcing a failure. [ 1308.678638][T22055] name failslab, interval 1, probability 0, space 0, times 0 02:13:32 executing program 0 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1308.738278][T22055] CPU: 0 PID: 22055 Comm: syz-executor.5 Not tainted 5.4.0-rc4+ #0 [ 1308.746203][T22055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1308.746209][T22055] Call Trace: [ 1308.746227][T22055] dump_stack+0x1d8/0x2f8 [ 1308.746244][T22055] should_fail+0x555/0x770 [ 1308.746261][T22055] __should_failslab+0x11a/0x160 [ 1308.746275][T22055] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1308.746285][T22055] should_failslab+0x9/0x20 [ 1308.746304][T22055] __kmalloc+0x7a/0x340 [ 1308.768340][T22055] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1308.768354][T22055] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1308.768374][T22055] tomoyo_path_number_perm+0x166/0x640 [ 1308.768408][T22055] ? smack_file_ioctl+0x226/0x2e0 [ 1308.768418][T22055] ? __fget+0x411/0x510 [ 1308.768432][T22055] tomoyo_file_ioctl+0x23/0x30 [ 1308.768442][T22055] security_file_ioctl+0x6d/0xd0 [ 1308.768455][T22055] __x64_sys_ioctl+0xa3/0x120 [ 1308.768468][T22055] do_syscall_64+0xf7/0x1c0 [ 1308.768483][T22055] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1308.838316][T22055] RIP: 0033:0x459f39 [ 1308.842209][T22055] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1308.861827][T22055] RSP: 002b:00007fe67c144c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1308.870235][T22055] RAX: ffffffffffffffda RBX: 00007fe67c144c90 RCX: 0000000000459f39 [ 1308.878202][T22055] RDX: 0000000020000000 RSI: 000000004008af30 RDI: 0000000000000003 02:13:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) r4 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffff801, 0xc940) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000180)={0x9, 0x2, 0x4, 0x1c000, {0x0, 0x7530}, {0x5, 0xa, 0x0, 0x1f, 0x3f, 0x4, "de8b4cfd"}, 0x1, 0x0, @fd=r4, 0x4}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r8, 0x0, 0x0) writev(r6, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r6, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r7) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r5, 0x0, r7, 0x0, 0x80000001, 0x0) [ 1308.886164][T22055] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1308.894128][T22055] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe67c1456d4 [ 1308.902095][T22055] R13: 00000000004c52ea R14: 00000000004d9ec0 R15: 0000000000000005 02:13:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btr\ns\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1308.929433][T22055] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1308.978807][T22061] FAULT_INJECTION: forcing a failure. [ 1308.978807][T22061] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.004724][T22061] CPU: 1 PID: 22061 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1309.012675][T22061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1309.022733][T22061] Call Trace: [ 1309.026043][T22061] dump_stack+0x1d8/0x2f8 [ 1309.030375][T22061] should_fail+0x555/0x770 [ 1309.034799][T22061] __should_failslab+0x11a/0x160 [ 1309.039733][T22061] ? __kernfs_new_node+0x97/0x6b0 [ 1309.044871][T22061] should_failslab+0x9/0x20 [ 1309.049388][T22061] kmem_cache_alloc+0x56/0x2e0 [ 1309.054165][T22061] __kernfs_new_node+0x97/0x6b0 [ 1309.059018][T22061] ? mutex_unlock+0xd/0x10 [ 1309.063428][T22061] ? kernfs_activate+0x4c7/0x4e0 [ 1309.068363][T22061] kernfs_new_node+0x97/0x170 [ 1309.073040][T22061] __kernfs_create_file+0x4a/0x2f0 [ 1309.078147][T22061] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1309.083522][T22061] internal_create_group+0x4be/0xd80 [ 1309.088819][T22061] sysfs_create_group+0x1f/0x30 [ 1309.093661][T22061] loop_set_fd+0xf54/0x1470 [ 1309.097875][T22067] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1309.098182][T22061] lo_ioctl+0xd5/0x2200 [ 1309.098195][T22061] ? __kasan_slab_free+0x12a/0x1e0 [ 1309.117908][T22061] ? kasan_slab_free+0xe/0x10 [ 1309.122572][T22061] ? kfree+0x115/0x200 [ 1309.126634][T22061] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1309.132264][T22061] ? tomoyo_file_ioctl+0x23/0x30 [ 1309.137205][T22061] ? security_file_ioctl+0x6d/0xd0 [ 1309.142315][T22061] ? __x64_sys_ioctl+0xa3/0x120 [ 1309.147161][T22061] ? do_syscall_64+0xf7/0x1c0 [ 1309.151834][T22061] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1309.157899][T22061] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1309.163628][T22061] ? rcu_lock_release+0x9/0x30 [ 1309.168394][T22061] ? rcu_lock_release+0x9/0x30 [ 1309.173154][T22061] ? lo_release+0x1f0/0x1f0 [ 1309.177650][T22061] blkdev_ioctl+0x807/0x2980 [ 1309.182237][T22061] ? tomoyo_path_number_perm+0x53e/0x640 [ 1309.187882][T22061] block_ioctl+0xbd/0x100 [ 1309.192204][T22061] ? blkdev_iopoll+0x100/0x100 [ 1309.196961][T22061] do_vfs_ioctl+0x744/0x1730 [ 1309.201567][T22061] ? __fget+0x411/0x510 [ 1309.205721][T22061] ? tomoyo_file_ioctl+0x23/0x30 [ 1309.210651][T22061] ? security_file_ioctl+0xa1/0xd0 [ 1309.215757][T22061] __x64_sys_ioctl+0xe3/0x120 [ 1309.220436][T22061] do_syscall_64+0xf7/0x1c0 [ 1309.224937][T22061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1309.230824][T22061] RIP: 0033:0x459da7 [ 1309.234711][T22061] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1309.254327][T22061] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1309.262742][T22061] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1309.270709][T22061] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 02:13:32 executing program 5 (fault-call:4 fault-nth:1): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:32 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspzus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1309.278676][T22061] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1309.286646][T22061] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1309.294618][T22061] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1309.318119][T22066] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1309.344375][T22071] FAULT_INJECTION: forcing a failure. [ 1309.344375][T22071] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1309.357634][T22071] CPU: 0 PID: 22071 Comm: syz-executor.5 Not tainted 5.4.0-rc4+ #0 [ 1309.365525][T22071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1309.375584][T22071] Call Trace: [ 1309.378888][T22071] dump_stack+0x1d8/0x2f8 [ 1309.383226][T22071] should_fail+0x555/0x770 [ 1309.387658][T22071] should_fail_alloc_page+0x55/0x60 [ 1309.392853][T22071] prepare_alloc_pages+0x283/0x460 [ 1309.397967][T22071] __alloc_pages_nodemask+0xb2/0x5d0 [ 1309.403263][T22071] kmem_getpages+0x4d/0xa00 [ 1309.407775][T22071] cache_grow_begin+0x7e/0x2c0 [ 1309.412554][T22071] cache_alloc_refill+0x311/0x3f0 [ 1309.417580][T22071] ? check_preemption_disabled+0xb7/0x2a0 [ 1309.423301][T22071] __kmalloc+0x318/0x340 [ 1309.427542][T22071] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1309.433263][T22071] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1309.438818][T22071] tomoyo_path_number_perm+0x166/0x640 [ 1309.444334][T22071] ? smack_file_ioctl+0x226/0x2e0 [ 1309.449353][T22071] ? __fget+0x411/0x510 [ 1309.453510][T22071] tomoyo_file_ioctl+0x23/0x30 [ 1309.458281][T22071] security_file_ioctl+0x6d/0xd0 [ 1309.463221][T22071] __x64_sys_ioctl+0xa3/0x120 [ 1309.467899][T22071] do_syscall_64+0xf7/0x1c0 [ 1309.472403][T22071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1309.478288][T22071] RIP: 0033:0x459f39 [ 1309.482177][T22071] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1309.501773][T22071] RSP: 002b:00007fe67c144c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1309.510187][T22071] RAX: ffffffffffffffda RBX: 00007fe67c144c90 RCX: 0000000000459f39 [ 1309.518167][T22071] RDX: 0000000020000000 RSI: 000000004008af30 RDI: 0000000000000003 [ 1309.526145][T22071] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1309.534124][T22071] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe67c1456d4 02:13:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) r5 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x800) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000080)=0x8140, 0x4) close(r3) socket$netlink(0x10, 0x3, 0x1d) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000180)=0xe8) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:32 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0xc) [ 1309.542105][T22071] R13: 00000000004c52ea R14: 00000000004d9ec0 R15: 0000000000000005 02:13:32 executing program 5 (fault-call:4 fault-nth:2): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:32 executing program 0 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1309.699429][T22089] FAULT_INJECTION: forcing a failure. [ 1309.699429][T22089] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.722281][T22089] CPU: 1 PID: 22089 Comm: syz-executor.5 Not tainted 5.4.0-rc4+ #0 [ 1309.730217][T22089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1309.740272][T22089] Call Trace: [ 1309.743584][T22089] dump_stack+0x1d8/0x2f8 [ 1309.747919][T22089] should_fail+0x555/0x770 [ 1309.752340][T22089] __should_failslab+0x11a/0x160 [ 1309.757274][T22089] ? tomoyo_encode2+0x273/0x5a0 [ 1309.762131][T22089] should_failslab+0x9/0x20 [ 1309.766634][T22089] __kmalloc+0x7a/0x340 [ 1309.770792][T22089] tomoyo_encode2+0x273/0x5a0 [ 1309.775470][T22089] tomoyo_realpath_from_path+0x769/0x7c0 [ 1309.781102][T22089] tomoyo_path_number_perm+0x166/0x640 [ 1309.786585][T22089] ? smack_file_ioctl+0x226/0x2e0 [ 1309.791598][T22089] ? __fget+0x411/0x510 [ 1309.795752][T22089] tomoyo_file_ioctl+0x23/0x30 [ 1309.800510][T22089] security_file_ioctl+0x6d/0xd0 [ 1309.805442][T22089] __x64_sys_ioctl+0xa3/0x120 [ 1309.810120][T22089] do_syscall_64+0xf7/0x1c0 [ 1309.814619][T22089] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1309.820507][T22089] RIP: 0033:0x459f39 [ 1309.824394][T22089] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1309.844093][T22089] RSP: 002b:00007fe67c144c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1309.852517][T22089] RAX: ffffffffffffffda RBX: 00007fe67c144c90 RCX: 0000000000459f39 [ 1309.860483][T22089] RDX: 0000000020000000 RSI: 000000004008af30 RDI: 0000000000000003 [ 1309.868446][T22089] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1309.876411][T22089] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe67c1456d4 [ 1309.884373][T22089] R13: 00000000004c52ea R14: 00000000004d9ec0 R15: 0000000000000005 02:13:33 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl\ns\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) r8 = accept4$nfc_llcp(r7, &(0x7f0000000040), &(0x7f0000000180)=0x60, 0x80000) write(r8, &(0x7f00000004c0)="dde67a0b27ee760b4a700f2592eb7784f998c2b08a00175756b66be69aadd4f95bb56784967f4cce41d25a060c7398f735eca9d01d8f3cc19c6cb2ab798a52d8cf6a94061f840c82d5afe662be611356ed0c39449a0275d2ff6f3c42ce638d82a2d766cb189c5a632902e45b207ccc38838da20e4bed2c0db1bfc63d90a599b9f629a96d175ff3d07788c3eb2b242c493d1f060ba9f6a803508b2bf860a520a1141490e447259ae3b146d44c15b8fa797742c1df27c5fb9461cf630d619bbab5c3eb65900a351e6aa59a404e0bbed83570aecb5f45436f352b68192592e4584d8f707efea7eb6ce11c23a6474ecc6cfe70859f86bc619ba3f7797a69cb355cd5e1b3b79b46b183d0cd6daaa1a39f73ba61ea9d91c38d803f124abd0caa5ce0fb463bd4fa19e051e8af94ed0286db16a32cb9aae5cdcabfbec7cc409d66e9826608ab19af57519019584605fd364504387d40e7f7f0898931e16e9a0b83d122653bf382b2d4fdc7cc7f3f93e34a0f4c5a8c00bd65d35c693b82097ef219f138d10fcf825542e1954bafee19f917f731b81769785251f8e6713f6e400e33531a60fba7d4a65015268e9dbb6659582dadcc07be6303598bcbfd8cdafc51eb4e460379bfd4642f7c7c01dbbe12b50c220abf0920eb9d6eb3c4a19cc1d9fd0926c1e41c5b25f55726182984007c8c01bb6ca3cc1cbfd24570235214b7e938eee83d3238578e07648995531c8d88b311aee80b5860dc515efc7853738936fbd4324f75d5d7e2f4014e3154c1e5a7bfd16fc59095be75eb0165a9fe8d54b10d64dca7262e37b8caac6c466202a330844f032d3796ce95b9578c6027a4acec32237b69e11ef74b0ee56795d3a1f1942cf7fb551bfefda30cb2ec551e82ea262e901f09a710f38453e41f2aaa0ddc0f8b65b1e86dbdb89f9fe57fa231b86299928469d00123ac6f98d65e7bbb2126d1fe7046a9076c35eb6fa8c5e725fedafe34bde5af4fa36d8a7b9fb3eef5ff70351dcdb786ca911ccd1f515c8a2dc0a2fca35ba5db00e9b38e02fd61843b2a5fac0522356ffe032267ceeb002a69b4b0f9dc31215c81b75d0007f7df54d599e904fff1e961b575f936b6cc5f1df6227f9ae94fcb63acf7bef1e7867d671deeb4d742baad67bf24a036283770845cbdda0b3aa42abc550013bd1cd66d46c621339c00d9d1db18accebd742b470f3ddc7d0dfbbaacd90eea4d69dc6bda5d2e954f4e90d29635cbccbc890e9c66a6a81d5ffd3e89d8f69b56d2f8bced03d404b26fecac09a7c23661bbd9511ea4def2774d7a7575e818f119d668f7f17598fa78be5fcfd889a24d410aa46021608f5d29bb3254cf92ace4fbefe7c06c7091676592bd494409403b5060d35dd809ef71fe7e634e0e0589959913721000e6a83a1bda9c149b8c5ef36a6105e0fbe3d3c3aa6a6ee0583c966ba6d8c9b7e4128fc8251a09510adfed643f1a605993c3dde1af953aef4e38eddb74495d66334861f9b43535a70c598b6dcde25b5f9a4a1e04dec8b1e0687b91831a49968e4e509a085d39660cf511cd8871c0e6038df9c05a7d0b6c8be91604146f3bd522fec19a2ccb64301eaaa2b7316fc79ec8d9e32ed0b7cb4a22c2210c0aa2afb08a5dcebb678dc51ecfad4e688c5accbdf92196026159647c5189b1cdf16d198585be6407e095a7d2ca79a21faec0af90bf83529c3da765f0834b426bc1458c198ac7b734304fbde7295024aeaae29efc99acc28e14518bc04d684db1502fd5b4b87d02b3fd4e0e09c800f773464e38b3578fa318609cb56c207e6b8e81a0daf9dc3e779ef4ea7b69df26024303a19147727dcc388da2234fc736ba2e91d2ca96000d81b8dd51e4b207a7d4027ef74269aec2bd76229bb1d8914de85a74215be558c01f8549638bcdd316d87994a68218828e79ba4eb85616982d529285e571c8dde3e1ce5a44820a5e744bcb7a0ea6f1a1821bb7bdab654e80e90e4faff060ae254540001c848f0e04cf2ae130aad9d7e8fbe12b784299ffc2f96aa3699f17e89467675c2395f565562365c97abf2b8eb0cccda2e45ea2a28c7652b10afc2a8bfb9ae180328cf5f5c219800d387dce9bb5f06e5f528f4dfc700246c0057ddb5ae99d81c641833d38caf52b83130b0927d35c5bf52a4ac8847eb119e88d1db630a5cc289d901efc8544a920b9cf8b443b1b3ccdd5c8af1ccf3871d3e73ef28852b4e20e339d205f6d94d177f67ff2a5286e09fcf3b65bb532c10d306a9b9269526a956af791fc37c5731eabdbc5d6263ce13c93e22fb3d26b2610ac441f6d6f39fd941d41df69c2a721771bb6d2a046ca5ba1c0c37df07e715896612640c46c0d24eae4146cf3e10d5bd9757b1c914bbf49706444dfe43670768060aefb7a4168253995e988b2a9a5f5d3c7f2152a851b768d27c2da2e02804e6d277939b5954e8c7267f96d498fc04d2f2e8420d29bf264dec8b138fed618b8e4268ab0e72e58f884abd5ed17ae1caabf6bd21ad13bd47c80a0e31fa5008fc27bc21df12d908ee537643c8ad21d92fd21d0c7a83cad76b4f7696545f60f7fd08615e2fe5ca5cf02d371fe248596461f5d1f7dcaddee22ff7671228429e0add6e282c82654a75da571bdf941c5657d33b88177b9d446c0e20daecb9447695843dfac2c7c9fd0027b58da88cdab1cb1922853afe5b1b4e2b6c9ccabe303b98adedba6ad889c3747d7dc599d1462a386192d98e01d822d1bcfe16006b01dcb725a4334ea9d7776a48068f6ada86bb10a864ffaf5547e92c3f69ef4e4a2dec842d347654dd886f263fe585c81065c3961f59938a188dfa737d0a82924a5d3980faa5b7edd748080c037a5dfe436c70cdbe8e3c556358abe1754d9af2318861770161463d57232bacf3ce4ddc379150b57b227443ddd1dbb415bb2d9489a2c75aa0950d3dbc4d3c7a91095789bf13bebd29950944d5fccf85abf7132c38e71820748661d25faa537d8c0803db2a6c261aaa2026695d32f7b7aba0166e8440949e42f4ca10e947004eb8d0aab3eea90ccad0264987bb8c1dbeb3f482da237e97a5523651092a26e0469c4c5fd6acb42704d5b55d226a02ec5a551d4d010f9c99564944998347287d597b03ad9f203e7e33f90051ff9c0c3b457e0144b26607bd7d81a32931962c4b78f5714dfd34e6485eabaeffe38ee1f514d04be1bda7285ce92f756bf7965f4eccb21b5bd951886e0f3e81fd69a6fc040ca309beabfc86d38835b4891c1d176f2e451e9c337d6c12c0d44de0778fff84d305d63a6b7f27b9559c4daa17ef3726b48b3c2ac479129edc2da38d5f3ad5fc52c88d847b09ac853a4b6bfdb45348e25f0de6a4620da3c8e2cc7b43838f6367ab45960635c58a7512326651f57c264bd61b21e3ef0ba629c47060014494b42e6b8e3f670f035f9109d34174697d85d90ddbfb0475228cd2f9ab343e3da70909003e036e88293acf0462fdd1df87b478b6b160ecd11d55e47c81c16c15108b948b7a45e056d3a6c40271f3d329b9990c62fb0bb9c18d17d2d69016ee278cb17a66e5924bfc3d607ee64c5609d87d42566292a5e5b303c150ce8bf9036ddfc930fbcad82bb6db3e3f93a361d0a7312e565c1332748932a7a77bed2553ee53f6439e98345ce65169f030055aa2bdffff15b4b88bae5ad142cdc8bf3fc7b295d9aa93cf1dde7511a2938971d59164a742e1ffdd268bd7e78a6a43b877c1611cff3a579ca8d8e5fa6f2ada4402a89ab6ab005b6983624dc7263fe044b6ba3fd757ea619138c67d81d2f0ca697d9dbd81c13ecf64d5b92612b20cca9eec864a664d0b84f4ff173d6c4aad57801d168de80a86951831de88f44f55693489573f128f7c2456c7df6121b1e437714be2456c10ca4d5c24f9df0fd0719428bb8b8eb5c747c0678de5ed3024cd250cf110184e6cf816b33568e8b0646544ab997873db59acab7fdfa6e55fad179a03158c4a965d12bc0f78675be5597238a405517ca37c73d46d57f4da90e015392f1666fa0aaf7f391fe63181cca9b89bdf053e219ff503e6009a3945733e3bed4e1b376e11d4a65cbf1ae73ffd8fa1c21b7f4f4850bb5f95098bd2785ebb02a0084183de888c2d7f7638ec56520d3fff28347a389a3b7e1631a3fee175808bdc2deece99670e0c75adcc0d3f8020bf2e7de6dcd8937e23f74cf950b2d2a7fc58269ca0e993489c197ba96124e1252d69c2d3a095e14fb5cc2b2e77a413696197df868ed3656e6587463aa6eb174b766497729076f98a8c587cc3240d2e90ea44e59d24f9148ed523cb6c03086a131e68693b3ec711577d261a11bd82237f68d8427d79002854005e1c6cb0b43b3429a96b6f3a9cd62ad89d01ffdf4af2a95be42c772f0b15bfef6ee0172981e263b6b5401d3de3bb851654db5bd26ef23b9ff4e1e8edbb73e657a68bf65d4d16c3fcb7e65189172752d07134ead1c27e3d135533fc268076b70762c77e1505200636ffc55c2fe7d4cc1ac5a3c31f4db0423d4559cae27a27aff02691d00ec03433593b1bf5a1647301a1db838c411ee223ba30f40f5b741b857df12dc8c1384d4cebb4dff80dbdd8cd9038c2449f5b941c0f717c6b7e5740f1ab2f4f9d6c4eca5359b65e89c6662b5fcff6c00ca838ce1815efe2252012482849f13e25f946cf3b5b79317be78b361013da22d2a96f53077aae857fb916d197ec8567f8aaa1d188e89d61a9bc8b8f94886715ebddd2662f7b9af54db496bda07824c20bcedf2b644d74afb805e4d25d8046fcc5f469a6bf98c3b660257c50b39bd98a343492c367803b9e6a5cc9151091d77632dbacea3e6e0fdd62ac2f643a0edfe99c36c72be075b75a8568c9fcea9b74cacc58b5f5453f56062c563a9744053aabd554dbe778de0c4a97fc826f3b9600c0db25720e6010a7464353c349196e50e67abc4eae83e5d5b03347ac2f7b1a878cf0412fe35fece3f663d6863a063d0661aeaae158c41b27a5e6a40892bf07dcc33e7ed1cf463f87951d132d6437c57db2cd4c38697d3683d6befdc3907c2f96fa8ee8cbeebb938215d2557ac3d2398f7384079a9470713d722615aa66976417a3df9cce1b4310b823e07d21e9e52bce91ccc6e51dec84030d85c4be1149f8e4f7e608fd6005b92311c4a11a63b7814bb2ffde6e7cb52801fee52746c3dde9b5eb47c668023c3fc2b9077a851d257ebe3426e716e103d7c96f080f724a3cd700cfb8e7296077c4a22e89907e89ec597b8be44e4b29bbfa8f73341011cfad98d0868e445717877dcfe528437078c6d221f72e183c45fb2806f8df5a8b16199a933bb83d2a7bc1d919c1d6c3be5326ede1f5a1f561362a4fa240264bab4254cbe0d980ec6b23861964f29860cbb882e5a9bcd20eb31528714b8d3681862f060358f9f3ec2e5c13ae3a83222319490e6d5d5fbbc73608ca70638a23903e38641afbd412df9ba693f1eda8e07d569c01b6b3a5102e672174f96f31ea56a871b9ebebdb4a05950d23cc66283da81ce66b3b271ae13cd838cb7eea9ef94fe73a8781a42e6c5f2175f763ad71b80c08eea05341be95f997e0ead9a17c75930a19958c949a02095d466c9ecd17239ebd22b261991c9e88029dbdfc645a346e62dc1a234641805de4fac27fb0efa8a070c56b772304cb1107be97b30c3a41e158910aae5854d2db026aa3fb0569a4febeb524f9843f627f590af17933af3aa0c0a8feaba8ae5e57eaa6758045dea660e2ff478f67c63e5cd3d4019263fcef1ad0075e83b674d2440d2335cfc78ed0f9caaf8", 0x1000) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) r9 = socket$inet6(0xa, 0x4001008000000002, 0x0) ioctl$sock_SIOCETHTOOL(r9, 0x89f0, &(0x7f0000000340)={'bridge0\x00\x00\x00\x00\x00\x00\x0f\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="1200000000000000000000200000000002"]}) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1309.898320][T22089] ERROR: Out of memory at tomoyo_realpath_from_path. 02:13:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btr%s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1309.952704][T22097] FAULT_INJECTION: forcing a failure. [ 1309.952704][T22097] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.988189][T22102] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1309.991825][T22097] CPU: 1 PID: 22097 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1310.006796][T22097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1310.015940][T22103] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1310.016945][T22097] Call Trace: [ 1310.016961][T22097] dump_stack+0x1d8/0x2f8 [ 1310.016977][T22097] should_fail+0x555/0x770 [ 1310.016996][T22097] __should_failslab+0x11a/0x160 [ 1310.017007][T22097] ? __kernfs_new_node+0x97/0x6b0 02:13:33 executing program 5 (fault-call:4 fault-nth:3): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0xe) close(r3) r5 = socket$netlink(0x10, 0x3, 0x4) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r7, 0x0, r6) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r8) setsockopt$IP_VS_SO_SET_ADD(r10, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) r11 = socket$inet6(0xa, 0x2, 0x0) r12 = socket$inet6(0xa, 0x2, 0x0) r13 = fcntl$dupfd(r12, 0x0, r11) setsockopt$IP_VS_SO_SET_ADD(r13, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) r14 = socket$inet6(0xa, 0x2, 0x0) r15 = socket$inet6(0xa, 0x2, 0x0) r16 = fcntl$dupfd(r15, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) r17 = socket$inet6(0xa, 0x2, 0x0) r18 = socket$inet6(0xa, 0x2, 0x0) r19 = fcntl$dupfd(r18, 0x0, r17) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) r20 = socket$inet6(0xa, 0x2, 0x0) r21 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r21, 0x0, r20) write$binfmt_misc(r5, &(0x7f0000000480)=ANY=[@ANYRES32, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES64=r13, @ANYRESHEX], @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYBLOB="369627d09f589ec23f96690d5214ad853e30baaa782c0211b22e55686c89a9bbb39d0c724ed9689622849881cd9fd47faf3c8826b1b0708101c25e1b8e3fa162b74996d83c5afecc601fe6f338dfca8e6c5a507c30f69843ab5efc7c3809ab34030cbee233fb3d19dbc024c6cb8682a078aa901f35ae15e0729af8d59566f7aa73d81043bf1f927d7d1ee2e753fb5c532ee67a2d7c2787", @ANYRES64=r2, @ANYRESHEX=0x0, @ANYRESHEX, @ANYBLOB="fcd7b9ec8d04554ee30e213284c1bf77a2a68a824f132e94d9aefcde9307538e341e21f73f4849ddac3b6a026e41b227baf9eece0d7c591d3f76258e0e56b8033b02a2ea9c13e549050bdd4d53c3ccd214c4d904e339329f1166651d9c5fe61a384e86a927bf3485458a02c57c", @ANYRES64=r5], @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYPTR], @ANYPTR=&(0x7f0000000440)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRES64], @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESOCT=r16, @ANYRESHEX], @ANYRESDEC=r19, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES32=r21], @ANYRES16, @ANYPTR, @ANYRES16=0x0]], 0x24) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1310.017021][T22097] should_failslab+0x9/0x20 [ 1310.053920][T22097] kmem_cache_alloc+0x56/0x2e0 [ 1310.058687][T22097] __kernfs_new_node+0x97/0x6b0 [ 1310.063544][T22097] ? mutex_unlock+0xd/0x10 [ 1310.067956][T22097] ? kernfs_activate+0x4c7/0x4e0 [ 1310.072888][T22097] kernfs_new_node+0x97/0x170 [ 1310.077553][T22097] __kernfs_create_file+0x4a/0x2f0 [ 1310.082664][T22097] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1310.088047][T22097] internal_create_group+0x4be/0xd80 [ 1310.093336][T22097] sysfs_create_group+0x1f/0x30 [ 1310.098180][T22097] loop_set_fd+0xf54/0x1470 [ 1310.102694][T22097] lo_ioctl+0xd5/0x2200 [ 1310.106841][T22097] ? __kasan_slab_free+0x12a/0x1e0 [ 1310.111941][T22097] ? kasan_slab_free+0xe/0x10 [ 1310.116614][T22097] ? kfree+0x115/0x200 [ 1310.120674][T22097] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1310.126295][T22097] ? tomoyo_file_ioctl+0x23/0x30 [ 1310.131219][T22097] ? security_file_ioctl+0x6d/0xd0 [ 1310.136319][T22097] ? __x64_sys_ioctl+0xa3/0x120 [ 1310.141161][T22097] ? do_syscall_64+0xf7/0x1c0 [ 1310.145944][T22097] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1310.152011][T22097] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1310.157738][T22097] ? rcu_lock_release+0x9/0x30 [ 1310.162587][T22097] ? rcu_lock_release+0x9/0x30 [ 1310.167346][T22097] ? lo_release+0x1f0/0x1f0 [ 1310.171844][T22097] blkdev_ioctl+0x807/0x2980 [ 1310.176432][T22097] ? tomoyo_path_number_perm+0x53e/0x640 [ 1310.182075][T22097] block_ioctl+0xbd/0x100 [ 1310.186397][T22097] ? blkdev_iopoll+0x100/0x100 [ 1310.191153][T22097] do_vfs_ioctl+0x744/0x1730 [ 1310.195737][T22097] ? __fget+0x411/0x510 [ 1310.199892][T22097] ? tomoyo_file_ioctl+0x23/0x30 [ 1310.204823][T22097] ? security_file_ioctl+0xa1/0xd0 [ 1310.209931][T22097] __x64_sys_ioctl+0xe3/0x120 [ 1310.214608][T22097] do_syscall_64+0xf7/0x1c0 [ 1310.219107][T22097] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1310.224993][T22097] RIP: 0033:0x459da7 [ 1310.228879][T22097] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1310.248475][T22097] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1310.256881][T22097] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1310.264880][T22097] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1310.272843][T22097] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1310.280808][T22097] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1310.288774][T22097] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:33 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0xd) [ 1310.406851][T22110] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1310.443294][T22110] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:33 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:33 executing program 0 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1310.468326][T22110] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1310.488027][T22110] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:33 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl#s\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0xafa43754d44a06d4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000040)="9006af6a303fae76a4c99841231ebd7c4765a5cb077321107bc6782b878e70e3e342e9887bc8e114da1dcc1de0a656297a1ce6f0c9c56565f15d27df1a3a0cf22d1c352c6a28202bd3016fd79ebcc4cff87a9bce94b91039197bfff622c6e74c1bd59ca98e644bf8a9b6b30022d767d369fdfc", 0x73}, {&(0x7f0000000180)="f37b2cbfa981c6aee4fe7e00220fdb9a36ba016b01c310", 0x17}, {&(0x7f0000000240)="39abcd327e56d6f8355579a734de92147f5755486183c86934ad682f3fa956754fa8a82036d972e299901c7a9c5c4e87970fd356703a7b421a52959e9a0bd970e4124eef6acdec6814230f48aa1262fd2851df5ead6d57593c4f8e754b6e8e84a723713b3c5d4f087273fda756bdeaf8411890e6882847170a775183d49355c7783094f9f2035a6df599d4f05eb37a91cb8933cfe0dc5395e0d4c2c7b7304117e0e04dd3d67d", 0xa6}, {&(0x7f00000001c0)}, {&(0x7f0000000300)="05a2d5f60d26ce933ce6c82c3e2bc85b8f63f6feaf747a0ebc4075831370f2e35e4de627c9dcfe67c6c87e88d3f5fcae112b976e22d0ecb3dd28609588663584ac0150f00daf4a9960813e41cf7e7a615b88d1324a489304e29f026a6b1f7df57834f232f870674ae9b9a3f1d8458407b0b66cfb56d86a899dc2e9d2be3853068d66de5065f5078c1874ec57cbf691ffd91839d6ff16cc38dd155b74a9e48d5ca8499a1065064de5a6d085c4c3d96f9adf623f8b6df784e7ff8fa769361278e0039303c4740aeb73483458e9c6ddde57aee0df810fb60610202cbabc5a5cc3c581108cd139628f16c8288f4e02c7453293", 0xf1}, {&(0x7f00000004c0)="d8e1a3205d9a5d807c5624cebeff032c14dc2a62a3cf653abd3d65d760b04b2a6d9041ca64c1845281cd99aee400d787055fdeab4d6ab61a4dabb216011bc92d8d6ea706dae7d9f94e4c20843d810e7ab00b58677bbe3c3ab35484162b022aca0cf4a0135fc5e62f9ff75e959c677bfe4e8075fd2c03cbd66cdbf71bb13d04ebad933ffc04faf3bc6dd73ba6cd980288d0f281f8eee9bb9289713976def439474d625a48a40bef1817747857adbd17b8d62125a8d213cf5ce0aba79eb818f0d3bb3339cc3b7cc8bb193c81a4797277bfe3c340e56ac7f9dc179e41b78a5a09536d1c2b224dbb17f17ae2577ab3fc687691e20c", 0xf3}], 0x6) r5 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) r8 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r9, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r8, 0x84, 0xe, &(0x7f0000000300)={r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) getsockopt$inet_sctp_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000000300)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {r10, @in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0xfffffffc}}, &(0x7f0000000080)=0xb0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0x8, 0x8000, 0x1, 0x80, r7}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f00000006c0)={r7, @in6={{0xa, 0x4e21, 0x1, @rand_addr="f24f322f62af56e4a714c43718621f7b", 0x45}}}, &(0x7f0000000480)=0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000005c0)={r11, 0xf10eb600}, &(0x7f0000000600)=0x8) write$binfmt_elf64(r2, &(0x7f0000000640)=ANY=[@ANYBLOB="76544c410601019fa5d4b3000000fec00c7f0d74aa0ea7be09cf895a5744e1e83e1e82098000576a70efb1760b6ac8d193abb2e74f919abfc4925adcdc2aaf42b1033ae16faf0301f83839aaa8b63a3e5b4971"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:33 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x2, &(0x7f0000000000)) [ 1310.608138][T22125] FAULT_INJECTION: forcing a failure. [ 1310.608138][T22125] name failslab, interval 1, probability 0, space 0, times 0 [ 1310.627301][T22125] CPU: 1 PID: 22125 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1310.635234][T22125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1310.645315][T22125] Call Trace: [ 1310.648608][T22125] dump_stack+0x1d8/0x2f8 [ 1310.652939][T22125] should_fail+0x555/0x770 [ 1310.657358][T22125] __should_failslab+0x11a/0x160 [ 1310.662376][T22125] ? __kernfs_new_node+0x97/0x6b0 [ 1310.667396][T22125] should_failslab+0x9/0x20 [ 1310.671889][T22125] kmem_cache_alloc+0x56/0x2e0 [ 1310.676653][T22125] __kernfs_new_node+0x97/0x6b0 [ 1310.681493][T22125] ? mutex_unlock+0xd/0x10 [ 1310.685931][T22125] ? kernfs_activate+0x4c7/0x4e0 [ 1310.690871][T22125] kernfs_new_node+0x97/0x170 [ 1310.695544][T22125] __kernfs_create_file+0x4a/0x2f0 [ 1310.700652][T22125] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1310.706022][T22125] internal_create_group+0x4be/0xd80 [ 1310.711311][T22125] sysfs_create_group+0x1f/0x30 [ 1310.716152][T22125] loop_set_fd+0xf54/0x1470 [ 1310.720662][T22125] lo_ioctl+0xd5/0x2200 [ 1310.724803][T22125] ? __kasan_slab_free+0x12a/0x1e0 [ 1310.729900][T22125] ? kasan_slab_free+0xe/0x10 [ 1310.734571][T22125] ? kfree+0x115/0x200 [ 1310.738637][T22125] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1310.744257][T22125] ? tomoyo_file_ioctl+0x23/0x30 [ 1310.749181][T22125] ? security_file_ioctl+0x6d/0xd0 [ 1310.754280][T22125] ? __x64_sys_ioctl+0xa3/0x120 [ 1310.759207][T22125] ? do_syscall_64+0xf7/0x1c0 [ 1310.763872][T22125] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1310.769938][T22125] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1310.775752][T22125] ? rcu_lock_release+0x9/0x30 [ 1310.780515][T22125] ? rcu_lock_release+0x9/0x30 [ 1310.785277][T22125] ? lo_release+0x1f0/0x1f0 [ 1310.789770][T22125] blkdev_ioctl+0x807/0x2980 [ 1310.794353][T22125] ? tomoyo_path_number_perm+0x53e/0x640 [ 1310.800001][T22125] block_ioctl+0xbd/0x100 [ 1310.804319][T22125] ? blkdev_iopoll+0x100/0x100 [ 1310.809071][T22125] do_vfs_ioctl+0x744/0x1730 [ 1310.813652][T22125] ? __fget+0x411/0x510 [ 1310.817802][T22125] ? tomoyo_file_ioctl+0x23/0x30 [ 1310.822746][T22125] ? security_file_ioctl+0xa1/0xd0 [ 1310.827872][T22125] __x64_sys_ioctl+0xe3/0x120 [ 1310.832569][T22125] do_syscall_64+0xf7/0x1c0 [ 1310.837075][T22125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1310.842953][T22125] RIP: 0033:0x459da7 [ 1310.846835][T22125] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1310.866430][T22125] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1310.874830][T22125] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1310.882879][T22125] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1310.890846][T22125] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1310.898805][T22125] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1310.906768][T22125] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:34 executing program 0 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:34 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x10, &(0x7f0000000000)) 02:13:34 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl%s\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1311.195379][T22270] FAULT_INJECTION: forcing a failure. [ 1311.195379][T22270] name failslab, interval 1, probability 0, space 0, times 0 [ 1311.227085][T22270] CPU: 0 PID: 22270 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1311.235142][T22270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1311.245202][T22270] Call Trace: [ 1311.248504][T22270] dump_stack+0x1d8/0x2f8 [ 1311.252845][T22270] should_fail+0x555/0x770 [ 1311.257280][T22270] __should_failslab+0x11a/0x160 [ 1311.262231][T22270] ? __kernfs_new_node+0x97/0x6b0 [ 1311.267259][T22270] should_failslab+0x9/0x20 [ 1311.271762][T22270] kmem_cache_alloc+0x56/0x2e0 [ 1311.276529][T22270] __kernfs_new_node+0x97/0x6b0 [ 1311.281388][T22270] ? mutex_unlock+0xd/0x10 [ 1311.285799][T22270] ? kernfs_activate+0x4c7/0x4e0 [ 1311.290742][T22270] kernfs_new_node+0x97/0x170 [ 1311.295421][T22270] __kernfs_create_file+0x4a/0x2f0 [ 1311.300561][T22270] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1311.306055][T22270] internal_create_group+0x4be/0xd80 [ 1311.311356][T22270] sysfs_create_group+0x1f/0x30 [ 1311.316225][T22270] loop_set_fd+0xf54/0x1470 [ 1311.320743][T22270] lo_ioctl+0xd5/0x2200 [ 1311.324893][T22270] ? __kasan_slab_free+0x12a/0x1e0 [ 1311.329998][T22270] ? kasan_slab_free+0xe/0x10 [ 1311.334669][T22270] ? kfree+0x115/0x200 [ 1311.338729][T22270] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1311.344352][T22270] ? tomoyo_file_ioctl+0x23/0x30 [ 1311.349298][T22270] ? security_file_ioctl+0x6d/0xd0 [ 1311.354420][T22270] ? __x64_sys_ioctl+0xa3/0x120 [ 1311.359267][T22270] ? do_syscall_64+0xf7/0x1c0 [ 1311.363936][T22270] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1311.370116][T22270] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1311.375857][T22270] ? rcu_lock_release+0x9/0x30 [ 1311.380626][T22270] ? rcu_lock_release+0x9/0x30 [ 1311.385385][T22270] ? lo_release+0x1f0/0x1f0 [ 1311.389887][T22270] blkdev_ioctl+0x807/0x2980 [ 1311.394473][T22270] ? tomoyo_path_number_perm+0x53e/0x640 [ 1311.400648][T22270] block_ioctl+0xbd/0x100 [ 1311.404973][T22270] ? blkdev_iopoll+0x100/0x100 [ 1311.409737][T22270] do_vfs_ioctl+0x744/0x1730 [ 1311.414328][T22270] ? __fget+0x411/0x510 [ 1311.418487][T22270] ? tomoyo_file_ioctl+0x23/0x30 [ 1311.423537][T22270] ? security_file_ioctl+0xa1/0xd0 [ 1311.428648][T22270] __x64_sys_ioctl+0xe3/0x120 [ 1311.433431][T22270] do_syscall_64+0xf7/0x1c0 [ 1311.437934][T22270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1311.443825][T22270] RIP: 0033:0x459da7 [ 1311.447717][T22270] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1311.467345][T22270] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1311.475754][T22270] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1311.483728][T22270] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 02:13:34 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0xe) 02:13:34 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4c01, &(0x7f0000000000)) [ 1311.491724][T22270] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1311.499696][T22270] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1311.507666][T22270] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:34 executing program 0 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:35 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x5421, &(0x7f0000000000)) [ 1311.835201][T22477] FAULT_INJECTION: forcing a failure. [ 1311.835201][T22477] name failslab, interval 1, probability 0, space 0, times 0 [ 1311.876459][T22477] CPU: 0 PID: 22477 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1311.884407][T22477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1311.894474][T22477] Call Trace: [ 1311.897771][T22477] dump_stack+0x1d8/0x2f8 [ 1311.902103][T22477] should_fail+0x555/0x770 [ 1311.906523][T22477] __should_failslab+0x11a/0x160 [ 1311.911462][T22477] ? __kernfs_new_node+0x97/0x6b0 [ 1311.916493][T22477] should_failslab+0x9/0x20 [ 1311.920999][T22477] kmem_cache_alloc+0x56/0x2e0 [ 1311.925764][T22477] __kernfs_new_node+0x97/0x6b0 [ 1311.930636][T22477] ? mutex_unlock+0xd/0x10 [ 1311.935050][T22477] ? kernfs_activate+0x4c7/0x4e0 [ 1311.939991][T22477] kernfs_new_node+0x97/0x170 [ 1311.944669][T22477] __kernfs_create_file+0x4a/0x2f0 [ 1311.949779][T22477] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1311.955151][T22477] internal_create_group+0x4be/0xd80 [ 1311.960440][T22477] sysfs_create_group+0x1f/0x30 [ 1311.965282][T22477] loop_set_fd+0xf54/0x1470 [ 1311.969796][T22477] lo_ioctl+0xd5/0x2200 [ 1311.973944][T22477] ? __kasan_slab_free+0x12a/0x1e0 [ 1311.979053][T22477] ? kasan_slab_free+0xe/0x10 [ 1311.983720][T22477] ? kfree+0x115/0x200 [ 1311.987781][T22477] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1311.993410][T22477] ? tomoyo_file_ioctl+0x23/0x30 [ 1311.998339][T22477] ? security_file_ioctl+0x6d/0xd0 [ 1312.003444][T22477] ? __x64_sys_ioctl+0xa3/0x120 [ 1312.008288][T22477] ? do_syscall_64+0xf7/0x1c0 [ 1312.012959][T22477] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1312.019030][T22477] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1312.024768][T22477] ? rcu_lock_release+0x9/0x30 [ 1312.029534][T22477] ? rcu_lock_release+0x9/0x30 [ 1312.034294][T22477] ? lo_release+0x1f0/0x1f0 [ 1312.038962][T22477] blkdev_ioctl+0x807/0x2980 [ 1312.043549][T22477] ? tomoyo_path_number_perm+0x53e/0x640 [ 1312.049198][T22477] block_ioctl+0xbd/0x100 [ 1312.053517][T22477] ? blkdev_iopoll+0x100/0x100 [ 1312.058321][T22477] do_vfs_ioctl+0x744/0x1730 [ 1312.062902][T22477] ? __fget+0x411/0x510 [ 1312.067060][T22477] ? tomoyo_file_ioctl+0x23/0x30 [ 1312.071987][T22477] ? security_file_ioctl+0xa1/0xd0 [ 1312.077108][T22477] __x64_sys_ioctl+0xe3/0x120 [ 1312.081780][T22477] do_syscall_64+0xf7/0x1c0 [ 1312.086278][T22477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1312.092159][T22477] RIP: 0033:0x459da7 [ 1312.096049][T22477] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1312.115642][T22477] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 02:13:35 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x144c) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r3, 0x0, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 02:13:35 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x5450, &(0x7f0000000000)) 02:13:35 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl*s\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1312.124047][T22477] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1312.132017][T22477] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1312.139985][T22477] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1312.147947][T22477] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1312.155910][T22477] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:35 executing program 0 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r3, 0x0, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd6e) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) splice(r4, 0x0, r2, 0x0, 0x800080004001, 0x1) 02:13:35 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x5451, &(0x7f0000000000)) [ 1312.373953][T22700] FAULT_INJECTION: forcing a failure. [ 1312.373953][T22700] name failslab, interval 1, probability 0, space 0, times 0 [ 1312.399772][T22700] CPU: 1 PID: 22700 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1312.407695][T22700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1312.417751][T22700] Call Trace: 02:13:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btr\\s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1312.421052][T22700] dump_stack+0x1d8/0x2f8 [ 1312.425379][T22700] should_fail+0x555/0x770 [ 1312.429801][T22700] __should_failslab+0x11a/0x160 [ 1312.434744][T22700] ? __kernfs_new_node+0x97/0x6b0 [ 1312.439762][T22700] should_failslab+0x9/0x20 [ 1312.444255][T22700] kmem_cache_alloc+0x56/0x2e0 [ 1312.449022][T22700] __kernfs_new_node+0x97/0x6b0 [ 1312.453873][T22700] ? mutex_unlock+0xd/0x10 [ 1312.458287][T22700] ? kernfs_activate+0x4c7/0x4e0 [ 1312.463220][T22700] kernfs_new_node+0x97/0x170 [ 1312.467895][T22700] __kernfs_create_file+0x4a/0x2f0 [ 1312.473005][T22700] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1312.478371][T22700] internal_create_group+0x4be/0xd80 [ 1312.483855][T22700] sysfs_create_group+0x1f/0x30 [ 1312.488713][T22700] loop_set_fd+0xf54/0x1470 [ 1312.493221][T22700] lo_ioctl+0xd5/0x2200 [ 1312.497370][T22700] ? __kasan_slab_free+0x12a/0x1e0 [ 1312.502471][T22700] ? kasan_slab_free+0xe/0x10 [ 1312.507142][T22700] ? kfree+0x115/0x200 [ 1312.511205][T22700] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1312.516825][T22700] ? tomoyo_file_ioctl+0x23/0x30 [ 1312.521754][T22700] ? security_file_ioctl+0x6d/0xd0 [ 1312.526963][T22700] ? __x64_sys_ioctl+0xa3/0x120 [ 1312.531805][T22700] ? do_syscall_64+0xf7/0x1c0 [ 1312.536472][T22700] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1312.542550][T22700] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1312.548284][T22700] ? rcu_lock_release+0x9/0x30 [ 1312.553051][T22700] ? rcu_lock_release+0x9/0x30 [ 1312.557810][T22700] ? lo_release+0x1f0/0x1f0 [ 1312.562304][T22700] blkdev_ioctl+0x807/0x2980 [ 1312.566890][T22700] ? tomoyo_path_number_perm+0x53e/0x640 [ 1312.572541][T22700] block_ioctl+0xbd/0x100 [ 1312.576863][T22700] ? blkdev_iopoll+0x100/0x100 [ 1312.581620][T22700] do_vfs_ioctl+0x744/0x1730 [ 1312.586200][T22700] ? __fget+0x411/0x510 [ 1312.590352][T22700] ? tomoyo_file_ioctl+0x23/0x30 [ 1312.595283][T22700] ? security_file_ioctl+0xa1/0xd0 [ 1312.600386][T22700] __x64_sys_ioctl+0xe3/0x120 [ 1312.605146][T22700] do_syscall_64+0xf7/0x1c0 [ 1312.609731][T22700] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1312.615612][T22700] RIP: 0033:0x459da7 [ 1312.619501][T22700] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1312.639094][T22700] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1312.647499][T22700] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1312.655461][T22700] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1312.663423][T22700] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 02:13:35 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0xf) 02:13:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) getsockopt$netrom_NETROM_N2(r7, 0x103, 0x3, &(0x7f0000000080)=0x7, &(0x7f0000000180)=0x4) writev(r2, &(0x7f0000000200)=[{&(0x7f0000000040)="1193aaffff1300dc", 0x7}], 0x100000000000010d) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1312.671383][T22700] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1312.679344][T22700] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:36 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x5452, &(0x7f0000000000)) [ 1312.791415][T22822] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:36 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl+s\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:36 executing program 0 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:36 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x5460, &(0x7f0000000000)) 02:13:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrf\n\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="7f0b307cdf9178f4ee731b5f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1313.097575][T22944] FAULT_INJECTION: forcing a failure. [ 1313.097575][T22944] name failslab, interval 1, probability 0, space 0, times 0 [ 1313.119170][T22944] CPU: 1 PID: 22944 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1313.127082][T22944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1313.137124][T22944] Call Trace: [ 1313.140409][T22944] dump_stack+0x1d8/0x2f8 [ 1313.144732][T22944] should_fail+0x555/0x770 [ 1313.149149][T22944] __should_failslab+0x11a/0x160 [ 1313.154083][T22944] should_failslab+0x9/0x20 [ 1313.158577][T22944] kmem_cache_alloc_node+0x65/0x280 [ 1313.163765][T22944] ? __alloc_skb+0x9f/0x500 [ 1313.168262][T22944] __alloc_skb+0x9f/0x500 [ 1313.172594][T22944] alloc_uevent_skb+0x7f/0x230 [ 1313.177356][T22944] kobject_uevent_env+0xcbc/0x1260 [ 1313.182471][T22944] kobject_uevent+0x1f/0x30 [ 1313.186961][T22944] loop_set_fd+0xfc3/0x1470 [ 1313.191473][T22944] lo_ioctl+0xd5/0x2200 [ 1313.195615][T22944] ? __kasan_slab_free+0x12a/0x1e0 [ 1313.200711][T22944] ? kasan_slab_free+0xe/0x10 [ 1313.205393][T22944] ? kfree+0x115/0x200 [ 1313.209541][T22944] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1313.215160][T22944] ? tomoyo_file_ioctl+0x23/0x30 [ 1313.220083][T22944] ? security_file_ioctl+0x6d/0xd0 [ 1313.225181][T22944] ? __x64_sys_ioctl+0xa3/0x120 [ 1313.230020][T22944] ? do_syscall_64+0xf7/0x1c0 [ 1313.234697][T22944] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1313.240757][T22944] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1313.246487][T22944] ? rcu_lock_release+0x9/0x30 [ 1313.251245][T22944] ? rcu_lock_release+0x9/0x30 [ 1313.255999][T22944] ? lo_release+0x1f0/0x1f0 [ 1313.260493][T22944] blkdev_ioctl+0x807/0x2980 [ 1313.265078][T22944] ? tomoyo_path_number_perm+0x53e/0x640 [ 1313.270744][T22944] block_ioctl+0xbd/0x100 [ 1313.275160][T22944] ? blkdev_iopoll+0x100/0x100 [ 1313.279921][T22944] do_vfs_ioctl+0x744/0x1730 [ 1313.284499][T22944] ? __fget+0x411/0x510 [ 1313.288650][T22944] ? tomoyo_file_ioctl+0x23/0x30 [ 1313.293577][T22944] ? security_file_ioctl+0xa1/0xd0 [ 1313.298677][T22944] __x64_sys_ioctl+0xe3/0x120 [ 1313.303344][T22944] do_syscall_64+0xf7/0x1c0 [ 1313.307838][T22944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1313.313802][T22944] RIP: 0033:0x459da7 [ 1313.317685][T22944] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1313.337276][T22944] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 02:13:36 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl-s\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1313.345682][T22944] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1313.353657][T22944] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1313.361613][T22944] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1313.369571][T22944] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1313.377530][T22944] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:36 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x6364, &(0x7f0000000000)) 02:13:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r6, 0x0, r5) writev(r6, &(0x7f0000000200)=[{&(0x7f0000000080)="001bdf0c2f719234e0881c088a932f69169773fd959bd5aaf85cea1e8ab169c1af2abddf4e9865f2eb39bc7d", 0xcf}], 0x1) preadv(r1, &(0x7f0000000500)=[{&(0x7f0000000240)=""/141, 0x8d}, {&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000680)=""/11, 0xb}, {&(0x7f00000005c0)=""/147, 0x93}, {&(0x7f0000000400)=""/109, 0x6d}, {&(0x7f00000004c0)}], 0x6, 0x0) r7 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) fallocate(r7, 0x8, 0x9dc2, 0x5) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r8) setsockopt$IP_VS_SO_SET_ADD(r10, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000580)={&(0x7f00000004c0)='./file0\x00', r10}, 0x10) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0xc) 02:13:36 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x10) 02:13:36 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x8933, &(0x7f0000000000)) 02:13:36 executing program 0 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:37 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl.s\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1313.701256][T23174] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1313.752096][T23200] FAULT_INJECTION: forcing a failure. [ 1313.752096][T23200] name failslab, interval 1, probability 0, space 0, times 0 [ 1313.807204][T23200] CPU: 0 PID: 23200 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1313.815146][T23200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1313.825343][T23200] Call Trace: [ 1313.828632][T23200] dump_stack+0x1d8/0x2f8 [ 1313.832978][T23200] should_fail+0x555/0x770 [ 1313.837400][T23200] __should_failslab+0x11a/0x160 [ 1313.842334][T23200] should_failslab+0x9/0x20 [ 1313.846912][T23200] kmem_cache_alloc_node+0x65/0x280 [ 1313.852103][T23200] ? __alloc_skb+0x9f/0x500 [ 1313.856602][T23200] __alloc_skb+0x9f/0x500 [ 1313.860962][T23200] alloc_uevent_skb+0x7f/0x230 [ 1313.865809][T23200] kobject_uevent_env+0xcbc/0x1260 [ 1313.870927][T23200] kobject_uevent+0x1f/0x30 [ 1313.875421][T23200] loop_set_fd+0xfc3/0x1470 [ 1313.879937][T23200] lo_ioctl+0xd5/0x2200 [ 1313.884075][T23200] ? __kasan_slab_free+0x12a/0x1e0 [ 1313.889174][T23200] ? kasan_slab_free+0xe/0x10 [ 1313.893837][T23200] ? kfree+0x115/0x200 [ 1313.897894][T23200] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1313.903515][T23200] ? tomoyo_file_ioctl+0x23/0x30 [ 1313.908446][T23200] ? security_file_ioctl+0x6d/0xd0 [ 1313.913565][T23200] ? __x64_sys_ioctl+0xa3/0x120 [ 1313.918492][T23200] ? do_syscall_64+0xf7/0x1c0 [ 1313.923152][T23200] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1313.929214][T23200] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1313.934937][T23200] ? rcu_lock_release+0x9/0x30 [ 1313.939700][T23200] ? rcu_lock_release+0x9/0x30 [ 1313.944471][T23200] ? lo_release+0x1f0/0x1f0 [ 1313.948966][T23200] blkdev_ioctl+0x807/0x2980 [ 1313.953633][T23200] ? tomoyo_path_number_perm+0x53e/0x640 [ 1313.959271][T23200] block_ioctl+0xbd/0x100 [ 1313.963588][T23200] ? blkdev_iopoll+0x100/0x100 [ 1313.968344][T23200] do_vfs_ioctl+0x744/0x1730 [ 1313.972921][T23200] ? __fget+0x411/0x510 [ 1313.977069][T23200] ? tomoyo_file_ioctl+0x23/0x30 [ 1313.981998][T23200] ? security_file_ioctl+0xa1/0xd0 [ 1313.987099][T23200] __x64_sys_ioctl+0xe3/0x120 [ 1313.991766][T23200] do_syscall_64+0xf7/0x1c0 [ 1313.996261][T23200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1314.002140][T23200] RIP: 0033:0x459da7 [ 1314.006025][T23200] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1314.025616][T23200] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1314.034028][T23200] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1314.041991][T23200] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1314.049945][T23200] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 02:13:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008910, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:37 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0xaf01, &(0x7f0000000000)) [ 1314.057906][T23200] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1314.065875][T23200] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000000240)={0x5, 0x80000000, 0x2, 0x804, 0x5, [{0x3, 0x7dca, 0x0, 0x0, 0x0, 0x4}, {0x5, 0x6, 0x3, 0x0, 0x0, 0x400}, {0x1, 0x4, 0x1, 0x0, 0x0, 0x2}, {0x8, 0x4000007fffffff, 0x7, 0x0, 0x0, 0x5711d00983214886}, {0xfffffffffffffe01, 0x3, 0x8, 0x0, 0x0, 0x2009}]}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:37 executing program 0 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:37 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0xaf02, &(0x7f0000000000)) 02:13:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x5) [ 1314.387725][T23407] FAULT_INJECTION: forcing a failure. [ 1314.387725][T23407] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1314.401048][T23407] CPU: 1 PID: 23407 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1314.408929][T23407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1314.418976][T23407] Call Trace: [ 1314.422271][T23407] dump_stack+0x1d8/0x2f8 [ 1314.426604][T23407] should_fail+0x555/0x770 [ 1314.431033][T23407] should_fail_alloc_page+0x55/0x60 [ 1314.436220][T23407] prepare_alloc_pages+0x283/0x460 [ 1314.441329][T23407] __alloc_pages_nodemask+0xb2/0x5d0 [ 1314.446636][T23407] kmem_getpages+0x4d/0xa00 [ 1314.451136][T23407] cache_grow_begin+0x7e/0x2c0 [ 1314.455897][T23407] cache_alloc_refill+0x311/0x3f0 [ 1314.460917][T23407] ? check_preemption_disabled+0xb7/0x2a0 [ 1314.466637][T23407] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 1314.471997][T23407] ? kobject_uevent_env+0x2cd/0x1260 [ 1314.477271][T23407] ? dev_uevent_filter+0xb0/0xb0 [ 1314.482223][T23407] kobject_uevent_env+0x2cd/0x1260 [ 1314.487338][T23407] kobject_uevent+0x1f/0x30 [ 1314.491834][T23407] loop_set_fd+0xfc3/0x1470 [ 1314.496341][T23407] lo_ioctl+0xd5/0x2200 [ 1314.500488][T23407] ? __kasan_slab_free+0x12a/0x1e0 [ 1314.505585][T23407] ? kasan_slab_free+0xe/0x10 [ 1314.510265][T23407] ? kfree+0x115/0x200 [ 1314.514319][T23407] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1314.519941][T23407] ? tomoyo_file_ioctl+0x23/0x30 [ 1314.524863][T23407] ? security_file_ioctl+0x6d/0xd0 [ 1314.529963][T23407] ? __x64_sys_ioctl+0xa3/0x120 [ 1314.534803][T23407] ? do_syscall_64+0xf7/0x1c0 [ 1314.539472][T23407] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1314.545533][T23407] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1314.551258][T23407] ? rcu_lock_release+0x9/0x30 [ 1314.556017][T23407] ? rcu_lock_release+0x9/0x30 [ 1314.560786][T23407] ? lo_release+0x1f0/0x1f0 [ 1314.565367][T23407] blkdev_ioctl+0x807/0x2980 [ 1314.569954][T23407] ? tomoyo_path_number_perm+0x53e/0x640 [ 1314.575595][T23407] block_ioctl+0xbd/0x100 [ 1314.579914][T23407] ? blkdev_iopoll+0x100/0x100 [ 1314.584669][T23407] do_vfs_ioctl+0x744/0x1730 [ 1314.589249][T23407] ? __fget+0x411/0x510 [ 1314.593398][T23407] ? tomoyo_file_ioctl+0x23/0x30 [ 1314.598322][T23407] ? security_file_ioctl+0xa1/0xd0 [ 1314.603430][T23407] __x64_sys_ioctl+0xe3/0x120 [ 1314.608098][T23407] do_syscall_64+0xf7/0x1c0 [ 1314.612596][T23407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1314.618476][T23407] RIP: 0033:0x459da7 [ 1314.622375][T23407] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1314.642093][T23407] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1314.650495][T23407] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 [ 1314.658459][T23407] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1314.666420][T23407] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1314.674382][T23407] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 02:13:37 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl0s\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1314.682343][T23407] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:38 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x11) 02:13:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) ioctl$sock_netrom_SIOCDELRT(r7, 0x890c, &(0x7f0000000040)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x0, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x2, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) recvmsg$kcm(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000180)=""/34, 0x22}, {&(0x7f0000000240)=""/175, 0xaf}, {&(0x7f0000000300)=""/65, 0x41}, {&(0x7f0000000380)=""/206, 0xce}, {&(0x7f00000001c0)=""/64, 0x40}, {&(0x7f00000004c0)=""/106, 0x6a}, {&(0x7f0000000540)=""/173, 0xad}, {&(0x7f0000000600)=""/173, 0xad}], 0x8}, 0x0) 02:13:38 executing program 0 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:38 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x40042408, &(0x7f0000000000)) 02:13:38 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplLs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1314.987642][T23528] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1315.001194][T23533] FAULT_INJECTION: forcing a failure. [ 1315.001194][T23533] name failslab, interval 1, probability 0, space 0, times 0 [ 1315.039049][T23528] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1315.057482][T23533] CPU: 1 PID: 23533 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1315.065402][T23533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1315.075455][T23533] Call Trace: [ 1315.078749][T23533] dump_stack+0x1d8/0x2f8 [ 1315.083083][T23533] should_fail+0x555/0x770 [ 1315.087506][T23533] __should_failslab+0x11a/0x160 [ 1315.092440][T23533] ? kzalloc+0x26/0x40 [ 1315.096511][T23533] should_failslab+0x9/0x20 [ 1315.101004][T23533] __kmalloc+0x7a/0x340 [ 1315.105158][T23533] kzalloc+0x26/0x40 [ 1315.109041][T23533] kobject_get_path+0xa7/0x1d0 [ 1315.113801][T23533] kobject_uevent_env+0x2f2/0x1260 [ 1315.118914][T23533] kobject_uevent+0x1f/0x30 [ 1315.123419][T23533] loop_set_fd+0xfc3/0x1470 [ 1315.127927][T23533] lo_ioctl+0xd5/0x2200 [ 1315.132070][T23533] ? __kasan_slab_free+0x12a/0x1e0 [ 1315.137188][T23533] ? kasan_slab_free+0xe/0x10 [ 1315.141858][T23533] ? kfree+0x115/0x200 [ 1315.145916][T23533] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1315.151535][T23533] ? tomoyo_file_ioctl+0x23/0x30 [ 1315.156458][T23533] ? security_file_ioctl+0x6d/0xd0 [ 1315.161554][T23533] ? __x64_sys_ioctl+0xa3/0x120 [ 1315.166396][T23533] ? do_syscall_64+0xf7/0x1c0 [ 1315.171060][T23533] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1315.177119][T23533] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1315.182844][T23533] ? rcu_lock_release+0x9/0x30 [ 1315.187612][T23533] ? rcu_lock_release+0x9/0x30 [ 1315.192369][T23533] ? lo_release+0x1f0/0x1f0 [ 1315.196864][T23533] blkdev_ioctl+0x807/0x2980 [ 1315.201446][T23533] ? tomoyo_path_number_perm+0x53e/0x640 [ 1315.207090][T23533] block_ioctl+0xbd/0x100 [ 1315.211408][T23533] ? blkdev_iopoll+0x100/0x100 [ 1315.216161][T23533] do_vfs_ioctl+0x744/0x1730 [ 1315.220740][T23533] ? __fget+0x411/0x510 [ 1315.224908][T23533] ? tomoyo_file_ioctl+0x23/0x30 [ 1315.229839][T23533] ? security_file_ioctl+0xa1/0xd0 [ 1315.234951][T23533] __x64_sys_ioctl+0xe3/0x120 [ 1315.239623][T23533] do_syscall_64+0xf7/0x1c0 [ 1315.244119][T23533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1315.250000][T23533] RIP: 0033:0x459da7 [ 1315.253886][T23533] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1315.273477][T23533] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1315.281876][T23533] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459da7 02:13:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r5 = dup2(r0, 0xffffffffffffffff) sendmsg$rds(r5, &(0x7f00000009c0)={&(0x7f00000001c0)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000240)=""/59, 0x3b}], 0x1, &(0x7f0000000740)=[@fadd={0x58, 0x114, 0x6, {{0x2, 0x7}, &(0x7f00000002c0)=0x80000000, &(0x7f0000000300)=0x80000001, 0x9bdb, 0x1e800000000000, 0x800, 0x9, 0x0, 0xd3}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000340)=""/157, 0x9d}, &(0x7f0000000400), 0x6d}}, @cswp={0x58, 0x114, 0x7, {{0x5, 0x7fff}, &(0x7f0000000440)=0x80, &(0x7f00000004c0), 0x4, 0x3, 0xd71, 0x0, 0x0, 0x3}}, @mask_fadd={0x58, 0x114, 0x8, {{0x9, 0x3}, &(0x7f0000000500)=0x2, &(0x7f0000000540)=0xf42, 0x1f, 0x9, 0x7, 0x10000, 0x2, 0x3}}, @rdma_dest={0x18, 0x114, 0x2, {0x0, 0x9}}, @fadd={0x58, 0x114, 0x6, {{0x6, 0x401}, &(0x7f0000000580)=0x4, &(0x7f00000005c0)=0xaca9, 0x3, 0x100000000, 0x101, 0xffffffffdbca943d, 0x20}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000600)=""/84, 0x54}, &(0x7f0000000680), 0x10}}, @zcopy_cookie={0x18, 0x114, 0xc, 0xcfc8}, @cswp={0x58, 0x114, 0x7, {{0xfffffffc, 0xa3}, &(0x7f00000006c0)=0x5, &(0x7f0000000700)=0x6, 0x2, 0xe35, 0x3, 0x1000, 0x4, 0xffffffff7fffffff}}], 0x248, 0x24040814}, 0xa3a6520f552753ec) write$binfmt_elf64(r4, 0x0, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x100000000, 0x101000) fgetxattr(r6, &(0x7f0000000080)=@random={'btrfs.', 'lovboxnet1vboxnet1selinux\x00'}, &(0x7f0000000b40)=""/71, 0x47) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="773ce77da7"], 0xe) pipe(&(0x7f0000000180)) close(r3) socket$netlink(0x10, 0x3, 0x4) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000e40)=@urb_type_iso={0x0, {0xf, 0x1}, 0xe5, 0xe5, &(0x7f0000000c80)="72d661e3e91c9e1fc08265ee11db649f3d9e9ac9b11e8ac177048e34c631d1924008863f2d7d5dc3a4a39e10a512d21ba77f62b1d812d9982c3d83cd38b6a13e56b9a7a2daaee346081b3273d2dcbd4f16116b3b242002e2d8868bff4918acbda9033ec72d16bdfda51405bbb492534025b9b7a5b7626b6ae94394232fa971cea73c62ada0601fae6aa0a6b3771015b4edd292eb03b772707b7f74ff7a8bcfa4360dc73bcaeb0f47cc97629a764e44661953fc3c9169a66596ec36e0b582d8beb3", 0xc1, 0x1, 0x8, 0x44, 0x899, 0x1, &(0x7f0000000d80)="778f609cc373df15ccfeabc0cdb0a7c3342b098c6d663b0e4505bc61452901c8f86635facca09d3b7fa40738d8826a3e50779931711133394bdf96c1d6755d482559cd942672d5f99d918c0f3a692371eb86cdf7fb9d86859a02bcf0f8174bfdeb3afa478e301a1c416a65f014737988ead70640947e0209c6f4601f55c1beedb5d38728c2dceccf588844c2269b1c9e94b121829039c6fcab6c5b87bc7f342c3c49a87062df917a6734", [{0x687, 0x63e, 0x1}, {0x2, 0x7, 0x3}, {0x5, 0x1, 0xf7}, {0x3, 0x1003, 0x9}, {0x5, 0x20, 0x6}, {0x40, 0x5, 0x5}, {0xdf, 0x800, 0x101}, {0x6, 0x37f6}, {0xffffffe0, 0x401, 0x3}, {0x3ff, 0xfff, 0x7fff}, {0x3, 0x7, 0x76}, {0x6e, 0xa00000, 0x9}, {0x5, 0x4, 0x8000}, {0x3, 0x3ff, 0x8}, {0x7, 0x5, 0x10001}, {0x7b4, 0x10000, 0x55}, {0x6, 0x3, 0x9214}, {0x1, 0x7, 0x81}, {0x6, 0x0, 0x37d}, {0x9, 0x3}, {0xfffffffb, 0xa0fc, 0x81}, {0x0, 0xfffffffb, 0xa3}, {0x1, 0x1f, 0x8}, {0x9, 0x101, 0x383789}, {0x7, 0x1a933215, 0x7}, {0x8001, 0x0, 0x100}, {0xb9d7, 0x9f, 0x80000000}, {0x2, 0x9, 0x2}, {0x5, 0x9, 0x7}, {0x4, 0x7, 0x991}, {0x200, 0x0, 0xc1}, {0x4}, {0x5, 0x7f, 0x1ff}, {0x7fffffff, 0x1e8f93d6, 0x1}, {0x5, 0x1000, 0x84}, {0x3, 0x10000}, {0x0, 0xd8, 0x1}, {0x0, 0x87, 0x4}, {0x400, 0x8001, 0x2}, {0x4, 0x8, 0xe0b7}, {0x800005, 0x7f, 0x5}, {0x4, 0x2, 0x1f}, {0x3, 0x10000, 0x1000}, {0x1f, 0x0, 0x2}, {0x3, 0x3, 0xfffffff8}, {0x3, 0x1, 0x7fff}, {0x10000, 0x4, 0xff}, {0xaa3c, 0x7, 0x7}, {0x8001, 0x2, 0x1ff}, {0x8, 0x10001, 0x4}, {0x2, 0xfffff7f0, 0x1}, {0x3, 0x0, 0x9}, {0xc1, 0x5}, {0xa2, 0x7, 0x6990}, {0x3, 0x8001, 0x7}, {0x8000, 0xc717, 0x1}, {0x3ff, 0xaf37, 0x200}, {0x82, 0x0, 0x7}, {0x5, 0x45b8, 0x7ff}, {0xadd4, 0x7ff, 0x1}, {0x9, 0x746, 0x100}, {0x10001, 0x80, 0x567}, {0x1ff, 0x200, 0xb524}, {0x2a, 0x7ff, 0x5}, {0x3, 0x8, 0x8}, {0x8, 0x5, 0x7fffffff}, {0x80, 0x18, 0x1c00}, {0xeebe, 0x3, 0x8}]}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KVM_SET_XCRS(r9, 0x4188aea7, &(0x7f0000000bc0)={0x9, 0x7, [{0x5, 0x0, 0x4}, {0x7f, 0x0, 0x7fffffff}, {0x10000000, 0x0, 0xe7cc}, {0x5, 0x0, 0x317e}, {0x1, 0x0, 0x3f6a}, {0x0, 0x0, 0x1ff}, {0x80000000, 0x0, 0x3}, {0x2}, {0x7, 0x0, 0x5}]}) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = socket$inet6(0xa, 0x2, 0x0) r12 = fcntl$dupfd(r11, 0x0, r10) setsockopt$IP_VS_SO_SET_ADD(r12, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) write$smack_current(0xffffffffffffffff, &(0x7f00000011c0)='btrfs.', 0x6) ioctl$KVM_SET_SREGS(r12, 0x4138ae84, &(0x7f0000000a00)={{0x1000, 0x10004, 0xa, 0x1, 0x8, 0x1, 0x34, 0x39, 0x4, 0xb7, 0x3f, 0x2}, {0x1000, 0x1, 0xb, 0x8a, 0x80, 0x40, 0x59, 0x1, 0x0, 0x3f, 0x80}, {0x6, 0x3000, 0xe5b031f3f709cd6d, 0x59, 0x1, 0x20, 0x1, 0x80, 0x1, 0x7, 0x4}, {0x100000, 0x3000, 0x3, 0x0, 0x80, 0x4, 0x1, 0x1, 0x20, 0x80, 0xcd, 0xff}, {0xf000, 0xae4e4d794d84bd20, 0xb, 0x2, 0xff, 0x81, 0x1, 0x5, 0x7a, 0xa7, 0x1, 0x40}, {0x4, 0x2, 0x12, 0x1, 0x0, 0x7, 0x4, 0x9, 0x5, 0xb0, 0x6, 0x9}, {0x3000, 0x1000, 0x10, 0x6, 0x7, 0x7f, 0x0, 0x29, 0xac, 0x0, 0x6, 0x5}, {0x6000, 0x1, 0xe, 0x0, 0x0, 0x1, 0xe1, 0x3, 0x5, 0x81, 0x8, 0x85}, {0x6000, 0xd000}, {0xb000, 0x3000}, 0xb0040, 0x0, 0x2, 0x0, 0x8, 0xb101, 0x1, [0x7, 0x401, 0x5]}) [ 1315.289835][T23533] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1315.297801][T23533] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1315.305762][T23533] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1315.313721][T23533] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:38 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x400454ca, &(0x7f0000000000)) 02:13:38 executing program 0 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1315.446472][T23647] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r5, &(0x7f0000000040)={0x11, 0x0, r6}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000810800010063627100180402000304060003000000003bae10ffffff9e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getchain={0x40, 0x66, 0x20, 0x70bd2d, 0x25dfdbfc, {0x0, 0x0, 0x0, r7, {0xffe0, 0xe}, {0xd, 0xf}, {0x7, 0x1}}, [{0x8, 0xb, 0x400}, {0x8, 0xb, 0xab6b}, {0x8, 0xb, 0xcf8}]}, 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x20000001) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) lseek(r2, 0x0, 0x2) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:38 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x40049409, &(0x7f0000000000)) [ 1315.603285][T23742] FAULT_INJECTION: forcing a failure. [ 1315.603285][T23742] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1315.616521][T23742] CPU: 0 PID: 23742 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1315.616528][T23742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1315.616532][T23742] Call Trace: [ 1315.616549][T23742] dump_stack+0x1d8/0x2f8 [ 1315.616565][T23742] should_fail+0x555/0x770 [ 1315.616587][T23742] should_fail_alloc_page+0x55/0x60 [ 1315.616596][T23742] prepare_alloc_pages+0x283/0x460 [ 1315.616608][T23742] __alloc_pages_nodemask+0xb2/0x5d0 [ 1315.616637][T23742] ? lo_release+0x1f0/0x1f0 [ 1315.616650][T23742] ? blkdev_ioctl+0x807/0x2980 [ 1315.616665][T23742] kmem_getpages+0x4d/0xa00 [ 1315.616678][T23742] cache_grow_begin+0x7e/0x2c0 [ 1315.651872][T23742] cache_alloc_refill+0x311/0x3f0 [ 1315.662353][T23742] ? check_preemption_disabled+0xb7/0x2a0 [ 1315.662371][T23742] kmem_cache_alloc+0x2b9/0x2e0 [ 1315.662379][T23742] ? getname_flags+0xba/0x640 [ 1315.662400][T23742] getname_flags+0xba/0x640 [ 1315.662412][T23742] do_mkdirat+0x3c/0x320 [ 1315.671751][T23742] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1315.671763][T23742] ? do_syscall_64+0x1d/0x1c0 [ 1315.671776][T23742] __x64_sys_mkdir+0x60/0x70 [ 1315.671787][T23742] do_syscall_64+0xf7/0x1c0 [ 1315.729311][T23742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1315.735197][T23742] RIP: 0033:0x459357 [ 1315.739101][T23742] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1315.758782][T23742] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1315.767186][T23742] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1315.775244][T23742] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1315.783206][T23742] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1315.791166][T23742] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 02:13:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1315.799127][T23742] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:39 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x12) 02:13:39 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplXs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r1) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f00000001c0)={'ip6_vti0\x00', {0x2, 0x4e24, @remote}}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000240)=@nat={'nat\x00', 0x19, 0x2, 0x344, [0x200004c0, 0x0, 0x0, 0x2000065e, 0x2000068e], 0x0, &(0x7f0000000180), &(0x7f0000000840)=ANY=[@ANYBLOB="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"/839]}, 0x3bf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r6, 0x0, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r5) socket$netlink(0x10, 0x3, 0x13) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfd6e) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x165000, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r7, 0x114, 0xa, &(0x7f00000002c0)={0x3, "8634fd"}, 0x4) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 02:13:39 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af00, &(0x7f0000000000)) 02:13:39 executing program 0 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1315.988082][T23881] FAULT_INJECTION: forcing a failure. [ 1315.988082][T23881] name failslab, interval 1, probability 0, space 0, times 0 [ 1316.044798][T23881] CPU: 0 PID: 23881 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1316.052736][T23881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1316.062791][T23881] Call Trace: [ 1316.066078][T23881] dump_stack+0x1d8/0x2f8 [ 1316.070428][T23881] should_fail+0x555/0x770 [ 1316.074843][T23881] __should_failslab+0x11a/0x160 [ 1316.079772][T23881] ? getname_flags+0xba/0x640 [ 1316.084441][T23881] should_failslab+0x9/0x20 [ 1316.088939][T23881] kmem_cache_alloc+0x56/0x2e0 [ 1316.093694][T23881] ? __kasan_check_write+0x14/0x20 [ 1316.098805][T23881] getname_flags+0xba/0x640 [ 1316.103311][T23881] do_mkdirat+0x3c/0x320 [ 1316.107560][T23881] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1316.113272][T23881] ? do_syscall_64+0x1d/0x1c0 [ 1316.117942][T23881] __x64_sys_mkdir+0x60/0x70 [ 1316.122521][T23881] do_syscall_64+0xf7/0x1c0 [ 1316.127016][T23881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1316.132895][T23881] RIP: 0033:0x459357 [ 1316.136787][T23881] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1316.156383][T23881] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1316.164789][T23881] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1316.172753][T23881] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1316.180716][T23881] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 02:13:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1316.188678][T23881] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1316.196654][T23881] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f00000000c0)={0x6, @multicast1, 0x15, 0x0, '\x17\x00\x00\x04\x00\xf1x\x86\xfd\x00', 0x6f, 0x8000, 0x6d}, 0x29) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="020c0c03030000002cbd07a1629649973a262e61148545e700fedbdf250110140006000002"], 0x18}}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) ioctl$IMGETVERSION(r6, 0x80044942, &(0x7f00000001c0)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r10, 0x0, 0x0) writev(r8, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r8, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c41fed8050001019fa5d4b3"], 0xe) close(r9) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r8, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r7, 0x0, r9, 0x0, 0x80000001, 0x0) write$FUSE_DIRENT(r3, &(0x7f0000000280)={0x110, 0x0, 0x6, [{0x0, 0x12, 0x3, 0x8, 'sh\x00'}, {0x2, 0xba14, 0x3, 0x80000000, 'sh\x00'}, {0x6, 0x0, 0x3, 0x4, 'sh\x00'}, {0x6, 0x918, 0xa, 0x2ef, 'ppp0&]eth0'}, {0x0, 0x3, 0x3, 0x5, 'sh\x00'}, {0x2, 0x3, 0x2, 0x5, '(@'}, {0x6, 0x7, 0x0, 0xc370}, {0x1, 0x200, 0x4, 0x7ff, 'eth1'}]}, 0x110) 02:13:39 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af25, &(0x7f0000000000)) 02:13:39 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl\\s\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:39 executing program 0 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1316.447991][T24008] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:39 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4020940d, &(0x7f0000000000)) 02:13:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xffff, &(0x7f0000000240)="dfce43eb7934ecd373a86213ac6d31cb079b025a0d11245a7f4fc5a5311938b01ec071bac5d0026131f4481a92f808c00d5cb6e16a4e5987ae7561861f1136b7d98c44cb649276a8407c3fb0c184e080a4d59a154b9f40e37ef7d483663841f4b73236a502c2deda3626b860c6d063f20d02138bb4b5cad0e9d3de589be246338249b8045428499480911d73ff08c44657afc8a626227e4223f0b674faeede4248790d892dd782a1c0a7b61a9af6ccb7023cd649d3826c193d28b5434fde6ba104c7bf6f89dfe06c99e802724b17e35a926b10241966f5de2e2fec06b7621a66a7b0eca1c71e4235196410ccfe8ee0f282e9cf4b25fa") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r6, 0x0, r5) fsync(r6) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1316.565087][T24116] FAULT_INJECTION: forcing a failure. [ 1316.565087][T24116] name failslab, interval 1, probability 0, space 0, times 0 [ 1316.618053][T24116] CPU: 0 PID: 24116 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1316.626599][T24116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1316.636657][T24116] Call Trace: [ 1316.639953][T24116] dump_stack+0x1d8/0x2f8 [ 1316.644284][T24116] should_fail+0x555/0x770 [ 1316.648703][T24116] __should_failslab+0x11a/0x160 [ 1316.653640][T24116] ? getname_flags+0xba/0x640 [ 1316.658313][T24116] should_failslab+0x9/0x20 [ 1316.662814][T24116] kmem_cache_alloc+0x56/0x2e0 [ 1316.667572][T24116] ? __kasan_check_write+0x14/0x20 [ 1316.672677][T24116] getname_flags+0xba/0x640 [ 1316.677171][T24116] do_mkdirat+0x3c/0x320 [ 1316.681427][T24116] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1316.687240][T24116] ? do_syscall_64+0x1d/0x1c0 [ 1316.691915][T24116] __x64_sys_mkdir+0x60/0x70 [ 1316.696500][T24116] do_syscall_64+0xf7/0x1c0 [ 1316.700999][T24116] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1316.706881][T24116] RIP: 0033:0x459357 [ 1316.710771][T24116] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1316.730366][T24116] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1316.738767][T24116] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1316.746750][T24116] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1316.754800][T24116] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1316.762847][T24116] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1316.770808][T24116] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:40 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplcs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x4, 0x0) socket$inet(0x2, 0x6, 0x40) syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x74df2b7d576aa324) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = accept$ax25(r7, &(0x7f00000003c0)={{0x3, @null}, [@bcast, @remote, @remote, @bcast, @remote, @null, @bcast]}, &(0x7f00000001c0)=0x48) writev(r8, &(0x7f0000000200), 0x1000000000000167) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = fcntl$dupfd(r10, 0x0, r9) setsockopt$IP_VS_SO_SET_ADD(r11, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r11, 0x111, 0x4, 0x41f, 0x4) 02:13:40 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x25) 02:13:40 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x800454d2, &(0x7f0000000000)) 02:13:40 executing program 0 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:40 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x80086301, &(0x7f0000000000)) [ 1316.984772][T24293] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1317.067835][T24329] FAULT_INJECTION: forcing a failure. [ 1317.067835][T24329] name failslab, interval 1, probability 0, space 0, times 0 [ 1317.107270][T24329] CPU: 1 PID: 24329 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 02:13:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x45) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1317.115203][T24329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1317.125346][T24329] Call Trace: [ 1317.128629][T24329] dump_stack+0x1d8/0x2f8 [ 1317.132955][T24329] should_fail+0x555/0x770 [ 1317.137381][T24329] __should_failslab+0x11a/0x160 [ 1317.142315][T24329] ? security_inode_alloc+0x36/0x1e0 [ 1317.142330][T24329] should_failslab+0x9/0x20 [ 1317.142344][T24329] kmem_cache_alloc+0x56/0x2e0 [ 1317.142358][T24329] security_inode_alloc+0x36/0x1e0 [ 1317.142372][T24329] inode_init_always+0x3b5/0x920 [ 1317.142382][T24329] ? set_qf_name+0x3c0/0x3c0 [ 1317.142392][T24329] new_inode_pseudo+0x7f/0x240 [ 1317.142402][T24329] new_inode+0x28/0x1c0 [ 1317.152157][T24329] ? trace_ext4_request_inode+0x28b/0x2d0 [ 1317.152169][T24329] __ext4_new_inode+0x43d/0x5650 [ 1317.152183][T24329] ? memset+0x31/0x40 [ 1317.152211][T24329] ? smk_curacc+0xa3/0xe0 [ 1317.152225][T24329] ext4_mkdir+0x3f5/0x1450 [ 1317.152244][T24329] ? security_inode_permission+0xdd/0x120 [ 1317.162100][T24329] vfs_mkdir+0x43f/0x610 [ 1317.162118][T24329] do_mkdirat+0x1d7/0x320 [ 1317.162134][T24329] __x64_sys_mkdir+0x60/0x70 [ 1317.162147][T24329] do_syscall_64+0xf7/0x1c0 [ 1317.162160][T24329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1317.162170][T24329] RIP: 0033:0x459357 [ 1317.162182][T24329] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1317.171661][T24329] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 02:13:40 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplds\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1317.171672][T24329] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1317.171690][T24329] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1317.171697][T24329] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1317.171702][T24329] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1317.171708][T24329] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000040)=""/123, &(0x7f0000000180)=0x7b) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) mmap$usbfs(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2f767e9a041d820c, 0x50, 0xffffffffffffffff, 0x0) 02:13:40 executing program 0 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:40 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x8008af00, &(0x7f0000000000)) [ 1317.487770][T24476] FAULT_INJECTION: forcing a failure. [ 1317.487770][T24476] name failslab, interval 1, probability 0, space 0, times 0 [ 1317.509122][T24476] CPU: 1 PID: 24476 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1317.517058][T24476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1317.527109][T24476] Call Trace: [ 1317.530402][T24476] dump_stack+0x1d8/0x2f8 [ 1317.534732][T24476] should_fail+0x555/0x770 [ 1317.539150][T24476] __should_failslab+0x11a/0x160 [ 1317.544091][T24476] ? ext4_alloc_inode+0x1f/0x560 [ 1317.549022][T24476] should_failslab+0x9/0x20 [ 1317.553522][T24476] kmem_cache_alloc+0x56/0x2e0 [ 1317.558285][T24476] ? set_qf_name+0x3c0/0x3c0 [ 1317.562866][T24476] ext4_alloc_inode+0x1f/0x560 [ 1317.567619][T24476] ? set_qf_name+0x3c0/0x3c0 [ 1317.572200][T24476] new_inode_pseudo+0x68/0x240 [ 1317.576954][T24476] new_inode+0x28/0x1c0 [ 1317.581101][T24476] ? trace_ext4_request_inode+0x28b/0x2d0 [ 1317.586809][T24476] __ext4_new_inode+0x43d/0x5650 [ 1317.591738][T24476] ? memset+0x31/0x40 [ 1317.595721][T24476] ? smk_curacc+0xa3/0xe0 [ 1317.600147][T24476] ext4_mkdir+0x3f5/0x1450 [ 1317.604567][T24476] ? security_inode_permission+0xdd/0x120 [ 1317.610280][T24476] vfs_mkdir+0x43f/0x610 [ 1317.614522][T24476] do_mkdirat+0x1d7/0x320 [ 1317.618849][T24476] __x64_sys_mkdir+0x60/0x70 [ 1317.623431][T24476] do_syscall_64+0xf7/0x1c0 [ 1317.627930][T24476] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1317.633813][T24476] RIP: 0033:0x459357 [ 1317.637696][T24476] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1317.657301][T24476] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1317.665708][T24476] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1317.673666][T24476] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 02:13:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r6, 0x0, r5) ioctl$FS_IOC_GETVERSION(r6, 0x80087601, &(0x7f0000000040)) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1317.681845][T24476] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1317.689801][T24476] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1317.697760][T24476] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:41 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplhs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:41 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x48) 02:13:41 executing program 1: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x6, 0x191a}, 0xc) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) ioctl(r3, 0x1000008912, &(0x7f0000000300)="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") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r6, 0x0, 0x0) writev(r5, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xfffffffffffffff0) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r4, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 02:13:41 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x8008af26, &(0x7f0000000000)) 02:13:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrf/\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:41 executing program 0 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1317.956462][T24598] FAULT_INJECTION: forcing a failure. [ 1317.956462][T24598] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1317.970113][T24598] CPU: 0 PID: 24598 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1317.978012][T24598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1317.988064][T24598] Call Trace: [ 1317.988103][T24598] dump_stack+0x1d8/0x2f8 [ 1317.988119][T24598] should_fail+0x555/0x770 [ 1317.988137][T24598] should_fail_alloc_page+0x55/0x60 [ 1317.988146][T24598] prepare_alloc_pages+0x283/0x460 [ 1317.988167][T24598] __alloc_pages_nodemask+0xb2/0x5d0 [ 1318.005373][T24598] kmem_getpages+0x4d/0xa00 [ 1318.005390][T24598] cache_grow_begin+0x7e/0x2c0 [ 1318.024998][T24598] cache_alloc_refill+0x311/0x3f0 [ 1318.030031][T24598] ? check_preemption_disabled+0xb7/0x2a0 [ 1318.035768][T24598] __kmalloc+0x318/0x340 [ 1318.040021][T24598] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1318.045749][T24598] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1318.051303][T24598] tomoyo_path_number_perm+0x166/0x640 [ 1318.056783][T24598] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1318.062522][T24598] ? trace_kmem_cache_free+0xb2/0x110 [ 1318.067895][T24598] tomoyo_path_mkdir+0x9c/0xc0 [ 1318.072663][T24598] security_path_mkdir+0xed/0x170 [ 1318.077682][T24598] do_mkdirat+0x15c/0x320 [ 1318.082018][T24598] __x64_sys_mkdir+0x60/0x70 [ 1318.086618][T24598] do_syscall_64+0xf7/0x1c0 [ 1318.091125][T24598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1318.097010][T24598] RIP: 0033:0x459357 02:13:41 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplis\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1318.100899][T24598] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1318.120505][T24598] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1318.126233][T24710] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1318.128912][T24598] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1318.128919][T24598] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 02:13:41 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0xc0045878, &(0x7f0000000000)) [ 1318.128925][T24598] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1318.128931][T24598] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1318.128938][T24598] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x40001000008912, &(0x7f0000000180)="0000000000000001000000ef5b0000000000000000506269556513226c6a4b96199a62fef8065ac499a5c43d3354bdc7f42084cd353dba1ec500"/71) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000040)) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_GET_EVENT(r5, &(0x7f00000003c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000240)}}, 0x10) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000400)=ANY=[], 0x0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1318.206590][T24709] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:41 executing program 0 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:41 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0xc0045878, &(0x7f0000000000)) 02:13:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x42) write$vnet(r1, &(0x7f00000003c0)={0x1, {&(0x7f0000000240)=""/220, 0xdc, &(0x7f0000000340)=""/107, 0x4, 0x4}}, 0x68) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r5, 0x0, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000040)=0x971, 0x4) r7 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r7, 0x0, r6) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r10], 0xfffffffffffffcb8) close(r4) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) [ 1318.402669][T24827] FAULT_INJECTION: forcing a failure. [ 1318.402669][T24827] name failslab, interval 1, probability 0, space 0, times 0 [ 1318.469229][T24827] CPU: 1 PID: 24827 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1318.477689][T24827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1318.487742][T24827] Call Trace: [ 1318.491040][T24827] dump_stack+0x1d8/0x2f8 [ 1318.495387][T24827] should_fail+0x555/0x770 [ 1318.499823][T24827] __should_failslab+0x11a/0x160 [ 1318.504797][T24827] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1318.510525][T24827] should_failslab+0x9/0x20 [ 1318.515032][T24827] __kmalloc+0x7a/0x340 [ 1318.519190][T24827] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1318.524939][T24827] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1318.530516][T24827] tomoyo_path_number_perm+0x166/0x640 [ 1318.536001][T24827] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1318.541719][T24827] ? trace_kmem_cache_free+0xb2/0x110 [ 1318.547091][T24827] tomoyo_path_mkdir+0x9c/0xc0 [ 1318.551866][T24827] security_path_mkdir+0xed/0x170 [ 1318.556894][T24827] do_mkdirat+0x15c/0x320 [ 1318.561209][T24827] __x64_sys_mkdir+0x60/0x70 [ 1318.565782][T24827] do_syscall_64+0xf7/0x1c0 [ 1318.570266][T24827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1318.576146][T24827] RIP: 0033:0x459357 [ 1318.580027][T24827] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1318.599655][T24827] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1318.608044][T24827] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1318.615993][T24827] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1318.623952][T24827] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1318.631900][T24827] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1318.639847][T24827] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1318.658953][T24827] ERROR: Out of memory at tomoyo_realpath_from_path. 02:13:42 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x4c) 02:13:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x2) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$packet_add_memb(r9, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) fcntl$dupfd(r6, 0x0, r5) setsockopt$sock_timeval(r5, 0x1, 0x14, &(0x7f0000000040), 0x10) 02:13:42 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0xc0189436, &(0x7f0000000000)) 02:13:42 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplls\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:42 executing program 0 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3, 0x4400) ioctl$USBDEVFS_GET_CAPABILITIES(r1, 0x8004551a, &(0x7f0000000080)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, 0x0, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r4) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd6e) ioctl$FS_IOC_GETFLAGS(r6, 0x80086601, &(0x7f0000000140)) ioctl$VT_RELDISP(r2, 0x5605) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 02:13:42 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0xc020660b, &(0x7f0000000000)) 02:13:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfL\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1319.083077][T25064] FAULT_INJECTION: forcing a failure. [ 1319.083077][T25064] name failslab, interval 1, probability 0, space 0, times 0 [ 1319.096076][T25064] CPU: 0 PID: 25064 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1319.103967][T25064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1319.114021][T25064] Call Trace: [ 1319.117314][T25064] dump_stack+0x1d8/0x2f8 [ 1319.121643][T25064] should_fail+0x555/0x770 [ 1319.126154][T25064] __should_failslab+0x11a/0x160 [ 1319.131089][T25064] ? __es_insert_extent+0x7ba/0x17c0 [ 1319.136375][T25064] should_failslab+0x9/0x20 [ 1319.140871][T25064] kmem_cache_alloc+0x56/0x2e0 [ 1319.145743][T25064] __es_insert_extent+0x7ba/0x17c0 [ 1319.150865][T25064] ? __kasan_check_write+0x14/0x20 [ 1319.155967][T25064] ? do_raw_write_lock+0xf3/0x460 [ 1319.160992][T25064] ext4_es_insert_extent+0x250/0x2ea0 [ 1319.166379][T25064] ext4_ext_map_blocks+0x1806/0x7170 [ 1319.171687][T25064] ? __down_read+0x14b/0x360 [ 1319.176276][T25064] ext4_map_blocks+0x424/0x1e30 [ 1319.181154][T25064] ? __kasan_check_write+0x14/0x20 [ 1319.186258][T25064] ext4_getblk+0xae/0x460 [ 1319.190696][T25064] ext4_bread+0x4a/0x340 [ 1319.195050][T25064] ext4_append+0x175/0x310 [ 1319.199474][T25064] ext4_mkdir+0x7ad/0x1450 [ 1319.203913][T25064] vfs_mkdir+0x43f/0x610 [ 1319.208167][T25064] do_mkdirat+0x1d7/0x320 [ 1319.212502][T25064] __x64_sys_mkdir+0x60/0x70 [ 1319.217084][T25064] do_syscall_64+0xf7/0x1c0 [ 1319.217174][T25064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1319.217182][T25064] RIP: 0033:0x459357 02:13:42 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplos\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3da5b74bc27ff01f4fc51ba16fde53d53750f9da4390e27fefffffffd8633645dc337be7884f94091bb5288896290662b9345426d19596885aaa4b1b38be9d74eee53f09b260fc21b3af9b89b342a6b43c858e8"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r6, 0x0, r5) ioctl$void(r6, 0x46ae84120181aaca) [ 1319.217192][T25064] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1319.217200][T25064] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1319.227563][T25064] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1319.227569][T25064] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1319.227574][T25064] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 02:13:42 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x2, @local, 0x2b8}, {0xa, 0x4e24, 0x9, @mcast1, 0x9f17}, r8, 0xfffffffc}}, 0x48) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1319.227579][T25064] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1319.227586][T25064] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1319.404137][T25186] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:43 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000100100000100000005e8000000b47fc9c858c598ba4909000000000000000a2e834efe3f87695931515781ae36a4d148f269399022f544be4fac9508cce4df4d7015eb590bbfb45f7b815bdb2281145dd688759944bd09b0f55e7ca54b07bd9189de8daeb173aca360f4bca4f5019235efcea227e56f94ddc8d5e02f38fdcdad2e5cc22b1f090ecf60605f3d9129670000000000000000000000000000000eab3ccfade12420421726b120b1ce8ad1642bb195935f9751facf178c4a3b74eeffcfe0312cd4a5cea34746dea9f76bf16244b5bc1bace51a63e67806440fbab6d8cd3ef5e19c077dbc02efed0840d26dbf3f84d5a39b30564d998a2f9293c470f0896ef88805670ed1220cf77ea1c692ee2053565d6529987f514b384013576ab56e1dc4f444be4a13aa637cea74ca6ebce21635"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x64) 02:13:43 executing program 0 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:43 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r3, 0x0, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c4106000500010109000000"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 02:13:43 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x2}) 02:13:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:43 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplps\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1319.802497][T25307] FAULT_INJECTION: forcing a failure. [ 1319.802497][T25307] name failslab, interval 1, probability 0, space 0, times 0 [ 1319.828713][T25307] CPU: 0 PID: 25307 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1319.836648][T25307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1319.846793][T25307] Call Trace: [ 1319.850083][T25307] dump_stack+0x1d8/0x2f8 [ 1319.854420][T25307] should_fail+0x555/0x770 [ 1319.858848][T25307] __should_failslab+0x11a/0x160 [ 1319.863805][T25307] ? smack_inode_init_security+0x3cf/0x490 [ 1319.869695][T25307] should_failslab+0x9/0x20 [ 1319.874190][T25307] __kmalloc_track_caller+0x79/0x340 [ 1319.879470][T25307] kstrdup+0x34/0x70 [ 1319.883364][T25307] smack_inode_init_security+0x3cf/0x490 [ 1319.889000][T25307] security_inode_init_security+0xfe/0x310 [ 1319.894803][T25307] ? ext4_init_security+0x40/0x40 [ 1319.899840][T25307] ext4_init_security+0x34/0x40 [ 1319.904691][T25307] __ext4_new_inode+0x446c/0x5650 [ 1319.909731][T25307] ? smk_curacc+0xa3/0xe0 [ 1319.914062][T25307] ext4_mkdir+0x3f5/0x1450 [ 1319.918486][T25307] ? security_inode_permission+0xdd/0x120 [ 1319.924208][T25307] vfs_mkdir+0x43f/0x610 [ 1319.928455][T25307] do_mkdirat+0x1d7/0x320 [ 1319.932805][T25307] __x64_sys_mkdir+0x60/0x70 [ 1319.937400][T25307] do_syscall_64+0xf7/0x1c0 [ 1319.941900][T25307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1319.947781][T25307] RIP: 0033:0x459357 [ 1319.951668][T25307] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1319.971469][T25307] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1319.979894][T25307] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1319.987870][T25307] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1319.995843][T25307] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1320.003817][T25307] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1320.011787][T25307] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:43 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x3}) 02:13:43 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplss\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:43 executing program 0 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrf\\\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:43 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x4}) 02:13:43 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplts\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1320.392218][T25531] FAULT_INJECTION: forcing a failure. [ 1320.392218][T25531] name failslab, interval 1, probability 0, space 0, times 0 [ 1320.443248][T25531] CPU: 0 PID: 25531 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1320.451194][T25531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1320.461250][T25531] Call Trace: [ 1320.464544][T25531] dump_stack+0x1d8/0x2f8 [ 1320.468874][T25531] should_fail+0x555/0x770 [ 1320.473295][T25531] __should_failslab+0x11a/0x160 [ 1320.478232][T25531] ? ext4_mb_new_blocks+0x2ac/0x2cc0 [ 1320.483536][T25531] should_failslab+0x9/0x20 [ 1320.488064][T25531] kmem_cache_alloc+0x56/0x2e0 [ 1320.492836][T25531] ext4_mb_new_blocks+0x2ac/0x2cc0 [ 1320.497954][T25531] ? trace_kmalloc+0xcd/0x130 [ 1320.502631][T25531] ? kcalloc+0x2f/0x50 [ 1320.506714][T25531] ? __kmalloc+0x26c/0x340 [ 1320.511129][T25531] ? kcalloc+0x2f/0x50 [ 1320.515212][T25531] ? ext4_ext_search_right+0x4cb/0x940 [ 1320.520676][T25531] ? ext4_find_extent+0x8e0/0xaa0 [ 1320.525715][T25531] ? ext4_inode_to_goal_block+0x27b/0x3b0 [ 1320.531444][T25531] ext4_ext_map_blocks+0x4b8c/0x7170 [ 1320.536780][T25531] ext4_map_blocks+0x8f4/0x1e30 [ 1320.541647][T25531] ? __kasan_check_write+0x14/0x20 [ 1320.546856][T25531] ext4_getblk+0xae/0x460 [ 1320.551196][T25531] ext4_bread+0x4a/0x340 [ 1320.555449][T25531] ext4_append+0x175/0x310 [ 1320.559875][T25531] ext4_mkdir+0x7ad/0x1450 [ 1320.564305][T25531] vfs_mkdir+0x43f/0x610 [ 1320.568550][T25531] do_mkdirat+0x1d7/0x320 [ 1320.572882][T25531] __x64_sys_mkdir+0x60/0x70 [ 1320.577471][T25531] do_syscall_64+0xf7/0x1c0 [ 1320.581974][T25531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1320.587860][T25531] RIP: 0033:0x459357 [ 1320.591746][T25531] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1320.611348][T25531] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1320.619761][T25531] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1320.627733][T25531] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1320.635710][T25531] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1320.643687][T25531] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1320.651666][T25531] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:44 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x68) 02:13:44 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x5}) 02:13:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:44 executing program 0 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:44 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplxs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1321.029747][T25654] FAULT_INJECTION: forcing a failure. [ 1321.029747][T25654] name failslab, interval 1, probability 0, space 0, times 0 [ 1321.057334][T25654] CPU: 1 PID: 25654 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1321.065291][T25654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1321.075459][T25654] Call Trace: [ 1321.078763][T25654] dump_stack+0x1d8/0x2f8 [ 1321.083104][T25654] should_fail+0x555/0x770 [ 1321.087531][T25654] __should_failslab+0x11a/0x160 [ 1321.092476][T25654] ? kcalloc+0x2f/0x50 [ 1321.096553][T25654] should_failslab+0x9/0x20 [ 1321.101067][T25654] __kmalloc+0x7a/0x340 [ 1321.105233][T25654] kcalloc+0x2f/0x50 [ 1321.109132][T25654] ext4_find_extent+0x216/0xaa0 [ 1321.113989][T25654] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 1321.120325][T25654] ext4_ext_map_blocks+0x170/0x7170 [ 1321.125554][T25654] ? __kasan_check_write+0x14/0x20 [ 1321.130667][T25654] ? __down_read+0x14b/0x360 [ 1321.135268][T25654] ext4_map_blocks+0x424/0x1e30 [ 1321.140133][T25654] ? __kasan_check_write+0x14/0x20 [ 1321.145253][T25654] ext4_getblk+0xae/0x460 [ 1321.149597][T25654] ext4_bread+0x4a/0x340 [ 1321.153849][T25654] ext4_append+0x175/0x310 [ 1321.158275][T25654] ext4_mkdir+0x7ad/0x1450 [ 1321.162707][T25654] vfs_mkdir+0x43f/0x610 [ 1321.166968][T25654] do_mkdirat+0x1d7/0x320 [ 1321.171303][T25654] __x64_sys_mkdir+0x60/0x70 [ 1321.175899][T25654] do_syscall_64+0xf7/0x1c0 [ 1321.180408][T25654] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1321.186295][T25654] RIP: 0033:0x459357 [ 1321.190186][T25654] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1321.209781][T25654] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1321.218187][T25654] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 02:13:44 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x6}) [ 1321.226152][T25654] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1321.234117][T25654] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1321.242079][T25654] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1321.250049][T25654] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:44 executing program 0 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:44 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplzs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:44 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x7}) [ 1321.524071][T25873] FAULT_INJECTION: forcing a failure. [ 1321.524071][T25873] name failslab, interval 1, probability 0, space 0, times 0 [ 1321.577704][T25873] CPU: 0 PID: 25873 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1321.585636][T25873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1321.595681][T25873] Call Trace: [ 1321.598973][T25873] dump_stack+0x1d8/0x2f8 [ 1321.603305][T25873] should_fail+0x555/0x770 [ 1321.607723][T25873] __should_failslab+0x11a/0x160 [ 1321.612658][T25873] should_failslab+0x9/0x20 [ 1321.617246][T25873] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1321.622525][T25873] ? smack_d_instantiate+0x732/0xd70 [ 1321.627809][T25873] smack_d_instantiate+0x732/0xd70 [ 1321.632936][T25873] ? lockdep_init_map+0x2a/0x680 [ 1321.637875][T25873] security_d_instantiate+0xa5/0x100 [ 1321.643157][T25873] d_instantiate_new+0x65/0x120 [ 1321.648004][T25873] ext4_mkdir+0xfa9/0x1450 [ 1321.652430][T25873] vfs_mkdir+0x43f/0x610 [ 1321.656677][T25873] do_mkdirat+0x1d7/0x320 [ 1321.661002][T25873] __x64_sys_mkdir+0x60/0x70 [ 1321.665671][T25873] do_syscall_64+0xf7/0x1c0 [ 1321.670164][T25873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1321.676049][T25873] RIP: 0033:0x459357 [ 1321.679940][T25873] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1321.699626][T25873] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1321.708042][T25873] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1321.716016][T25873] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1321.723987][T25873] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1321.731957][T25873] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1321.739921][T25873] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:45 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x8}) 02:13:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfh\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:45 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x6c) 02:13:45 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu\n\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:45 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x9}) 02:13:45 executing program 0 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1322.283039][T26113] FAULT_INJECTION: forcing a failure. [ 1322.283039][T26113] name failslab, interval 1, probability 0, space 0, times 0 [ 1322.295942][T26113] CPU: 0 PID: 26113 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1322.303831][T26113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1322.313891][T26113] Call Trace: [ 1322.317188][T26113] dump_stack+0x1d8/0x2f8 [ 1322.321525][T26113] should_fail+0x555/0x770 [ 1322.325947][T26113] __should_failslab+0x11a/0x160 [ 1322.330884][T26113] ? __es_insert_extent+0x7ba/0x17c0 [ 1322.336174][T26113] should_failslab+0x9/0x20 [ 1322.340680][T26113] kmem_cache_alloc+0x56/0x2e0 [ 1322.345448][T26113] __es_insert_extent+0x7ba/0x17c0 [ 1322.350577][T26113] ext4_es_insert_extent+0x250/0x2ea0 [ 1322.355981][T26113] ext4_map_blocks+0xe1c/0x1e30 [ 1322.360844][T26113] ? __kasan_check_write+0x14/0x20 [ 1322.365951][T26113] ext4_getblk+0xae/0x460 [ 1322.365969][T26113] ext4_bread+0x4a/0x340 [ 1322.365983][T26113] ext4_append+0x175/0x310 [ 1322.365999][T26113] ext4_mkdir+0x7ad/0x1450 02:13:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1322.366024][T26113] vfs_mkdir+0x43f/0x610 [ 1322.387592][T26113] do_mkdirat+0x1d7/0x320 [ 1322.391927][T26113] __x64_sys_mkdir+0x60/0x70 [ 1322.396518][T26113] do_syscall_64+0xf7/0x1c0 [ 1322.401019][T26113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1322.406905][T26113] RIP: 0033:0x459357 [ 1322.410818][T26113] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:13:45 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0xa}) [ 1322.430412][T26113] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1322.430422][T26113] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1322.430428][T26113] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1322.430434][T26113] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1322.430440][T26113] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1322.430446][T26113] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:45 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu#\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:45 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0xb}) 02:13:45 executing program 0 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1322.804521][T26342] FAULT_INJECTION: forcing a failure. [ 1322.804521][T26342] name failslab, interval 1, probability 0, space 0, times 0 [ 1322.847241][T26342] CPU: 1 PID: 26342 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1322.855179][T26342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1322.865243][T26342] Call Trace: [ 1322.868547][T26342] dump_stack+0x1d8/0x2f8 [ 1322.872888][T26342] should_fail+0x555/0x770 [ 1322.877313][T26342] __should_failslab+0x11a/0x160 [ 1322.882251][T26342] ? kcalloc+0x2f/0x50 [ 1322.886319][T26342] should_failslab+0x9/0x20 [ 1322.890826][T26342] __kmalloc+0x7a/0x340 [ 1322.894988][T26342] kcalloc+0x2f/0x50 [ 1322.898885][T26342] ext4_find_extent+0x216/0xaa0 [ 1322.903734][T26342] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 1322.910062][T26342] ext4_ext_map_blocks+0x170/0x7170 [ 1322.915276][T26342] ? __kasan_check_write+0x14/0x20 [ 1322.920377][T26342] ? __down_read+0x14b/0x360 [ 1322.924969][T26342] ext4_map_blocks+0x424/0x1e30 [ 1322.929841][T26342] ? __kasan_check_write+0x14/0x20 [ 1322.934956][T26342] ext4_getblk+0xae/0x460 [ 1322.939295][T26342] ext4_bread+0x4a/0x340 [ 1322.943537][T26342] ext4_append+0x175/0x310 [ 1322.947958][T26342] ext4_mkdir+0x7ad/0x1450 [ 1322.952388][T26342] vfs_mkdir+0x43f/0x610 [ 1322.956644][T26342] do_mkdirat+0x1d7/0x320 [ 1322.960973][T26342] __x64_sys_mkdir+0x60/0x70 [ 1322.965571][T26342] do_syscall_64+0xf7/0x1c0 [ 1322.970079][T26342] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1322.975969][T26342] RIP: 0033:0x459357 02:13:46 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0xc}) [ 1322.979857][T26342] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1322.999454][T26342] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1323.007861][T26342] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1323.015830][T26342] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1323.023829][T26342] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1323.031795][T26342] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1323.039764][T26342] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:46 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu%\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:46 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x74) 02:13:46 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0xd}) 02:13:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:46 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu*\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:46 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0xe}) 02:13:46 executing program 0 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1323.575636][T26692] FAULT_INJECTION: forcing a failure. [ 1323.575636][T26692] name failslab, interval 1, probability 0, space 0, times 0 [ 1323.614576][T26692] CPU: 1 PID: 26692 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1323.622515][T26692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1323.632620][T26692] Call Trace: [ 1323.636015][T26692] dump_stack+0x1d8/0x2f8 [ 1323.640355][T26692] should_fail+0x555/0x770 [ 1323.644776][T26692] __should_failslab+0x11a/0x160 [ 1323.649730][T26692] ? kzalloc+0x1f/0x40 [ 1323.653799][T26692] should_failslab+0x9/0x20 [ 1323.658301][T26692] __kmalloc+0x7a/0x340 [ 1323.662460][T26692] kzalloc+0x1f/0x40 [ 1323.666349][T26692] smk_parse_smack+0x197/0x230 [ 1323.671116][T26692] smk_import_entry+0x27/0x590 [ 1323.675880][T26692] smack_d_instantiate+0x78f/0xd70 [ 1323.681001][T26692] ? lockdep_init_map+0x2a/0x680 [ 1323.686033][T26692] security_d_instantiate+0xa5/0x100 [ 1323.691312][T26692] d_instantiate_new+0x65/0x120 [ 1323.696162][T26692] ext4_mkdir+0xfa9/0x1450 [ 1323.700592][T26692] vfs_mkdir+0x43f/0x610 [ 1323.704848][T26692] do_mkdirat+0x1d7/0x320 [ 1323.709177][T26692] __x64_sys_mkdir+0x60/0x70 [ 1323.713762][T26692] do_syscall_64+0xf7/0x1c0 [ 1323.718258][T26692] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1323.724156][T26692] RIP: 0033:0x459357 [ 1323.728041][T26692] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1323.747636][T26692] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1323.756165][T26692] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1323.764139][T26692] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 02:13:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:47 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu+\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:47 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x10}) [ 1323.772104][T26692] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1323.780070][T26692] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1323.788055][T26692] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:47 executing program 0 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:47 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x11}) 02:13:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrft\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1324.088766][T26927] FAULT_INJECTION: forcing a failure. [ 1324.088766][T26927] name failslab, interval 1, probability 0, space 0, times 0 [ 1324.132846][T26927] CPU: 1 PID: 26927 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1324.140802][T26927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1324.150853][T26927] Call Trace: [ 1324.154168][T26927] dump_stack+0x1d8/0x2f8 [ 1324.158495][T26927] should_fail+0x555/0x770 [ 1324.162911][T26927] __should_failslab+0x11a/0x160 [ 1324.167866][T26927] should_failslab+0x9/0x20 [ 1324.172364][T26927] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1324.177638][T26927] ? smack_d_instantiate+0x962/0xd70 [ 1324.182918][T26927] smack_d_instantiate+0x962/0xd70 [ 1324.188029][T26927] ? lockdep_init_map+0x2a/0x680 [ 1324.192979][T26927] security_d_instantiate+0xa5/0x100 [ 1324.198261][T26927] d_instantiate_new+0x65/0x120 [ 1324.203126][T26927] ext4_mkdir+0xfa9/0x1450 [ 1324.207555][T26927] vfs_mkdir+0x43f/0x610 [ 1324.211794][T26927] do_mkdirat+0x1d7/0x320 [ 1324.216119][T26927] __x64_sys_mkdir+0x60/0x70 [ 1324.220741][T26927] do_syscall_64+0xf7/0x1c0 [ 1324.225238][T26927] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1324.231120][T26927] RIP: 0033:0x459357 [ 1324.234999][T26927] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1324.254590][T26927] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1324.262989][T26927] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459357 [ 1324.270948][T26927] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 02:13:47 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x7a) [ 1324.278911][T26927] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1324.286875][T26927] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1324.294837][T26927] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:47 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu-\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:47 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x12}) 02:13:47 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x25}) 02:13:47 executing program 0 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1324.751346][T27177] FAULT_INJECTION: forcing a failure. [ 1324.751346][T27177] name failslab, interval 1, probability 0, space 0, times 0 [ 1324.781248][T27177] CPU: 1 PID: 27177 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1324.789175][T27177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1324.799229][T27177] Call Trace: [ 1324.802534][T27177] dump_stack+0x1d8/0x2f8 [ 1324.806864][T27177] should_fail+0x555/0x770 [ 1324.811293][T27177] __should_failslab+0x11a/0x160 [ 1324.816227][T27177] should_failslab+0x9/0x20 [ 1324.820745][T27177] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1324.826018][T27177] ? copy_mount_options+0x5f/0x3c0 [ 1324.831123][T27177] copy_mount_options+0x5f/0x3c0 [ 1324.836051][T27177] ksys_mount+0xa0/0x100 [ 1324.840285][T27177] __x64_sys_mount+0xbf/0xd0 [ 1324.844956][T27177] do_syscall_64+0xf7/0x1c0 [ 1324.849449][T27177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1324.855328][T27177] RIP: 0033:0x45c98a [ 1324.859215][T27177] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1324.878812][T27177] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1324.887221][T27177] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a 02:13:48 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x5c}) 02:13:48 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu.\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1324.895187][T27177] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1324.903155][T27177] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1324.911144][T27177] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1324.919112][T27177] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:48 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x300}) 02:13:48 executing program 0 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1325.256781][T27364] FAULT_INJECTION: forcing a failure. [ 1325.256781][T27364] name failslab, interval 1, probability 0, space 0, times 0 [ 1325.269424][T27364] CPU: 0 PID: 27364 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1325.277314][T27364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1325.287374][T27364] Call Trace: [ 1325.290672][T27364] dump_stack+0x1d8/0x2f8 [ 1325.295010][T27364] should_fail+0x555/0x770 [ 1325.299437][T27364] __should_failslab+0x11a/0x160 [ 1325.304373][T27364] ? __sigqueue_alloc+0x2ce/0x440 [ 1325.309400][T27364] should_failslab+0x9/0x20 [ 1325.313907][T27364] kmem_cache_alloc+0x56/0x2e0 [ 1325.318680][T27364] __sigqueue_alloc+0x2ce/0x440 [ 1325.323532][T27364] __send_signal+0x508/0xcd0 [ 1325.328129][T27364] send_signal+0x6e0/0x830 [ 1325.332548][T27364] force_sig_info_to_task+0x247/0x2e0 [ 1325.337925][T27364] force_sig_fault+0xbf/0x130 [ 1325.342606][T27364] __bad_area_nosemaphore+0x307/0x470 [ 1325.347985][T27364] bad_area+0x6b/0x80 [ 1325.351968][T27364] do_user_addr_fault+0xacc/0xaf0 [ 1325.356999][T27364] __do_page_fault+0xd3/0x1f0 [ 1325.361675][T27364] do_page_fault+0x99/0xb0 [ 1325.366090][T27364] page_fault+0x39/0x40 [ 1325.370236][T27364] RIP: 0033:0x453b3f [ 1325.374137][T27364] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 1325.393735][T27364] RSP: 002b:00007faba37fba88 EFLAGS: 00010283 02:13:48 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0xc0) 02:13:48 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x500}) 02:13:48 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu/\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1325.399798][T27364] RAX: 00007faba37fbb40 RBX: 0000000020000068 RCX: 0000000000000000 [ 1325.407774][T27364] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007faba37fbb40 [ 1325.415742][T27364] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 1325.423717][T27364] R10: 0000000000000075 R11: 00000000004e6840 R12: 0000000000000004 [ 1325.431691][T27364] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfz\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:48 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x600}) 02:13:48 executing program 0 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:49 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x700}) [ 1325.779769][T27661] FAULT_INJECTION: forcing a failure. [ 1325.779769][T27661] name failslab, interval 1, probability 0, space 0, times 0 [ 1325.802547][T27661] CPU: 0 PID: 27661 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1325.810599][T27661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1325.820657][T27661] Call Trace: [ 1325.823954][T27661] dump_stack+0x1d8/0x2f8 [ 1325.828289][T27661] should_fail+0x555/0x770 [ 1325.832717][T27661] __should_failslab+0x11a/0x160 [ 1325.837652][T27661] ? ksys_mount+0x6a/0x100 [ 1325.842068][T27661] should_failslab+0x9/0x20 [ 1325.846587][T27661] __kmalloc_track_caller+0x79/0x340 [ 1325.851872][T27661] strndup_user+0x76/0x130 [ 1325.856284][T27661] ksys_mount+0x6a/0x100 [ 1325.860524][T27661] __x64_sys_mount+0xbf/0xd0 [ 1325.865112][T27661] do_syscall_64+0xf7/0x1c0 [ 1325.869616][T27661] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1325.875497][T27661] RIP: 0033:0x45c98a [ 1325.879389][T27661] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1325.898993][T27661] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1325.907398][T27661] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1325.915363][T27661] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 02:13:49 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu0\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1325.923325][T27661] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1325.931287][T27661] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1325.939249][T27661] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x02', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:49 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspluL\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:49 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x900}) 02:13:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x03', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:49 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x300) 02:13:49 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0xa00}) 02:13:49 executing program 0 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:49 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspluX\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1326.500066][T27929] FAULT_INJECTION: forcing a failure. [ 1326.500066][T27929] name failslab, interval 1, probability 0, space 0, times 0 [ 1326.543018][T27929] CPU: 0 PID: 27929 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1326.550962][T27929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1326.561019][T27929] Call Trace: [ 1326.564307][T27929] dump_stack+0x1d8/0x2f8 [ 1326.568640][T27929] should_fail+0x555/0x770 [ 1326.573052][T27929] __should_failslab+0x11a/0x160 [ 1326.577981][T27929] ? ksys_mount+0x6a/0x100 [ 1326.582391][T27929] should_failslab+0x9/0x20 [ 1326.586888][T27929] __kmalloc_track_caller+0x79/0x340 [ 1326.592181][T27929] strndup_user+0x76/0x130 [ 1326.596614][T27929] ksys_mount+0x6a/0x100 [ 1326.600857][T27929] __x64_sys_mount+0xbf/0xd0 [ 1326.605442][T27929] do_syscall_64+0xf7/0x1c0 [ 1326.609948][T27929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1326.615832][T27929] RIP: 0033:0x45c98a [ 1326.619718][T27929] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 02:13:49 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0xb00}) [ 1326.639319][T27929] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1326.647733][T27929] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1326.655705][T27929] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1326.663677][T27929] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1326.671645][T27929] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1326.679621][T27929] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ALLOC(r6, 0xc0206434, &(0x7f0000000080)={0x7fff, 0x0, 0x10001, 0x4a91a3d3}) r7 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r8, 0x0, 0x0) ioctl$TIOCCONS(r2, 0x541d) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r7) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r7, 0x0, 0x80000001, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$EVIOCGKEYCODE_V2(r11, 0x80284504, &(0x7f0000000240)=""/238) 02:13:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:50 executing program 0 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:50 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0xc00}) 02:13:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r1) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRES64, @ANYRES32=r0], @ANYRESDEC=r2, @ANYRES16=r4, @ANYRES16=r1], 0xfffffffffffffd52) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r9, 0x0, 0x0) writev(r7, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = socket$inet6(0xa, 0x2, 0x0) r12 = fcntl$dupfd(r11, 0x0, r10) setsockopt$IP_VS_SO_SET_ADD(r12, 0x0, 0x482, &(0x7f0000000140)={0x1, @multicast2, 0x15, 0xffffffff, 'dh\x00', 0x6f, 0x8000, 0x7b}, 0x2c) pwrite64(r12, &(0x7f0000000240)="fba145bd2546dae2d3ae75bb3918b23a194829befedc17122e41b111f48167018a09ec0fbb972ea827c4a1bc16c74713765a99f0d57a0345a259ef5cef540f01897114c9ab0d0610cb1d18f2716396e6ab879dd89fe62bbdea2c08b1fb11257f812f1e20715678adb16d417eaf2697d7b133b62bacfe43ba09ffbee2228e05702c8f02a650d2c6235c996a78f4941c93103e5da79f4c65", 0x97, 0x0) write$binfmt_elf64(r7, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r8) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r6, 0x0, r8, 0x0, 0x80000001, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r12) getsockopt$inet_sctp6_SCTP_EVENTS(r10, 0x84, 0xb, &(0x7f0000000180), &(0x7f00000001c0)=0xb) 02:13:50 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu\\\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1327.001396][T28162] FAULT_INJECTION: forcing a failure. [ 1327.001396][T28162] name failslab, interval 1, probability 0, space 0, times 0 [ 1327.059739][T28162] CPU: 0 PID: 28162 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1327.067673][T28162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1327.077729][T28162] Call Trace: [ 1327.081017][T28162] dump_stack+0x1d8/0x2f8 [ 1327.085350][T28162] should_fail+0x555/0x770 [ 1327.089853][T28162] __should_failslab+0x11a/0x160 [ 1327.094781][T28162] ? getname_flags+0xba/0x640 [ 1327.099456][T28162] should_failslab+0x9/0x20 [ 1327.103968][T28162] kmem_cache_alloc+0x56/0x2e0 [ 1327.108734][T28162] getname_flags+0xba/0x640 [ 1327.113247][T28162] user_path_at_empty+0x2d/0x50 [ 1327.118092][T28162] do_mount+0xd7/0x2510 [ 1327.122242][T28162] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1327.127781][T28162] ? copy_mount_options+0x5f/0x3c0 [ 1327.132886][T28162] ? __kasan_check_read+0x11/0x20 [ 1327.137907][T28162] ? copy_mount_options+0x308/0x3c0 [ 1327.143099][T28162] ksys_mount+0xcc/0x100 [ 1327.147426][T28162] __x64_sys_mount+0xbf/0xd0 [ 1327.152013][T28162] do_syscall_64+0xf7/0x1c0 02:13:50 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0xd00}) [ 1327.156514][T28162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1327.162398][T28162] RIP: 0033:0x45c98a [ 1327.166305][T28162] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1327.169210][T28270] IPVS: set_ctl: invalid protocol: 1 224.0.0.2:21 [ 1327.185901][T28162] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1327.185911][T28162] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1327.185916][T28162] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1327.185921][T28162] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1327.185926][T28162] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1327.185931][T28162] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1327.248146][T28272] IPVS: set_ctl: invalid protocol: 1 224.0.0.2:21 02:13:50 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000100100000100000005e8000000b47fc9c858c598ba4909000000000000000a2e834efe3f87695931515781ae36a4d148f269399022f544be4fac9508cce4df4d7015eb590bbfb45f7b815bdb2281145dd688759944bd09b0f55e7ca54b07bd9189de8daeb173aca360f4bca4f5019235efcea227e56f94ddc8d5e02f38fdcdad2e5cc22b1f090ecf60605f3d9129670000000000000000000000000000000eab3ccfade12420421726b120b1ce8ad1642bb195935f9751facf178c4a3b74eeffcfe0312cd4a5cea34746dea9f76bf16244b5bc1bace51a63e67806440fbab6d8cd3ef5e19c077dbc02efed0840d26dbf3f84d5a39b30564d998a2f9293c470f0896ef88805670ed1220cf77ea1c692ee2053565d6529987f514b384013576ab56e1dc4f444be4a13aa637cea74ca6ebce21635"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x37a) 02:13:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x05', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) r6 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) r7 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r7) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r10, 0x0, r9) r11 = socket$inet6(0xa, 0x2, 0x0) r12 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r12, 0x0, r11) r13 = socket$inet6(0xa, 0x2, 0x0) r14 = socket$inet6(0xa, 0x2, 0x0) r15 = fcntl$dupfd(r14, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) r16 = socket$inet6(0xa, 0x2, 0x0) r17 = socket$inet6(0xa, 0x2, 0x0) r18 = fcntl$dupfd(r17, 0x0, r16) setsockopt$IP_VS_SO_SET_ADD(r18, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) r19 = ioctl$TUNGETDEVNETNS(r18, 0x54e3, 0x0) io_uring_register$IORING_REGISTER_FILES(r7, 0x2, &(0x7f0000000240)=[r8, r10, 0xffffffffffffffff, r7, r12, r15, 0xffffffffffffffff, r5, r19], 0x9) r20 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r20, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r20, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r7, 0x84, 0xe, &(0x7f0000000300)={r21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f0000000080)={0x86e, 0x1, 0xa46, 0x8, r21}, &(0x7f0000000180)=0x10) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:50 executing program 0 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:50 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0xe00}) 02:13:50 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspluc\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1327.500584][T28391] FAULT_INJECTION: forcing a failure. [ 1327.500584][T28391] name failslab, interval 1, probability 0, space 0, times 0 [ 1327.522628][T28387] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1327.527389][T28391] CPU: 0 PID: 28391 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1327.541032][T28391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1327.541038][T28391] Call Trace: [ 1327.541056][T28391] dump_stack+0x1d8/0x2f8 [ 1327.541072][T28391] should_fail+0x555/0x770 [ 1327.541089][T28391] __should_failslab+0x11a/0x160 [ 1327.541103][T28391] ? ksys_mount+0x38/0x100 [ 1327.572465][T28391] should_failslab+0x9/0x20 [ 1327.576967][T28391] __kmalloc_track_caller+0x79/0x340 [ 1327.582257][T28391] strndup_user+0x76/0x130 [ 1327.586676][T28391] ksys_mount+0x38/0x100 [ 1327.586689][T28391] __x64_sys_mount+0xbf/0xd0 [ 1327.586702][T28391] do_syscall_64+0xf7/0x1c0 [ 1327.586716][T28391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1327.605859][T28391] RIP: 0033:0x45c98a [ 1327.609751][T28391] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1327.629367][T28391] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1327.637790][T28391] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1327.645754][T28391] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1327.653720][T28391] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1327.661704][T28391] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1327.669670][T28391] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:51 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x1100}) 02:13:51 executing program 0 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x06', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:51 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x1200}) 02:13:51 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplud\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1327.961224][T28613] FAULT_INJECTION: forcing a failure. [ 1327.961224][T28613] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1327.974458][T28613] CPU: 1 PID: 28613 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1327.974465][T28613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1327.974470][T28613] Call Trace: [ 1327.974489][T28613] dump_stack+0x1d8/0x2f8 [ 1327.974506][T28613] should_fail+0x555/0x770 [ 1327.974521][T28613] should_fail_alloc_page+0x55/0x60 [ 1327.974530][T28613] prepare_alloc_pages+0x283/0x460 [ 1327.974543][T28613] __alloc_pages_nodemask+0xb2/0x5d0 [ 1327.974561][T28613] kmem_getpages+0x4d/0xa00 [ 1327.992501][T28613] cache_grow_begin+0x7e/0x2c0 [ 1327.992517][T28613] cache_alloc_refill+0x311/0x3f0 [ 1327.992529][T28613] ? check_preemption_disabled+0xb7/0x2a0 [ 1327.992547][T28613] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 1328.015006][T28613] ? copy_mount_options+0x5f/0x3c0 [ 1328.015020][T28613] copy_mount_options+0x5f/0x3c0 [ 1328.015038][T28613] ksys_mount+0xa0/0x100 [ 1328.015050][T28613] __x64_sys_mount+0xbf/0xd0 [ 1328.015063][T28613] do_syscall_64+0xf7/0x1c0 [ 1328.015075][T28613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1328.024813][T28613] RIP: 0033:0x45c98a [ 1328.024823][T28613] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1328.024829][T28613] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1328.024839][T28613] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1328.024846][T28613] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1328.024852][T28613] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1328.024858][T28613] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1328.024863][T28613] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:51 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x2500}) [ 1328.272241][T28726] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:51 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000100100000100000005e8000000b47fc9c858c598ba4909000000000000000a2e834efe3f87695931515781ae36a4d148f269399022f544be4fac9508cce4df4d7015eb590bbfb45f7b815bdb2281145dd688759944bd09b0f55e7ca54b07bd9189de8daeb173aca360f4bca4f5019235efcea227e56f94ddc8d5e02f38fdcdad2e5cc22b1f090ecf60605f3d9129670000000000000000000000000000000eab3ccfade12420421726b120b1ce8ad1642bb195935f9751facf178c4a3b74eeffcfe0312cd4a5cea34746dea9f76bf16244b5bc1bace51a63e67806440fbab6d8cd3ef5e19c077dbc02efed0840d26dbf3f84d5a39b30564d998a2f9293c470f0896ef88805670ed1220cf77ea1c692ee2053565d6529987f514b384013576ab56e1dc4f444be4a13aa637cea74ca6ebce21635"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x500) 02:13:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\a', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:51 executing program 0 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="b300"/14], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:51 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspluh\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:51 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x4000}) [ 1328.495369][T28842] FAULT_INJECTION: forcing a failure. [ 1328.495369][T28842] name failslab, interval 1, probability 0, space 0, times 0 [ 1328.526313][T28842] CPU: 1 PID: 28842 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1328.534238][T28842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1328.534244][T28842] Call Trace: [ 1328.534262][T28842] dump_stack+0x1d8/0x2f8 [ 1328.534278][T28842] should_fail+0x555/0x770 [ 1328.534295][T28842] __should_failslab+0x11a/0x160 [ 1328.556336][T28842] ? ksys_mount+0x6a/0x100 [ 1328.556348][T28842] should_failslab+0x9/0x20 [ 1328.556360][T28842] __kmalloc_track_caller+0x79/0x340 [ 1328.556375][T28842] strndup_user+0x76/0x130 [ 1328.556386][T28842] ksys_mount+0x6a/0x100 [ 1328.584107][T28842] __x64_sys_mount+0xbf/0xd0 [ 1328.588700][T28842] do_syscall_64+0xf7/0x1c0 [ 1328.593217][T28842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1328.599104][T28842] RIP: 0033:0x45c98a [ 1328.602998][T28842] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1328.622711][T28842] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1328.631123][T28842] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a 02:13:51 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x5c00}) [ 1328.639100][T28842] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1328.647069][T28842] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1328.655030][T28842] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1328.662995][T28842] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f0000000180)=@ng={0x4, 0xd, "5c04"}, 0x4, 0x3) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b376398513cbee94149c4753aef7588b013ebfb67982e11f436198445e0bf0281e93b7fd643f5bf4d25519bd7250e48f6825ecdecdee64937f898046b9e428dfb34cfbbfe066b5b1964da550706e8182e8bbed9fa574933b7573faf6648975fbc78fdd4b2804679aa36c62628ebec5e0bf352abb49d57462b7ed69127bb568af125826ae258198414f11ebdb518ab2fe26cc127384ef86adba43e01bd30cdc68ae3b492853db76fe019ca2fc221656ed2730bf2e97f21a8bdb66"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\b', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:52 executing program 0 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) r5 = socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) fsync(r5) 02:13:52 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x1000000}) [ 1328.993411][T29072] FAULT_INJECTION: forcing a failure. [ 1328.993411][T29072] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.027187][T29072] CPU: 1 PID: 29072 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1329.035117][T29072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1329.035122][T29072] Call Trace: [ 1329.035141][T29072] dump_stack+0x1d8/0x2f8 [ 1329.035158][T29072] should_fail+0x555/0x770 [ 1329.035175][T29072] __should_failslab+0x11a/0x160 [ 1329.062144][T29072] ? getname_flags+0xba/0x640 [ 1329.066827][T29072] should_failslab+0x9/0x20 [ 1329.071330][T29072] kmem_cache_alloc+0x56/0x2e0 [ 1329.076088][T29072] getname_flags+0xba/0x640 [ 1329.076104][T29072] user_path_at_empty+0x2d/0x50 [ 1329.076116][T29072] do_mount+0xd7/0x2510 [ 1329.076128][T29072] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1329.076138][T29072] ? copy_mount_options+0x5f/0x3c0 [ 1329.100241][T29072] ? __kasan_check_read+0x11/0x20 [ 1329.105268][T29072] ? copy_mount_options+0x308/0x3c0 [ 1329.110474][T29072] ksys_mount+0xcc/0x100 [ 1329.114708][T29072] __x64_sys_mount+0xbf/0xd0 [ 1329.119310][T29072] do_syscall_64+0xf7/0x1c0 [ 1329.119325][T29072] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1329.119335][T29072] RIP: 0033:0x45c98a [ 1329.119345][T29072] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1329.119351][T29072] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1329.119359][T29072] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1329.119368][T29072] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1329.129727][T29072] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1329.129733][T29072] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1329.129739][T29072] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:52 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x584) 02:13:52 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplui\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) r5 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/attr/current\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r5, &(0x7f00000002c0)={0x20000000}) ioctl$VT_ACTIVATE(r2, 0x5606, 0x40b) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f00000001c0), &(0x7f0000000240)=0xc) ioctl$SG_GET_LOW_DMA(r2, 0x227a, &(0x7f0000000040)) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) write$binfmt_misc(r8, &(0x7f0000000380)={'syz0', "d4d7274e339d426d36a0ce0c589af2deb5c97ace0e23ffe4e6c10eb971e0c825da74fbe9044676cd907f5070c1bd45aa2a981e30ace433ce7f7a29e42c12e51b7374b0494932df9e8dc9bedca11a029257fa9f3b45c929f16839dc315c3ecafd47d99a37e8f584bdf2a37b3c069c5524bbf2da7f81cf9218ebff27c7ea77fd6cd91636d588199c49a2bca2addb35b9d09e186adc9854b96c582230c216d0f1c7"}, 0xa4) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) getsockopt$ax25_int(r2, 0x101, 0x2, &(0x7f0000000300), &(0x7f0000000340)=0x4) 02:13:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:52 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x2000000}) 02:13:52 executing program 0 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1329.576428][T29189] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1329.616350][T29195] FAULT_INJECTION: forcing a failure. [ 1329.616350][T29195] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.643676][T29195] CPU: 1 PID: 29195 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1329.651626][T29195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1329.661693][T29195] Call Trace: [ 1329.665004][T29195] dump_stack+0x1d8/0x2f8 [ 1329.669343][T29195] should_fail+0x555/0x770 [ 1329.673772][T29195] __should_failslab+0x11a/0x160 [ 1329.678711][T29195] ? tomoyo_encode2+0x273/0x5a0 [ 1329.683576][T29195] should_failslab+0x9/0x20 [ 1329.688100][T29195] __kmalloc+0x7a/0x340 [ 1329.692259][T29195] tomoyo_encode2+0x273/0x5a0 [ 1329.696947][T29195] tomoyo_realpath_from_path+0x769/0x7c0 [ 1329.702589][T29195] tomoyo_mount_permission+0x294/0xa30 [ 1329.708051][T29195] ? filename_lookup+0x4b0/0x690 [ 1329.713000][T29195] ? kmem_cache_free+0xd8/0xf0 [ 1329.714635][T29189] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1329.717781][T29195] tomoyo_sb_mount+0x35/0x40 [ 1329.717798][T29195] security_sb_mount+0x84/0xe0 [ 1329.717814][T29195] do_mount+0x10a/0x2510 [ 1329.717834][T29195] ? copy_mount_options+0x278/0x3c0 [ 1329.717841][T29195] ? copy_mount_options+0x25e/0x3c0 [ 1329.717851][T29195] ? copy_mount_options+0x264/0x3c0 [ 1329.717864][T29195] ? copy_mount_options+0x308/0x3c0 [ 1329.762636][T29195] ksys_mount+0xcc/0x100 [ 1329.766886][T29195] __x64_sys_mount+0xbf/0xd0 [ 1329.771492][T29195] do_syscall_64+0xf7/0x1c0 [ 1329.775993][T29195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1329.781881][T29195] RIP: 0033:0x45c98a [ 1329.785776][T29195] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1329.805473][T29195] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1329.813931][T29195] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a 02:13:53 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x3000000}) [ 1329.821929][T29195] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1329.829903][T29195] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1329.837873][T29195] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1329.845846][T29195] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) r5 = fcntl$dupfd(r1, 0x406, r2) ioctl$KVM_PPC_ALLOCATE_HTAB(r5, 0xc004aea7, &(0x7f0000000040)=0xfff) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$TUNSETLINK(r1, 0x400454cd, 0x10e) r9 = getpid() getpgrp(r9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6c, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r9, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000100)='proc&}nodevnodevlowlan0\x00', r10}, 0x30) fcntl$setown(r8, 0x8, r9) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1329.891232][T29195] ERROR: Out of memory at tomoyo_realpath_from_path. 02:13:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\n', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) ioctl$sock_ax25_SIOCDELRT(r3, 0x890c, &(0x7f0000000180)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, 0x7, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @bcast, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r8, 0x0, r7) eventfd(0x80) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = socket$inet6(0xa, 0x2, 0x0) r13 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r13, 0x0, r12) write$binfmt_elf64(r12, 0x0, 0x11c) writev(r5, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r5, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r6) socket$netlink(0x10, 0x3, 0x4) ioctl$PPPIOCSNPMODE(r4, 0x4008744b, &(0x7f0000000040)={0x80fb}) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r4, 0x0, r6, 0x0, 0x80000001, 0x0) 02:13:53 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x4000000}) 02:13:53 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplul\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1330.094057][T29420] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1330.132539][T29420] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 02:13:53 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x600) 02:13:53 executing program 0 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r1) write$binfmt_elf64(r2, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x80, 0xa, 0x5, 0x2, 0x2, 0x3e, 0x1, 0x16f, 0x40, 0x3a2, 0x6, 0x1f, 0x38, 0x1, 0x1000, 0xffff, 0x7}, [{0x60000000, 0x10001, 0xffffffff, 0x10000, 0x5, 0x100000000, 0x63c}], "c8efecf19e09beb89c13c57c5956522605d6a4f43d508b03bf2c2ced0f3ff6bdc81a7453b33b10e341e6a1dd84c37ead9f0fe3a0be66f016945036b738c0ccc3b6a38b8b44b513d19c9b55f89d499b7f5b5daa8d521a544934638e967ad83f6b6309c9bba7c2037dce804021be94b4caded5c8b03dc5b8ec22f72b0956fd65d8f2f3adbd2681f2b714c6eff4097eb5629833ffa0c725f6c7b27186c505f74b9808bcf12f576666fda7e812262466a2f9eb5cd2c4b09664d775bb38ad068b8fe34c0a26a1c34440794863ed4222b6a94271c73ad40bf22ad8a0c5d8f24cce521ba95fa80bf9ad9f0e7812d867b2b6", [[], []]}, 0x366) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r6, 0x0, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c41e100009155a6db0600050001019fa5d4b3"], 0xe) close(r5) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 02:13:53 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x5000000}) 02:13:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\v', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:53 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspluo\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1330.508476][T29548] FAULT_INJECTION: forcing a failure. [ 1330.508476][T29548] name failslab, interval 1, probability 0, space 0, times 0 [ 1330.561244][T29548] CPU: 1 PID: 29548 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1330.569190][T29548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1330.579244][T29548] Call Trace: [ 1330.582538][T29548] dump_stack+0x1d8/0x2f8 [ 1330.586962][T29548] should_fail+0x555/0x770 [ 1330.591391][T29548] __should_failslab+0x11a/0x160 [ 1330.596356][T29548] ? getname_kernel+0x59/0x2f0 [ 1330.601139][T29548] should_failslab+0x9/0x20 [ 1330.605645][T29548] kmem_cache_alloc+0x56/0x2e0 [ 1330.610425][T29548] getname_kernel+0x59/0x2f0 [ 1330.615013][T29548] kern_path+0x1f/0x40 [ 1330.619075][T29548] tomoyo_mount_permission+0x7f1/0xa30 [ 1330.624542][T29548] ? kmem_cache_free+0xd8/0xf0 [ 1330.629321][T29548] tomoyo_sb_mount+0x35/0x40 [ 1330.633909][T29548] security_sb_mount+0x84/0xe0 [ 1330.638671][T29548] do_mount+0x10a/0x2510 [ 1330.642916][T29548] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1330.648470][T29548] ? copy_mount_options+0x5f/0x3c0 [ 1330.653598][T29548] ? copy_mount_options+0x308/0x3c0 [ 1330.658810][T29548] ksys_mount+0xcc/0x100 [ 1330.663060][T29548] __x64_sys_mount+0xbf/0xd0 [ 1330.667656][T29548] do_syscall_64+0xf7/0x1c0 [ 1330.672158][T29548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1330.678040][T29548] RIP: 0033:0x45c98a [ 1330.681926][T29548] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1330.701540][T29548] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 02:13:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x57189c83687006bc}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x60, r5, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x3f, 0x0}}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr="848f6adb0cd56db795e1bb42c00bb632"}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x8001, 0x6, 0xffffffff, 0x6]}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x2}]}, 0x60}, 0x1, 0x0, 0x0, 0x4040814}, 0x4000) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:54 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x6000000}) [ 1330.709950][T29548] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1330.717921][T29548] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1330.725886][T29548] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1330.733852][T29548] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1330.741820][T29548] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) msgget(0x3, 0x80) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x4, 0x8000, 0x6d}, 0x2c) ioctl$EVIOCGMTSLOTS(r7, 0x8040450a, &(0x7f0000000040)=""/122) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:54 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplup\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:54 executing program 0 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\f', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1331.047847][T29780] FAULT_INJECTION: forcing a failure. [ 1331.047847][T29780] name failslab, interval 1, probability 0, space 0, times 0 [ 1331.066641][T29780] CPU: 1 PID: 29780 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1331.074551][T29780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1331.084606][T29780] Call Trace: [ 1331.087896][T29780] dump_stack+0x1d8/0x2f8 [ 1331.092223][T29780] should_fail+0x555/0x770 [ 1331.096640][T29780] __should_failslab+0x11a/0x160 [ 1331.101572][T29780] ? tomoyo_encode2+0x273/0x5a0 [ 1331.106415][T29780] should_failslab+0x9/0x20 [ 1331.110908][T29780] __kmalloc+0x7a/0x340 [ 1331.115058][T29780] tomoyo_encode2+0x273/0x5a0 [ 1331.119733][T29780] tomoyo_encode+0x29/0x40 [ 1331.124139][T29780] tomoyo_mount_permission+0x216/0xa30 [ 1331.129590][T29780] ? filename_lookup+0x4b0/0x690 [ 1331.134523][T29780] ? kmem_cache_free+0xd8/0xf0 [ 1331.139298][T29780] tomoyo_sb_mount+0x35/0x40 [ 1331.143881][T29780] security_sb_mount+0x84/0xe0 [ 1331.148640][T29780] do_mount+0x10a/0x2510 [ 1331.152875][T29780] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1331.158405][T29780] ? copy_mount_options+0x5f/0x3c0 [ 1331.163507][T29780] ? copy_mount_options+0x308/0x3c0 [ 1331.168708][T29780] ksys_mount+0xcc/0x100 [ 1331.172940][T29780] __x64_sys_mount+0xbf/0xd0 [ 1331.177532][T29780] do_syscall_64+0xf7/0x1c0 [ 1331.182028][T29780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1331.187911][T29780] RIP: 0033:0x45c98a [ 1331.191794][T29780] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1331.211385][T29780] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1331.219783][T29780] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1331.227756][T29780] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1331.235715][T29780] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1331.243675][T29780] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1331.251641][T29780] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="a71067f636fa3f91fac052334191fbf252efd6fc47553b51bf4fe9aeb744e330053bc32ffc723e28eb6ef1eaf35e6346dce7b85663bf4bf33c16218db3e668afe20debc0995bca9f6a91db274e79d01d7c2140ea1b0e114677f67640fb2259be2d48af97622313520ec83ff9ba12edf924815058f2e908") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) r5 = semget(0x2, 0x2, 0x20) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000040)=0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r7, &(0x7f0000001280), r8, 0x0, 0x800000a, 0x0) r9 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) splice(r9, &(0x7f0000001280)=0x2, 0xffffffffffffffff, 0x0, 0x800000a, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) fsetxattr$system_posix_acl(r7, &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="020000000100eb000000000002000100", @ANYRES32=0x0, @ANYBLOB="040002000000000008000400", @ANYRES32=r10, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32=0x0, @ANYBLOB="1000000000000000200000000000"], 0xb, 0x1) r11 = socket$inet6(0xa, 0x2, 0x0) r12 = socket$inet6(0xa, 0x2, 0x0) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$NS_GET_OWNER_UID(r13, 0xb704, &(0x7f0000000080)=0x0) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000240)={{0x1, r6, r10, r14, 0xee01, 0x62, 0x1b}, 0x8000, 0x7, 0x3}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfde4) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) r15 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r17 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r18) setresuid(0x0, r18, r16) r19 = add_key(&(0x7f00000002c0)='ceph\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000500)="95d2ce0571c4db10be7fbf0e955c8e7541ebe9ee3b2afde0c5773715e6ae3653649cf9b0b59585420111c53cca67bb95e3a20334dfb26614ae9575d561422cff4ffff52bade889e05be86594bc4c0e29303be66dcd2c517991ba11b0d97a6fe63e0e0011061e9584ce65f5fea36cb54836ee56dfec2f5482d0a34f59d1da8b047240572c47b2fd888f0294be8ceb9179a98d9d921160fd3ad8c5d98d61", 0x9d, 0xfffffffffffffffe) keyctl$get_persistent(0x16, r18, r19) 02:13:54 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x7000000}) 02:13:54 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplut\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:54 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x700) 02:13:54 executing program 0 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1331.454655][T29796] FAULT_INJECTION: forcing a failure. [ 1331.454655][T29796] name failslab, interval 1, probability 0, space 0, times 0 [ 1331.498829][T29796] CPU: 1 PID: 29796 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1331.506770][T29796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1331.516854][T29796] Call Trace: [ 1331.520151][T29796] dump_stack+0x1d8/0x2f8 [ 1331.524484][T29796] should_fail+0x555/0x770 [ 1331.528902][T29796] __should_failslab+0x11a/0x160 [ 1331.533841][T29796] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1331.539558][T29796] should_failslab+0x9/0x20 [ 1331.544060][T29796] __kmalloc+0x7a/0x340 02:13:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r3, 0x0, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000001ac0)=ANY=[@ANYRESDEC], 0x14) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd6e) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x80, 0x10001) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) splice(0xffffffffffffffff, 0x0, r6, 0x0, 0x2, 0x5) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stack\x00') ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r7, 0xc0045540, &(0x7f0000000180)=0xd5) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000440)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000580)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000680)=0x10364) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) r10 = getpid() r11 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r13 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r14) setresuid(0x0, r14, r12) getresgid(&(0x7f0000000780), &(0x7f00000007c0)=0x0, &(0x7f0000000800)) clone3(&(0x7f0000001980)={0x800000, &(0x7f0000000840)=0xffffffffffffffff, &(0x7f0000000880)=0x0, &(0x7f00000008c0), 0x1c, 0x0, &(0x7f0000000900)=""/4096, 0x1000, &(0x7f0000001900)=""/84}, 0x40) lstat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r19, &(0x7f0000001280), r20, 0x0, 0x800000a, 0x0) r21 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) splice(r21, &(0x7f0000001280)=0x2, 0xffffffffffffffff, 0x0, 0x800000a, 0x0) getsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) r23 = socket$inet6(0xa, 0x2, 0x0) r24 = socket$inet6(0xa, 0x2, 0x0) r25 = fcntl$dupfd(r24, 0x0, r23) setsockopt$IP_VS_SO_SET_ADD(r25, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) r26 = socket$inet6(0xa, 0x2, 0x0) r27 = socket$inet6(0xa, 0x2, 0x0) r28 = fcntl$dupfd(r27, 0x0, r26) ioctl$PERF_EVENT_IOC_ENABLE(r28, 0x8912, 0x400200) fsetxattr$system_posix_acl(r19, &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000001b40)=ANY=[@ANYBLOB="020000000100eb000000000002000100", @ANYRES32=0x0, @ANYRESOCT=r16, @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRES64, @ANYPTR, @ANYRESDEC=r28, @ANYRESOCT], @ANYRESDEC=r26, @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32=0x0, @ANYBLOB="100000000000000020000000a804"], 0xb, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001a80)=0x0) r30 = socket$inet6(0xa, 0x2, 0x0) r31 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r31, 0x0, r30) socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr=0x9, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001bc0)=0x171) getresgid(&(0x7f0000001c00), &(0x7f0000001c40)=0x0, &(0x7f0000001c80)) r34 = getegid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000340)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000003c0)="3721375f9921d52fd08112dbd036b02bd8e6fbb4c14730418d51c4ba65472a0a6979e0e3ef539fefcab3d37867651c0e39dcf9f46d3bf1f754b8e107043786f630cfe5a81cea87743138b28d9380d885b41d3b2344fe7f6e8c7ccb038a5da3599058ecc15f430b", 0x67}, {&(0x7f00000004c0)="f46dd0198e3c18a951202f2882d5e7df0afa533511702431947163c3e2911d6d9271bd5556cfc2304021b1fd55500a02bd135a5da48d8488e016733a5b2f3502120b12b1a678e055daa325198f04f3741e5b36ecd4a8ff14577f5ff115386dccd66c5043527b66f6ac5438355028f7749164e14f1ce407e53d6b106d14bd28415f58011e1fcc", 0x86}], 0x2, &(0x7f0000001cc0)=[@cred={{0x1c, 0x1, 0x2, {r8, r9, r34}}}, @cred={{0x1c, 0x1, 0x2, {r10, r12, r15}}}, @cred={{0x1c, 0x1, 0x2, {r17, r18, r22}}}, @cred={{0x1c, 0x1, 0x2, {r29, r32, r33}}}], 0x80, 0x10}, 0x4) r35 = dup2(0xffffffffffffffff, r1) setsockopt$inet_IP_XFRM_POLICY(r35, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@broadcast, 0x4e22, 0x3, 0x4e21, 0x5, 0xa, 0x0, 0x20, 0x1, 0x0, 0xee00}, {0x9f7, 0x29d6, 0x5, 0x101, 0x1, 0xff16, 0xc97, 0x3}, {0x0, 0x1, 0x60a64ada, 0x4}, 0x1, 0x0, 0x6, 0x1, 0x2, 0x20b0029911d60757}, {{@in=@empty, 0x4d3, 0xff}, 0x7, @in=@multicast2, 0x34ff, 0x0, 0x2, 0x7, 0x1, 0x9, 0x3}}, 0xe8) [ 1331.548210][T29796] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1331.553930][T29796] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1331.559501][T29796] tomoyo_mount_permission+0x923/0xa30 [ 1331.564989][T29796] ? kmem_cache_free+0xd8/0xf0 [ 1331.569767][T29796] tomoyo_sb_mount+0x35/0x40 [ 1331.574356][T29796] security_sb_mount+0x84/0xe0 [ 1331.579127][T29796] do_mount+0x10a/0x2510 [ 1331.583362][T29796] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1331.588894][T29796] ? copy_mount_options+0x5f/0x3c0 [ 1331.594032][T29796] ? copy_mount_options+0x308/0x3c0 [ 1331.599223][T29796] ksys_mount+0xcc/0x100 [ 1331.603458][T29796] __x64_sys_mount+0xbf/0xd0 [ 1331.608043][T29796] do_syscall_64+0xf7/0x1c0 [ 1331.612543][T29796] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1331.618426][T29796] RIP: 0033:0x45c98a [ 1331.622319][T29796] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 02:13:54 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x8000000}) [ 1331.641910][T29796] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1331.650311][T29796] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1331.658404][T29796] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1331.666374][T29796] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1331.674342][T29796] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1331.682315][T29796] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1331.691561][T29796] ERROR: Out of memory at tomoyo_realpath_from_path. 02:13:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\r', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:55 executing program 0 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid', 0x3d, r5}}, {@seclabel='seclabel'}]}) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:55 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspluu\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1332.001012][T30021] FAULT_INJECTION: forcing a failure. [ 1332.001012][T30021] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1332.014363][T30021] CPU: 1 PID: 30021 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1332.022271][T30021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1332.032337][T30021] Call Trace: [ 1332.032357][T30021] dump_stack+0x1d8/0x2f8 [ 1332.032374][T30021] should_fail+0x555/0x770 [ 1332.032391][T30021] should_fail_alloc_page+0x55/0x60 [ 1332.032400][T30021] prepare_alloc_pages+0x283/0x460 [ 1332.032415][T30021] __alloc_pages_nodemask+0xb2/0x5d0 [ 1332.032434][T30021] kmem_getpages+0x4d/0xa00 [ 1332.040028][T30021] cache_grow_begin+0x7e/0x2c0 [ 1332.040044][T30021] cache_alloc_refill+0x311/0x3f0 [ 1332.040059][T30021] ? check_preemption_disabled+0xb7/0x2a0 [ 1332.040076][T30021] kmem_cache_alloc+0x2b9/0x2e0 [ 1332.040086][T30021] ? getname_kernel+0x59/0x2f0 [ 1332.040099][T30021] getname_kernel+0x59/0x2f0 [ 1332.040109][T30021] kern_path+0x1f/0x40 [ 1332.040120][T30021] tomoyo_mount_permission+0x7f1/0xa30 [ 1332.040142][T30021] ? kmem_cache_free+0xd8/0xf0 [ 1332.040168][T30021] tomoyo_sb_mount+0x35/0x40 [ 1332.112949][T30021] security_sb_mount+0x84/0xe0 [ 1332.117732][T30021] do_mount+0x10a/0x2510 [ 1332.121970][T30021] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1332.127509][T30021] ? copy_mount_options+0x5f/0x3c0 [ 1332.132620][T30021] ? copy_mount_options+0x308/0x3c0 [ 1332.137809][T30021] ksys_mount+0xcc/0x100 [ 1332.142047][T30021] __x64_sys_mount+0xbf/0xd0 [ 1332.146726][T30021] do_syscall_64+0xf7/0x1c0 [ 1332.151229][T30021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1332.157110][T30021] RIP: 0033:0x45c98a [ 1332.161001][T30021] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1332.180598][T30021] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1332.189000][T30021] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a 02:13:55 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x9000000}) [ 1332.196968][T30021] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1332.204932][T30021] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1332.212905][T30021] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1332.220869][T30021] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x0e', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:55 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x900) 02:13:55 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0xa000000}) 02:13:55 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0xb000000}) 02:13:55 executing program 0 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) getcwd(&(0x7f00000004c0)=""/4096, 0x1000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:55 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplux\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:55 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0xc000000}) 02:13:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$int_out(r0, 0x5462, &(0x7f0000000300)) write$binfmt_elf64(r4, 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r6, 0x0, r5) ftruncate(r5, 0xfffffffeffffffff) accept$nfc_llcp(r2, &(0x7f0000000240), &(0x7f00000001c0)=0x60) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x10080, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f0000000080), &(0x7f0000000180)=0x4) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f4558410600050001019fa5d4b3"], 0xe) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f00000002c0)) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1332.725711][T30365] FAULT_INJECTION: forcing a failure. [ 1332.725711][T30365] name failslab, interval 1, probability 0, space 0, times 0 [ 1332.763287][T30365] CPU: 0 PID: 30365 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 02:13:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x10', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1332.771225][T30365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1332.781274][T30365] Call Trace: [ 1332.781294][T30365] dump_stack+0x1d8/0x2f8 [ 1332.781310][T30365] should_fail+0x555/0x770 [ 1332.781329][T30365] __should_failslab+0x11a/0x160 [ 1332.781340][T30365] ? getname_kernel+0x59/0x2f0 [ 1332.781353][T30365] should_failslab+0x9/0x20 [ 1332.781364][T30365] kmem_cache_alloc+0x56/0x2e0 [ 1332.781376][T30365] getname_kernel+0x59/0x2f0 [ 1332.781386][T30365] kern_path+0x1f/0x40 [ 1332.781409][T30365] tomoyo_mount_permission+0x7f1/0xa30 [ 1332.781429][T30365] ? kmem_cache_free+0xd8/0xf0 [ 1332.781454][T30365] tomoyo_sb_mount+0x35/0x40 [ 1332.781468][T30365] security_sb_mount+0x84/0xe0 [ 1332.781479][T30365] do_mount+0x10a/0x2510 [ 1332.781488][T30365] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1332.781499][T30365] ? copy_mount_options+0x5f/0x3c0 [ 1332.817062][T30365] ? copy_mount_options+0x308/0x3c0 [ 1332.817077][T30365] ksys_mount+0xcc/0x100 [ 1332.817091][T30365] __x64_sys_mount+0xbf/0xd0 [ 1332.817107][T30365] do_syscall_64+0xf7/0x1c0 02:13:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1332.817121][T30365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1332.817131][T30365] RIP: 0033:0x45c98a [ 1332.817141][T30365] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1332.817147][T30365] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1332.817156][T30365] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a 02:13:56 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0xd000000}) [ 1332.817161][T30365] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1332.817166][T30365] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1332.817171][T30365] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1332.817177][T30365] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:56 executing program 0 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1333.292954][T30595] FAULT_INJECTION: forcing a failure. [ 1333.292954][T30595] name failslab, interval 1, probability 0, space 0, times 0 [ 1333.305739][T30595] CPU: 1 PID: 30595 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1333.305750][T30595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1333.323788][T30595] Call Trace: [ 1333.323808][T30595] dump_stack+0x1d8/0x2f8 [ 1333.323824][T30595] should_fail+0x555/0x770 [ 1333.323844][T30595] __should_failslab+0x11a/0x160 [ 1333.323857][T30595] ? tomoyo_encode2+0x273/0x5a0 [ 1333.345609][T30595] should_failslab+0x9/0x20 [ 1333.350110][T30595] __kmalloc+0x7a/0x340 [ 1333.354266][T30595] tomoyo_encode2+0x273/0x5a0 [ 1333.358942][T30595] tomoyo_realpath_from_path+0x769/0x7c0 [ 1333.364605][T30595] tomoyo_mount_permission+0x294/0xa30 [ 1333.370068][T30595] ? filename_lookup+0x4b0/0x690 [ 1333.375005][T30595] ? kmem_cache_free+0xd8/0xf0 [ 1333.379782][T30595] tomoyo_sb_mount+0x35/0x40 [ 1333.384371][T30595] security_sb_mount+0x84/0xe0 [ 1333.389137][T30595] do_mount+0x10a/0x2510 [ 1333.393374][T30595] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1333.398907][T30595] ? copy_mount_options+0x5f/0x3c0 [ 1333.404014][T30595] ? copy_mount_options+0x308/0x3c0 [ 1333.409216][T30595] ksys_mount+0xcc/0x100 [ 1333.413463][T30595] __x64_sys_mount+0xbf/0xd0 [ 1333.418055][T30595] do_syscall_64+0xf7/0x1c0 [ 1333.422555][T30595] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1333.428440][T30595] RIP: 0033:0x45c98a [ 1333.432325][T30595] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1333.451920][T30595] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1333.460334][T30595] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1333.468300][T30595] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1333.476267][T30595] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1333.484242][T30595] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 02:13:56 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0xa00) 02:13:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r3, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c41020105ff4100cce23286c0be9e4095a142192064e87a69b3759c309836585a62b1bda042ea3c8d20b9c6a01b1b4c293588725cb6361c3ebb4d5c5f5d26dfbaa5ea2e2b1e4b9be21d35faff2d65e7c8484d307f20f89c3cea06b69300b5"], 0xe) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000280)=""/180) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x4) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000240)={0xc56, 0x10000}) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0x0, r5}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000810800010063627100180402000304060003000000003bae10ffffff9e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) bind(r3, &(0x7f0000000340)=@xdp={0x2c, 0x8, r6, 0x1d}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) accept$netrom(r7, &(0x7f0000000180)={{0x3, @null}, [@null, @remote, @null, @default, @null, @netrom, @netrom, @rose]}, &(0x7f0000000080)=0x48) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 02:13:56 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfspluz\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x11', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:56 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0xe000000}) [ 1333.492211][T30595] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1333.513827][T30595] ERROR: Out of memory at tomoyo_realpath_from_path. 02:13:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r7, 0xc0845658, &(0x7f0000000240)={0x0, @reserved}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:56 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x10000000}) 02:13:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r7, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) write$apparmor_current(r1, &(0x7f0000000180)=@profile={'permprofile ', 'sh\x00'}, 0xf) 02:13:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x12', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:57 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x11000000}) 02:13:57 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x02', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:57 executing program 0 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1333.948994][T30922] FAULT_INJECTION: forcing a failure. [ 1333.948994][T30922] name failslab, interval 1, probability 0, space 0, times 0 [ 1333.963372][T30922] CPU: 0 PID: 30922 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1333.971280][T30922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1333.981330][T30922] Call Trace: [ 1333.984621][T30922] dump_stack+0x1d8/0x2f8 [ 1333.988956][T30922] should_fail+0x555/0x770 [ 1333.993372][T30922] __should_failslab+0x11a/0x160 [ 1333.998307][T30922] ? vfs_parse_fs_string+0xed/0x1a0 [ 1334.003508][T30922] should_failslab+0x9/0x20 [ 1334.008452][T30922] __kmalloc_track_caller+0x79/0x340 [ 1334.013744][T30922] kmemdup_nul+0x2a/0xa0 [ 1334.017982][T30922] vfs_parse_fs_string+0xed/0x1a0 [ 1334.023005][T30922] vfs_kern_mount+0x77/0x160 [ 1334.027612][T30922] btrfs_mount+0x34f/0x18e0 [ 1334.032120][T30922] ? check_preemption_disabled+0x47/0x2a0 [ 1334.037835][T30922] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1334.043127][T30922] ? cap_capable+0x250/0x290 [ 1334.047711][T30922] ? safesetid_security_capable+0x89/0xf0 [ 1334.053432][T30922] legacy_get_tree+0xf9/0x1a0 [ 1334.058100][T30922] ? btrfs_resize_thread_pool+0x290/0x290 [ 1334.063832][T30922] vfs_get_tree+0x8b/0x2a0 [ 1334.068248][T30922] do_mount+0x16c0/0x2510 [ 1334.072571][T30922] ? copy_mount_options+0x2fe/0x3c0 [ 1334.077759][T30922] ? copy_mount_options+0x308/0x3c0 [ 1334.082953][T30922] ? __sanitizer_cov_trace_pc+0x22/0x50 [ 1334.088501][T30922] ? copy_mount_options+0x308/0x3c0 [ 1334.093692][T30922] ksys_mount+0xcc/0x100 [ 1334.097933][T30922] __x64_sys_mount+0xbf/0xd0 [ 1334.102520][T30922] do_syscall_64+0xf7/0x1c0 [ 1334.107021][T30922] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1334.112904][T30922] RIP: 0033:0x45c98a [ 1334.116791][T30922] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1334.136385][T30922] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1334.144786][T30922] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1334.152749][T30922] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1334.160709][T30922] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1334.168669][T30922] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1334.176651][T30922] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:57 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0xb00) 02:13:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:57 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x12000000}) 02:13:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs%', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:57 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x03', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:57 executing program 0 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x8b472a4f5950bede, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x5) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1334.522608][T30970] FAULT_INJECTION: forcing a failure. [ 1334.522608][T30970] name failslab, interval 1, probability 0, space 0, times 0 [ 1334.575181][T30970] CPU: 1 PID: 30970 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1334.583121][T30970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1334.593187][T30970] Call Trace: [ 1334.596481][T30970] dump_stack+0x1d8/0x2f8 [ 1334.600810][T30970] should_fail+0x555/0x770 [ 1334.605230][T30970] __should_failslab+0x11a/0x160 [ 1334.610167][T30970] should_failslab+0x9/0x20 [ 1334.614666][T30970] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1334.619947][T30970] ? legacy_init_fs_context+0x51/0xc0 [ 1334.625320][T30970] legacy_init_fs_context+0x51/0xc0 [ 1334.630514][T30970] alloc_fs_context+0x53a/0x640 [ 1334.635365][T30970] fs_context_for_mount+0x24/0x30 [ 1334.640495][T30970] do_mount+0x10a7/0x2510 [ 1334.644824][T30970] ? copy_mount_options+0x308/0x3c0 [ 1334.650969][T30970] ksys_mount+0xcc/0x100 [ 1334.655209][T30970] __x64_sys_mount+0xbf/0xd0 [ 1334.659794][T30970] do_syscall_64+0xf7/0x1c0 [ 1334.664293][T30970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1334.670179][T30970] RIP: 0033:0x45c98a [ 1334.674070][T30970] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1334.693669][T30970] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1334.702086][T30970] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1334.710053][T30970] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1334.718015][T30970] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 02:13:58 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x25000000}) [ 1334.725984][T30970] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1334.733942][T30970] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsH', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:58 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x04', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:58 executing program 0 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r1) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000003c0)={0x6, [0x800, 0x908, 0x4, 0x4, 0x52, 0x0]}, &(0x7f0000000400)=0x10) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r6, 0x0, 0x0) r7 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r7) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r7, 0x84, 0xe, &(0x7f0000000300)={r9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) r10 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r10) r11 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000001f40)=[@in6={0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x22}, 0xffffffff}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r10, 0x84, 0xe, &(0x7f0000000300)={r12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) r13 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r13) r14 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r14, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r14, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r13, 0x84, 0xe, &(0x7f0000000300)={r15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000b00)={r15, 0x6fd4, 0x6}, &(0x7f0000000b40)=0x8) sendmmsg$inet_sctp(r4, &(0x7f0000001e80)=[{&(0x7f0000000440)=@in6={0xa, 0x4e20, 0x7, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4}, 0x1c, &(0x7f0000000580)=[{&(0x7f00000004c0)="877f01bda1f917870b637fa0f185f57599f24adbbc24568e4ce8a2ee63a0690db66af76b2bef91f25ee99d86eaa9b81281576314448821cb18dabe6a7904fc58bcea09d3550ff5493e7fc417d6f0baa49f1ed11eafde26491332bc01ecca02b7e738ba2c4f27e8e1a6a242ea529561991e04340e5a1c0588a342582918984f3f2dae69b675f9ee95b93e0196d4454e", 0x8f}], 0x1, &(0x7f00000005c0)=[@sndrcv={0x30, 0x84, 0x1, {0x2d27, 0x1, 0x8000, 0x98, 0x400, 0xa9, 0x20, 0x40, r9}}, @dstaddrv6={0x20, 0x84, 0x8, @local}, @authinfo={0x18, 0x84, 0x6, {0x9e76}}, @sndrcv={0x30, 0x84, 0x1, {0x5, 0x8100, 0x8000, 0x6, 0x200, 0x1, 0xe000, 0x8, r12}}], 0x98, 0x200408c1}, {&(0x7f0000000680)=@in6={0xa, 0x4e24, 0x0, @empty, 0x7fff}, 0x1c, &(0x7f0000000a80)=[{&(0x7f00000006c0)="866abe1d990cca14873479f7d391bd13639c3b099349716af32ba5984d388f79dc9cf1b095211dd76f4aef882bdddd0d865c4c23acc17fe04f443d19039cb55d9c7765357fb5c713d8eaffbf2d2e786f5d68ee25fff0f91a968714190aff118b8fcb397ec7921b6d7a86e8c36775b5b300692e527ebe6d427bf348c847", 0x7d}, {&(0x7f0000000740)="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", 0xfb}, {&(0x7f0000000840)="63cc5a4e7ba170134de8309f7fb23457fab57c35aaa15c90ad4b6d643cace033d6f28a7c98b7e0f37bb26f63f3d4a22f000930c6e981b5daee90a1e2f5df03367474f5cca9036f3e5f1daeeb31742393da0f6e0eedd91473d88e9469e96bf7b798f4c2af0d0eae9ce9d6e7017478134d1088f87bbf1e9133f953de0c850162b62991e338110e83db109c5859c13e40368435b5398a6dc8c1dc8499c263757d1a013898c1a3be9708c5718909e007d264dcf7f07e6f012f9d8216f4ea0860107ecc36a578c32f2519e973e321692bb461c8cefc259bfb1bc2462238e4d34b2a6ff6059157299d6af5db0a4e4a706eb3c632f194a060456ea4ff", 0xf9}, {&(0x7f0000000940)="c8edc9ec0a32c261451707d64bb8849679c7c66707ea28a7712763f0f39c2c6eb9834fe9b5962de26b295624a385356d2469da58a2335b78a2", 0x39}, {&(0x7f0000000980)="0e123a847dfed3b3bb90d56a44b113d04869168aa55c54b9e975de231e27c1dc81da10f7b479a53e8e63564acecc22cc2c2559f36530346baba98032d72be30c9f0d52091a22f58dfd3e498bfde0c5c244880d484766768edc6a75425ef9cd97f8552fea93a2998d85e5aef91e6f47fb06841bcf1587cb3e1919fc29ac353a8f55ac2b32eb4a24ae8e44256082bba3127f8929109bb287b91e394aa2f67472fac18ab7faaac689d21fb38e9b1c9766688ae75fc899bee02513458ec11c7115c40da3730483beb6aad26b624401617f794d407dc8a006d88272", 0xd9}], 0x5, &(0x7f0000000b80)=[@authinfo={0x18, 0x84, 0x6, {0x8a}}, @authinfo={0x18, 0x84, 0x6, {0x6}}, @sndrcv={0x30, 0x84, 0x1, {0x20, 0x80, 0x8002, 0x0, 0x4, 0x5, 0x43a, 0x806}}, @authinfo={0x18, 0x84, 0x6, {0x8}}, @sndinfo={0x20, 0x84, 0x2, {0x1, 0x8, 0x0, 0x7, r16}}], 0x98, 0x4009045}, {&(0x7f0000000c40)=@in6={0xa, 0x4e21, 0x6, @rand_addr="e0036ad7ea26d6e8b4bf488a13c1609a", 0x401}, 0x1c, &(0x7f0000001e00)=[{&(0x7f0000000c80)="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", 0x1000}, {&(0x7f0000001c80)="69abe65c60c8b353e2f304c25f10d649a3bb56417ad848eb7d642bf42821e83b98628f962ed8abe510ae4a200026313130cf8230822174c9099362afeae6668cec66881edcb977eaf0a8a78f1490a68591cc8218b9ab2ca58d9e9004f40d8c5102fca320ee6bc2fcfd52c8b2340fb5f2a37259309395f5b75c54762d14dbfe801b31b8e3a7d3fdf3bdddc701e76a7cde06ff4b50a57c710014ad638461048d19f42d6b5fffcd207a04ef62a4defc67fed183b449f91e1ebed4391119f27a72e761c8fd77340bbf346a379f61ddf587547e861a69fd00a5c87c88798e58bdc55d6150a6636182c4", 0xe7}, {&(0x7f0000001d80)="131bdf0a84d232754784c93055fc155a60c3e56c23d3c5e750d10ff135b7ac3f37e639917f37b733af36d69342c1897910a9e9cbe710e30297628d59545da5522c498c96f6bc7287eea0c5624b75ab1b721669ba62e7fb076650b8cd78", 0x5d}], 0x3, &(0x7f0000001e40)=[@prinfo={0x18, 0x84, 0x5, {0x30, 0x5}}, @dstaddrv6={0x20, 0x84, 0x8, @remote}], 0x38, 0x20000000}], 0x3, 0x40) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) r17 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x7, 0x8000) ioctl$TUNGETSNDBUF(r17, 0x800454d3, &(0x7f0000000080)) close(r5) r18 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="bda91e5b", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r18, 0x84, 0xe, &(0x7f0000000300)={r19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000001c0)={r19, 0x7}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000280)={r20, 0x89e2}, &(0x7f00000002c0)=0x8) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfd6e) r21 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x4, 0x2) ioctl$MON_IOCT_RING_SIZE(r21, 0x9204, 0x36718) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) [ 1335.048744][T31192] FAULT_INJECTION: forcing a failure. [ 1335.048744][T31192] name failslab, interval 1, probability 0, space 0, times 0 [ 1335.105688][T31192] CPU: 1 PID: 31192 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1335.113626][T31192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1335.113631][T31192] Call Trace: [ 1335.113651][T31192] dump_stack+0x1d8/0x2f8 [ 1335.113667][T31192] should_fail+0x555/0x770 [ 1335.113686][T31192] __should_failslab+0x11a/0x160 [ 1335.113699][T31192] ? btrfs_mount+0x83/0x18e0 [ 1335.113714][T31192] should_failslab+0x9/0x20 [ 1335.149787][T31192] __kmalloc_track_caller+0x79/0x340 [ 1335.155076][T31192] ? __fs_reclaim_release+0x4/0x20 [ 1335.155092][T31192] kstrdup+0x34/0x70 [ 1335.155104][T31192] btrfs_mount+0x83/0x18e0 [ 1335.155124][T31192] ? check_preemption_disabled+0x47/0x2a0 [ 1335.155139][T31192] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1335.179509][T31192] ? cap_capable+0x250/0x290 [ 1335.184126][T31192] ? safesetid_security_capable+0x89/0xf0 [ 1335.189859][T31192] legacy_get_tree+0xf9/0x1a0 [ 1335.194546][T31192] ? btrfs_resize_thread_pool+0x290/0x290 [ 1335.200275][T31192] vfs_get_tree+0x8b/0x2a0 [ 1335.204699][T31192] do_mount+0x16c0/0x2510 [ 1335.209041][T31192] ? copy_mount_options+0x308/0x3c0 [ 1335.214249][T31192] ksys_mount+0xcc/0x100 [ 1335.218500][T31192] __x64_sys_mount+0xbf/0xd0 [ 1335.223106][T31192] do_syscall_64+0xf7/0x1c0 [ 1335.227628][T31192] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1335.233529][T31192] RIP: 0033:0x45c98a [ 1335.237436][T31192] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1335.257041][T31192] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1335.265461][T31192] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1335.273445][T31192] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1335.281450][T31192] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1335.289428][T31192] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1335.297402][T31192] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:58 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0xc00) 02:13:58 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x40000000}) 02:13:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsL', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:58 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x05', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:58 executing program 0 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:58 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x5c000000}) [ 1335.582812][T31326] FAULT_INJECTION: forcing a failure. [ 1335.582812][T31326] name failslab, interval 1, probability 0, space 0, times 0 02:13:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\\', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1335.656214][T31326] CPU: 0 PID: 31326 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1335.664152][T31326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1335.674316][T31326] Call Trace: [ 1335.677608][T31326] dump_stack+0x1d8/0x2f8 [ 1335.681959][T31326] should_fail+0x555/0x770 [ 1335.686380][T31326] __should_failslab+0x11a/0x160 [ 1335.691315][T31326] ? tomoyo_encode2+0x273/0x5a0 [ 1335.696161][T31326] should_failslab+0x9/0x20 [ 1335.700662][T31326] __kmalloc+0x7a/0x340 [ 1335.704816][T31326] tomoyo_encode2+0x273/0x5a0 [ 1335.709493][T31326] tomoyo_realpath_from_path+0x769/0x7c0 [ 1335.715131][T31326] tomoyo_mount_permission+0x923/0xa30 [ 1335.720598][T31326] ? kmem_cache_free+0xd8/0xf0 [ 1335.725395][T31326] tomoyo_sb_mount+0x35/0x40 [ 1335.729982][T31326] security_sb_mount+0x84/0xe0 [ 1335.734741][T31326] do_mount+0x10a/0x2510 [ 1335.738982][T31326] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1335.744523][T31326] ? copy_mount_options+0x5f/0x3c0 [ 1335.749637][T31326] ? copy_mount_options+0x308/0x3c0 [ 1335.754838][T31326] ksys_mount+0xcc/0x100 [ 1335.759081][T31326] __x64_sys_mount+0xbf/0xd0 [ 1335.763666][T31326] do_syscall_64+0xf7/0x1c0 [ 1335.768175][T31326] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1335.774062][T31326] RIP: 0033:0x45c98a [ 1335.777952][T31326] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1335.798077][T31326] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1335.806589][T31326] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1335.814563][T31326] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1335.822548][T31326] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1335.830519][T31326] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1335.838506][T31326] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:13:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r4) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r7, 0x0, r6) write$binfmt_elf64(r0, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$inet_udp(0x2, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:59 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x06', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1335.907267][T31326] ERROR: Out of memory at tomoyo_realpath_from_path. 02:13:59 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000080)={0x5000, 0x2ce451ba270d01f0}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000340)=ANY=[@ANYRES64=r2, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf88c72ee32da4ebbe421641475401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650700aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf6d9df00db79205b0b28c8426558d0f5c7b65a1dcd0575a810e64447f276595c7d7522c81a20623656643ddd056805b0b6677b161b1d7220f7109a3e77227f4ace906a01f22e4a1925dd7f074d9e38cfd6794af23865942bc41049636f61ba93cb82db8a04fa8db7715c0374b7cb773174f859414e4e8ba003933fe69df1211a296d50bdbef7717eb3cc1b3b62ed20ea0c0c7e99d03a15613cc3f19559acde55e8a357a2df3da831eee8a18800af151f394a8f634b3024fea60349d4e89b0ed91155e07817c0624afe037bd219785b4a74f16dddb9b368eeb3f3e35113782db4faec641b55ae78900feee63d26e81bee1696166f9cd4862a3858ff0b7cb097147e9de14ad9f789bde0a366c8734fc1ba2e250ca42966e543b1ec7eee971800a58218b8a1a181c8cff476588a13803fd3b94d84362bf2a1023c3d7fdb78521d4973c831e0ca9bf12310e0315061b8f851832851072214cf1996d27f121977dc0a190d740695d65b7c12f11d5813c895a5ac6aa2154a789af975e7862782a979d0d5dbeb3911cc7a67e55312de09358c9ef3ed33fb578e7dd6744e486ab0b02a090"]) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000000)) 02:13:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs`', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:13:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000180)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r6, 0x0, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYRESDEC=0x0, @ANYRESOCT=r6, @ANYRESOCT=r3, @ANYRESOCT=r3, @ANYRES32=0x0, @ANYRESOCT=r0, @ANYRES64, @ANYRES32=0x0], 0x80) close(r5) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) inotify_init1(0x95bfab5540fd5c76) 02:13:59 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000100100000100000005e8000000b47fc9c858c598ba4909000000000000000a2e834efe3f87695931515781ae36a4d148f269399022f544be4fac9508cce4df4d7015eb590bbfb45f7b815bdb2281145dd688759944bd09b0f55e7ca54b07bd9189de8daeb173aca360f4bca4f5019235efcea227e56f94ddc8d5e02f38fdcdad2e5cc22b1f090ecf60605f3d9129670000000000000000000000000000000eab3ccfade12420421726b120b1ce8ad1642bb195935f9751facf178c4a3b74eeffcfe0312cd4a5cea34746dea9f76bf16244b5bc1bace51a63e67806440fbab6d8cd3ef5e19c077dbc02efed0840d26dbf3f84d5a39b30564d998a2f9293c470f0896ef88805670ed1220cf77ea1c692ee2053565d6529987f514b384013576ab56e1dc4f444be4a13aa637cea74ca6ebce21635"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0xd00) 02:13:59 executing program 0 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:13:59 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\a', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:13:59 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x100, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x2, 0x0) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f0000000100)) ioctl$TIOCSBRK(r1, 0x5427) r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r0, 0xc0a, r3) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:13:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200), 0x185) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:13:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsh', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1336.423178][T31568] FAULT_INJECTION: forcing a failure. [ 1336.423178][T31568] name failslab, interval 1, probability 0, space 0, times 0 [ 1336.509870][T31568] CPU: 1 PID: 31568 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1336.517814][T31568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1336.527868][T31568] Call Trace: [ 1336.531166][T31568] dump_stack+0x1d8/0x2f8 [ 1336.535512][T31568] should_fail+0x555/0x770 [ 1336.539935][T31568] __should_failslab+0x11a/0x160 [ 1336.544875][T31568] ? tomoyo_encode2+0x273/0x5a0 [ 1336.549726][T31568] should_failslab+0x9/0x20 [ 1336.554218][T31568] __kmalloc+0x7a/0x340 [ 1336.558370][T31568] tomoyo_encode2+0x273/0x5a0 [ 1336.563050][T31568] tomoyo_realpath_from_path+0x769/0x7c0 [ 1336.568687][T31568] tomoyo_mount_permission+0x923/0xa30 [ 1336.574160][T31568] ? kmem_cache_free+0xd8/0xf0 [ 1336.578941][T31568] tomoyo_sb_mount+0x35/0x40 [ 1336.583523][T31568] security_sb_mount+0x84/0xe0 [ 1336.588279][T31568] do_mount+0x10a/0x2510 [ 1336.592515][T31568] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1336.598170][T31568] ? copy_mount_options+0x5f/0x3c0 [ 1336.603275][T31568] ? copy_mount_options+0x308/0x3c0 [ 1336.608467][T31568] ksys_mount+0xcc/0x100 [ 1336.612789][T31568] __x64_sys_mount+0xbf/0xd0 [ 1336.617373][T31568] do_syscall_64+0xf7/0x1c0 [ 1336.621874][T31568] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1336.627842][T31568] RIP: 0033:0x45c98a [ 1336.631739][T31568] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1336.651352][T31568] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 02:13:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x104040}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0x1, 0x70bd2b, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x88024) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r8, 0x0, 0x0) writev(r6, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r6, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r7) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r5, 0x0, r7, 0x0, 0x80000001, 0x0) [ 1336.659757][T31568] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1336.667724][T31568] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1336.675688][T31568] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1336.683649][T31568] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1336.691615][T31568] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:14:00 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) ioctl$KVM_SET_SIGNAL_MASK(r3, 0x4004ae8b, &(0x7f0000000040)={0x70, "74d4298e9455cb29f173077c2ff7b50d47de4d4de603dd9f194c923b0765d52576b65da06882e17e84fa8f39b73d1779167c0b2de8983c0b5f710e2ff454e8ca116293a08d4ee567c2558547cc7bbf51547fa8b67f4c83fcaf00ee0798910ec960b3fb7c5eef07601fb63b7f1e551b93"}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1336.713487][T31568] ERROR: Out of memory at tomoyo_realpath_from_path. 02:14:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x2000, &(0x7f0000000040)=[{&(0x7f0000000140)="d800000018008102e00f80ecdb4cb9040a1d65ef0b007c02e87c55a1bc000900b800069903000000050015800300812fa80016000f0063e3fb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025cc3d39e4b51e2752b4285eb3fc50ca9e33f4d6ce722f1266bbb8061400360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93450000", 0xd8}], 0x1}, 0x0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:14:00 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\b', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:14:00 executing program 0 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:14:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsl', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1336.875174][T31697] IPv6: NLM_F_CREATE should be specified when creating new route [ 1336.895530][T31696] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1336.907435][T31697] netlink: 148 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1336.944755][T31704] FAULT_INJECTION: forcing a failure. [ 1336.944755][T31704] name failslab, interval 1, probability 0, space 0, times 0 [ 1336.966074][T31704] CPU: 0 PID: 31704 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1336.974358][T31704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1336.984416][T31704] Call Trace: [ 1336.987708][T31704] dump_stack+0x1d8/0x2f8 [ 1336.992036][T31704] should_fail+0x555/0x770 [ 1336.996453][T31704] __should_failslab+0x11a/0x160 [ 1337.001391][T31704] should_failslab+0x9/0x20 [ 1337.005887][T31704] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1337.011162][T31704] ? legacy_init_fs_context+0x51/0xc0 [ 1337.016528][T31704] legacy_init_fs_context+0x51/0xc0 [ 1337.021715][T31704] alloc_fs_context+0x53a/0x640 [ 1337.026565][T31704] fs_context_for_mount+0x24/0x30 [ 1337.031584][T31704] do_mount+0x10a7/0x2510 [ 1337.035994][T31704] ? copy_mount_options+0x308/0x3c0 [ 1337.041184][T31704] ksys_mount+0xcc/0x100 [ 1337.045418][T31704] __x64_sys_mount+0xbf/0xd0 [ 1337.050004][T31704] do_syscall_64+0xf7/0x1c0 [ 1337.054506][T31704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1337.060389][T31704] RIP: 0033:0x45c98a [ 1337.064275][T31704] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1337.083871][T31704] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1337.092280][T31704] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1337.100332][T31704] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1337.108297][T31704] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1337.116256][T31704] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1337.124220][T31704] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1337.152157][T31806] netlink: 148 bytes leftover after parsing attributes in process `syz-executor.1'. 02:14:00 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0xe00) 02:14:00 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x6) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9ab9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf0000000000000000"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:14:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid', 0x3d, r5}}, {@seclabel='seclabel'}]}) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:14:00 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\t', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:14:00 executing program 0 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:14:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfst', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1337.393226][T31819] FAULT_INJECTION: forcing a failure. [ 1337.393226][T31819] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.407628][T31819] CPU: 0 PID: 31819 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1337.415544][T31819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1337.415549][T31819] Call Trace: [ 1337.415566][T31819] dump_stack+0x1d8/0x2f8 [ 1337.415584][T31819] should_fail+0x555/0x770 [ 1337.415600][T31819] __should_failslab+0x11a/0x160 [ 1337.415614][T31819] should_failslab+0x9/0x20 [ 1337.433259][T31819] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 1337.433270][T31819] ? __kmalloc_node+0x3c/0x60 [ 1337.433281][T31819] ? smack_sb_eat_lsm_opts+0x867/0xa20 [ 1337.433294][T31819] __kmalloc_node+0x3c/0x60 [ 1337.433305][T31819] kvmalloc_node+0xcc/0x130 [ 1337.433317][T31819] btrfs_mount_root+0xe3/0x1040 [ 1337.476688][T31819] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1337.482057][T31819] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1337.487768][T31819] ? trace_kfree+0xb2/0x110 [ 1337.492273][T31819] legacy_get_tree+0xf9/0x1a0 [ 1337.496942][T31819] ? btrfs_control_open+0x40/0x40 [ 1337.501961][T31819] vfs_get_tree+0x8b/0x2a0 [ 1337.506479][T31819] vfs_kern_mount+0xc2/0x160 [ 1337.511063][T31819] btrfs_mount+0x34f/0x18e0 [ 1337.515565][T31819] ? check_preemption_disabled+0x47/0x2a0 [ 1337.521286][T31819] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1337.526560][T31819] ? cap_capable+0x250/0x290 [ 1337.531153][T31819] ? safesetid_security_capable+0x89/0xf0 [ 1337.536871][T31819] legacy_get_tree+0xf9/0x1a0 [ 1337.541545][T31819] ? btrfs_resize_thread_pool+0x290/0x290 [ 1337.547257][T31819] vfs_get_tree+0x8b/0x2a0 [ 1337.551666][T31819] do_mount+0x16c0/0x2510 [ 1337.555994][T31819] ? copy_mount_options+0x308/0x3c0 [ 1337.561185][T31819] ksys_mount+0xcc/0x100 [ 1337.565420][T31819] __x64_sys_mount+0xbf/0xd0 [ 1337.570008][T31819] do_syscall_64+0xf7/0x1c0 [ 1337.574506][T31819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1337.580385][T31819] RIP: 0033:0x45c98a [ 1337.584274][T31819] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1337.603862][T31819] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1337.603873][T31819] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1337.603879][T31819] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1337.603885][T31819] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 02:14:00 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x400101) pipe(&(0x7f0000000100)={0xffffffffffffffff}) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000080)={0x3, r1}) ioctl$int_in(r0, 0x40000000af01, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1337.603891][T31819] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1337.603897][T31819] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:14:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid', 0x3d, r5}}, {@seclabel='seclabel'}]}) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:14:01 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\n', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:14:01 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x9, [0x1ff, 0xfffd, 0x2, 0x3ff, 0x3d, 0x2, 0x8, 0x4, 0x81]}, &(0x7f0000000080)=0x1a) setsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000180)={r5, 0x80}, 0x8) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:14:01 executing program 0 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:14:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsz', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1338.089969][T32059] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1338.104268][T32056] FAULT_INJECTION: forcing a failure. [ 1338.104268][T32056] name failslab, interval 1, probability 0, space 0, times 0 [ 1338.123246][T32056] CPU: 1 PID: 32056 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1338.131272][T32056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1338.141330][T32056] Call Trace: [ 1338.144713][T32056] dump_stack+0x1d8/0x2f8 [ 1338.149053][T32056] should_fail+0x555/0x770 [ 1338.153589][T32056] __should_failslab+0x11a/0x160 [ 1338.158534][T32056] should_failslab+0x9/0x20 [ 1338.163037][T32056] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1338.168316][T32056] ? alloc_fs_context+0x65/0x640 [ 1338.173252][T32056] alloc_fs_context+0x65/0x640 [ 1338.178011][T32056] ? kfree+0x194/0x200 [ 1338.182078][T32056] fs_context_for_mount+0x24/0x30 [ 1338.187109][T32056] vfs_kern_mount+0x2c/0x160 [ 1338.191698][T32056] btrfs_mount+0x34f/0x18e0 [ 1338.196208][T32056] ? check_preemption_disabled+0x47/0x2a0 [ 1338.201933][T32056] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1338.207209][T32056] ? cap_capable+0x250/0x290 [ 1338.211795][T32056] ? safesetid_security_capable+0x89/0xf0 [ 1338.217512][T32056] legacy_get_tree+0xf9/0x1a0 [ 1338.222186][T32056] ? btrfs_resize_thread_pool+0x290/0x290 [ 1338.227901][T32056] vfs_get_tree+0x8b/0x2a0 [ 1338.232314][T32056] do_mount+0x16c0/0x2510 [ 1338.236644][T32056] ? copy_mount_options+0x308/0x3c0 [ 1338.241838][T32056] ksys_mount+0xcc/0x100 [ 1338.246075][T32056] __x64_sys_mount+0xbf/0xd0 [ 1338.250661][T32056] do_syscall_64+0xf7/0x1c0 [ 1338.255163][T32056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1338.261046][T32056] RIP: 0033:0x45c98a [ 1338.264930][T32056] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1338.284527][T32056] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1338.292932][T32056] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1338.300894][T32056] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1338.308857][T32056] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1338.316821][T32056] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1338.324899][T32056] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:14:01 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0xf00) 02:14:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r4, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid', 0x3d, r5}}, {@seclabel='seclabel'}]}) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd6e) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 02:14:01 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000280)={0x2, 0x4}) r3 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r3, 0x0, r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @remote}}, [0x8, 0x2, 0x100, 0x8, 0x100, 0x80000000, 0x62, 0x9, 0x0, 0xf053, 0x1000, 0x2, 0x5, 0x81]}, &(0x7f0000000040)=0x100) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000080)={r4, 0xffffff57, 0x7, 0x9}, 0x10) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:14:01 executing program 0 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:14:01 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\v', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1338.634748][T32188] FAULT_INJECTION: forcing a failure. [ 1338.634748][T32188] name failslab, interval 1, probability 0, space 0, times 0 [ 1338.661053][T32188] CPU: 0 PID: 32188 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1338.668976][T32188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1338.679116][T32188] Call Trace: [ 1338.682403][T32188] dump_stack+0x1d8/0x2f8 [ 1338.686742][T32188] should_fail+0x555/0x770 [ 1338.691164][T32188] __should_failslab+0x11a/0x160 [ 1338.696098][T32188] ? getname_kernel+0x59/0x2f0 [ 1338.700854][T32188] should_failslab+0x9/0x20 [ 1338.705355][T32188] kmem_cache_alloc+0x56/0x2e0 [ 1338.710116][T32188] getname_kernel+0x59/0x2f0 [ 1338.714702][T32188] kern_path+0x1f/0x40 [ 1338.718762][T32188] blkdev_get_by_path+0x71/0x270 [ 1338.723696][T32188] btrfs_scan_one_device+0xbd/0x450 [ 1338.728887][T32188] ? btrfs_mount_root+0x477/0x1040 [ 1338.733988][T32188] ? trace_hardirqs_on+0x74/0x80 [ 1338.738927][T32188] btrfs_mount_root+0x4af/0x1040 [ 1338.743888][T32188] ? trace_kfree+0xb2/0x110 [ 1338.748392][T32188] legacy_get_tree+0xf9/0x1a0 [ 1338.753070][T32188] ? btrfs_control_open+0x40/0x40 [ 1338.758091][T32188] vfs_get_tree+0x8b/0x2a0 [ 1338.762519][T32188] vfs_kern_mount+0xc2/0x160 [ 1338.767103][T32188] btrfs_mount+0x34f/0x18e0 [ 1338.771609][T32188] ? check_preemption_disabled+0x47/0x2a0 [ 1338.777330][T32188] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1338.782602][T32188] ? cap_capable+0x250/0x290 [ 1338.787187][T32188] ? safesetid_security_capable+0x89/0xf0 [ 1338.792904][T32188] legacy_get_tree+0xf9/0x1a0 [ 1338.797581][T32188] ? btrfs_resize_thread_pool+0x290/0x290 [ 1338.803296][T32188] vfs_get_tree+0x8b/0x2a0 [ 1338.807713][T32188] do_mount+0x16c0/0x2510 [ 1338.812045][T32188] ? copy_mount_options+0x308/0x3c0 [ 1338.817240][T32188] ksys_mount+0xcc/0x100 [ 1338.821568][T32188] __x64_sys_mount+0xbf/0xd0 [ 1338.826157][T32188] do_syscall_64+0xf7/0x1c0 [ 1338.830760][T32188] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1338.836730][T32188] RIP: 0033:0x45c98a [ 1338.840626][T32188] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1338.860215][T32188] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1338.868616][T32188] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1338.876582][T32188] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 02:14:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xe0', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1338.884547][T32188] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1338.892514][T32188] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1338.900479][T32188] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:14:02 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r1) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)={0x9, 0x2, 0x4, 0x8, 0x1, [{0x9, 0x1, 0x5, 0x0, 0x0, 0x400}]}) socket$netlink(0x10, 0x3, 0x6) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) connect$rds(r3, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) signalfd(r4, &(0x7f00000001c0)={0x2}, 0x8) 02:14:02 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\f', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:14:02 executing program 0 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:14:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r3, 0x0, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid', 0x3d, r4}}, {@seclabel='seclabel'}]}) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd6e) [ 1339.253790][T32419] FAULT_INJECTION: forcing a failure. [ 1339.253790][T32419] name failslab, interval 1, probability 0, space 0, times 0 [ 1339.267614][T32419] CPU: 1 PID: 32419 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1339.275525][T32419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1339.285589][T32419] Call Trace: [ 1339.285608][T32419] dump_stack+0x1d8/0x2f8 [ 1339.285625][T32419] should_fail+0x555/0x770 [ 1339.285643][T32419] __should_failslab+0x11a/0x160 [ 1339.285654][T32419] ? vfs_parse_fs_string+0xed/0x1a0 [ 1339.285665][T32419] should_failslab+0x9/0x20 [ 1339.285680][T32419] __kmalloc_track_caller+0x79/0x340 [ 1339.297805][T32419] kmemdup_nul+0x2a/0xa0 [ 1339.297820][T32419] vfs_parse_fs_string+0xed/0x1a0 [ 1339.297839][T32419] vfs_kern_mount+0x77/0x160 [ 1339.297852][T32419] btrfs_mount+0x34f/0x18e0 [ 1339.297873][T32419] ? check_preemption_disabled+0x47/0x2a0 [ 1339.297889][T32419] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1339.297898][T32419] ? cap_capable+0x250/0x290 [ 1339.297911][T32419] ? safesetid_security_capable+0x89/0xf0 [ 1339.357289][T32419] legacy_get_tree+0xf9/0x1a0 [ 1339.361964][T32419] ? btrfs_resize_thread_pool+0x290/0x290 [ 1339.367684][T32419] vfs_get_tree+0x8b/0x2a0 [ 1339.372102][T32419] do_mount+0x16c0/0x2510 [ 1339.376462][T32419] ? copy_mount_options+0x308/0x3c0 [ 1339.381657][T32419] ksys_mount+0xcc/0x100 [ 1339.385898][T32419] __x64_sys_mount+0xbf/0xd0 [ 1339.390494][T32419] do_syscall_64+0xf7/0x1c0 [ 1339.394997][T32419] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1339.400877][T32419] RIP: 0033:0x45c98a [ 1339.404762][T32419] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1339.424355][T32419] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1339.432761][T32419] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1339.440730][T32419] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 02:14:02 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000200)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf36658e29cdb86ed62c1d48103da4d8f38e76b7ccd3b135fff69fc8aeb4bfbde7c8d6d24d18f8389b5832e9d5705683ce85f43de4f3e4b04847d4614ec194cb4c3cf7f3b2f4b5f936fcfa37de589fab2713fa155c887794f67b891d765fb0755c857b6707d3f451c8"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1339.448695][T32419] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1339.456746][T32419] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1339.464804][T32419] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:14:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:14:03 executing program 0 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:14:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r3, 0x0, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid', 0x3d, r4}}, {@seclabel='seclabel'}]}) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd6e) 02:14:03 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x1100) 02:14:03 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000080)={0x1, 0x7}) ioctl$int_in(r0, 0x40000000af01, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000200)=ANY=[@ANYRES64=r2, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf5f68cc0efb505851a774cef2338078ffd251eaa2511a9f73b0b278fa10d299275315f02e6461298eaa885cf779b4c73f5a7b3ca4938fcdeb95510a3e8037f9d80ab944e4a90a371526045f0f70a5de5294198d3480a9b1f1339b82f6e568d2196045fcfcf76a9488efba6d4df644f9a2196c58411ca5da99432aba7bd39dbf821a172b5871dbf2d241"]) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) syz_read_part_table(0xc84, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000100)="7619818f63bad08cfd0ed03f60a65b075fd9893da5a79dcc8850ba1a7f4f03cbe904fc12d31800cf1c16b9d77a2ef17e43ce8215becad037c37fd1664203b2ef084b824117e38285f10273ede2003dd5628005b2f2676821cfd978a40e039b70bff8408ea69c34f06b33b446d1deda517b93889dcea1b5138dfcde23dbb393573b2e555e99c3f57b557faef89b40c90fa15386721a89f4169ba2f07fd397ec0e641cc792893fba18fd46fed874feddc6b036a972f96924116829b036d1bd0e0349eef30a6c460e487dbc42a83d4b39402beaddad1c66f8ebca3d24d868aa0dcc36ed6986a4774cec30230e1dee96ffe61a3f9d", 0xf3, 0xffffffff}, {&(0x7f0000000300)="9dd5c8016a8a122524aff7078cd71c990d83f13d285ce8f1c53a837a5abe42bd734e0827ed1ff28c20d473cd", 0x2c, 0x3}, {&(0x7f0000000340)="5d137f3b62a1fd61110dc0efac66f1e5be52f404820c5e927fec823cb82e19d6ff0800831d994acd57f547864273d63d22c847304dfac7c8b7e364a4c4e105f74e6574f2778aa1d413480adedc5acbf337daf2277f1858be2c723d713ba8561a9b2b2f7f1ebe80b878490ded85", 0x6d, 0x400}]) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000440)={{0x3, 0x0, @identifier="0765746ab9d12504c3f08f7c49c144f4"}}) 02:14:03 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\r', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1339.895102][T32554] FAULT_INJECTION: forcing a failure. [ 1339.895102][T32554] name failslab, interval 1, probability 0, space 0, times 0 [ 1339.913348][T32554] CPU: 1 PID: 32554 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1339.921264][T32554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1339.921281][T32554] Call Trace: [ 1339.921299][T32554] dump_stack+0x1d8/0x2f8 [ 1339.921317][T32554] should_fail+0x555/0x770 [ 1339.921337][T32554] __should_failslab+0x11a/0x160 [ 1339.921347][T32554] ? getname_kernel+0x59/0x2f0 [ 1339.921362][T32554] should_failslab+0x9/0x20 [ 1339.957540][T32554] kmem_cache_alloc+0x56/0x2e0 [ 1339.962410][T32554] getname_kernel+0x59/0x2f0 [ 1339.967000][T32554] kern_path+0x1f/0x40 [ 1339.971072][T32554] blkdev_get_by_path+0x71/0x270 [ 1339.976013][T32554] btrfs_get_bdev_and_sb+0x48/0x280 [ 1339.981210][T32554] open_fs_devices+0x14d/0xb40 [ 1339.985968][T32554] ? list_sort+0x5fc/0x860 [ 1339.985983][T32554] ? btrfs_open_devices+0x1b0/0x1b0 [ 1339.985999][T32554] btrfs_open_devices+0x11d/0x1b0 [ 1339.986012][T32554] btrfs_mount_root+0x6ef/0x1040 [ 1339.995585][T32554] ? trace_kfree+0xb2/0x110 [ 1339.995600][T32554] legacy_get_tree+0xf9/0x1a0 [ 1339.995609][T32554] ? btrfs_control_open+0x40/0x40 [ 1339.995623][T32554] vfs_get_tree+0x8b/0x2a0 [ 1340.024067][T32554] vfs_kern_mount+0xc2/0x160 [ 1340.028658][T32554] btrfs_mount+0x34f/0x18e0 [ 1340.033164][T32554] ? check_preemption_disabled+0x47/0x2a0 [ 1340.038897][T32554] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1340.044171][T32554] ? cap_capable+0x250/0x290 [ 1340.048752][T32554] ? safesetid_security_capable+0x89/0xf0 [ 1340.054463][T32554] legacy_get_tree+0xf9/0x1a0 [ 1340.059146][T32554] ? btrfs_resize_thread_pool+0x290/0x290 [ 1340.064859][T32554] vfs_get_tree+0x8b/0x2a0 [ 1340.069273][T32554] do_mount+0x16c0/0x2510 [ 1340.073602][T32554] ? copy_mount_options+0x308/0x3c0 [ 1340.078793][T32554] ksys_mount+0xcc/0x100 [ 1340.083028][T32554] __x64_sys_mount+0xbf/0xd0 [ 1340.087611][T32554] do_syscall_64+0xf7/0x1c0 [ 1340.092127][T32554] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1340.098112][T32554] RIP: 0033:0x45c98a [ 1340.101996][T32554] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1340.121585][T32554] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1340.129980][T32554] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1340.137940][T32554] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1340.145915][T32554] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1340.153879][T32554] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1340.161943][T32554] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:14:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:14:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r3, 0x0, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid', 0x3d, r4}}, {@seclabel='seclabel'}]}) close(r2) socket$netlink(0x10, 0x3, 0x4) 02:14:03 executing program 0 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:14:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r3, 0x0, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid', 0x3d, r4}}, {@seclabel='seclabel'}]}) close(r2) [ 1340.525239][T32685] FAULT_INJECTION: forcing a failure. [ 1340.525239][T32685] name failslab, interval 1, probability 0, space 0, times 0 [ 1340.543037][T32686] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 [ 1340.585212][T32685] CPU: 0 PID: 32685 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1340.593151][T32685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1340.603208][T32685] Call Trace: [ 1340.606509][T32685] dump_stack+0x1d8/0x2f8 [ 1340.610851][T32685] should_fail+0x555/0x770 [ 1340.615369][T32685] __should_failslab+0x11a/0x160 [ 1340.620314][T32685] should_failslab+0x9/0x20 [ 1340.624825][T32685] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 1340.630550][T32685] ? __kmalloc_node+0x3c/0x60 [ 1340.635236][T32685] ? smack_sb_eat_lsm_opts+0x867/0xa20 [ 1340.640695][T32685] __kmalloc_node+0x3c/0x60 [ 1340.645200][T32685] kvmalloc_node+0xcc/0x130 [ 1340.649701][T32685] btrfs_mount_root+0xe3/0x1040 [ 1340.654554][T32685] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1340.659838][T32685] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1340.665558][T32685] ? trace_kfree+0xb2/0x110 [ 1340.670069][T32685] legacy_get_tree+0xf9/0x1a0 [ 1340.674748][T32685] ? btrfs_control_open+0x40/0x40 [ 1340.679773][T32685] vfs_get_tree+0x8b/0x2a0 [ 1340.684196][T32685] vfs_kern_mount+0xc2/0x160 [ 1340.688788][T32685] btrfs_mount+0x34f/0x18e0 [ 1340.693306][T32685] ? check_preemption_disabled+0x47/0x2a0 [ 1340.699029][T32685] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1340.704314][T32685] ? cap_capable+0x250/0x290 [ 1340.708902][T32685] ? safesetid_security_capable+0x89/0xf0 [ 1340.714624][T32685] legacy_get_tree+0xf9/0x1a0 [ 1340.719297][T32685] ? btrfs_resize_thread_pool+0x290/0x290 [ 1340.725017][T32685] vfs_get_tree+0x8b/0x2a0 [ 1340.729440][T32685] do_mount+0x16c0/0x2510 [ 1340.733774][T32685] ? copy_mount_options+0x308/0x3c0 [ 1340.738975][T32685] ksys_mount+0xcc/0x100 [ 1340.743215][T32685] __x64_sys_mount+0xbf/0xd0 [ 1340.747821][T32685] do_syscall_64+0xf7/0x1c0 [ 1340.752439][T32685] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1340.758325][T32685] RIP: 0033:0x45c98a [ 1340.762216][T32685] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 02:14:04 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x0e', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1340.781827][T32685] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1340.790238][T32685] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1340.798205][T32685] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1340.806213][T32685] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1340.814181][T32685] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1340.822151][T32685] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:14:04 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000100100000100000005e8000000b47fc9c858c598ba4909000000000000000a2e834efe3f87695931515781ae36a4d148f269399022f544be4fac9508cce4df4d7015eb590bbfb45f7b815bdb2281145dd688759944bd09b0f55e7ca54b07bd9189de8daeb173aca360f4bca4f5019235efcea227e56f94ddc8d5e02f38fdcdad2e5cc22b1f090ecf60605f3d9129670000000000000000000000000000000eab3ccfade12420421726b120b1ce8ad1642bb195935f9751facf178c4a3b74eeffcfe0312cd4a5cea34746dea9f76bf16244b5bc1bace51a63e67806440fbab6d8cd3ef5e19c077dbc02efed0840d26dbf3f84d5a39b30564d998a2f9293c470f0896ef88805670ed1220cf77ea1c692ee2053565d6529987f514b384013576ab56e1dc4f444be4a13aa637cea74ca6ebce21635"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x1200) 02:14:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x02', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:14:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r2, 0x0, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid', 0x3d, r3}}, {@seclabel='seclabel'}]}) 02:14:04 executing program 0 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1341.214382][T32710] FAULT_INJECTION: forcing a failure. [ 1341.214382][T32710] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1341.227628][T32710] CPU: 1 PID: 32710 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1341.235513][T32710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1341.245568][T32710] Call Trace: [ 1341.248877][T32710] dump_stack+0x1d8/0x2f8 [ 1341.253223][T32710] should_fail+0x555/0x770 [ 1341.257650][T32710] should_fail_alloc_page+0x55/0x60 [ 1341.262850][T32710] prepare_alloc_pages+0x283/0x460 [ 1341.267966][T32710] __alloc_pages_nodemask+0xb2/0x5d0 [ 1341.273264][T32710] kmem_getpages+0x4d/0xa00 [ 1341.277769][T32710] cache_grow_begin+0x7e/0x2c0 [ 1341.282536][T32710] cache_alloc_refill+0x311/0x3f0 [ 1341.287559][T32710] ? check_preemption_disabled+0xb7/0x2a0 [ 1341.293278][T32710] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 1341.298642][T32710] ? btrfs_mount_root+0x1b2/0x1040 [ 1341.303755][T32710] btrfs_mount_root+0x1b2/0x1040 [ 1341.308696][T32710] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1341.313974][T32710] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1341.319691][T32710] ? trace_kfree+0xb2/0x110 [ 1341.324196][T32710] legacy_get_tree+0xf9/0x1a0 [ 1341.328869][T32710] ? btrfs_control_open+0x40/0x40 [ 1341.333889][T32710] vfs_get_tree+0x8b/0x2a0 [ 1341.338302][T32710] vfs_kern_mount+0xc2/0x160 [ 1341.342886][T32710] btrfs_mount+0x34f/0x18e0 [ 1341.347390][T32710] ? check_preemption_disabled+0x47/0x2a0 [ 1341.353109][T32710] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1341.358389][T32710] ? cap_capable+0x250/0x290 [ 1341.362974][T32710] ? safesetid_security_capable+0x89/0xf0 [ 1341.368694][T32710] legacy_get_tree+0xf9/0x1a0 [ 1341.373365][T32710] ? btrfs_resize_thread_pool+0x290/0x290 [ 1341.379080][T32710] vfs_get_tree+0x8b/0x2a0 [ 1341.383494][T32710] do_mount+0x16c0/0x2510 [ 1341.388090][T32710] ? copy_mount_options+0x308/0x3c0 [ 1341.393286][T32710] ksys_mount+0xcc/0x100 [ 1341.397525][T32710] __x64_sys_mount+0xbf/0xd0 [ 1341.402114][T32710] do_syscall_64+0xf7/0x1c0 [ 1341.406614][T32710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1341.412501][T32710] RIP: 0033:0x45c98a [ 1341.416385][T32710] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1341.435982][T32710] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1341.444389][T32710] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1341.452361][T32710] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 02:14:04 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x10', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1341.460347][T32710] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1341.468315][T32710] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1341.476286][T32710] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:14:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r2, 0x0, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid', 0x3d, r3}}, {@seclabel='seclabel'}]}) 02:14:05 executing program 0 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:14:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x06', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:14:05 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x2500) 02:14:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r2, 0x0, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c410600050001019fa5d4b3"], 0xe) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid'}}, {@seclabel='seclabel'}]}) [ 1341.915135][T32729] FAULT_INJECTION: forcing a failure. [ 1341.915135][T32729] name failslab, interval 1, probability 0, space 0, times 0 02:14:05 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x11', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1342.021400][T32729] CPU: 1 PID: 32729 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1342.029529][T32729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1342.039598][T32729] Call Trace: [ 1342.042895][T32729] dump_stack+0x1d8/0x2f8 [ 1342.047240][T32729] should_fail+0x555/0x770 [ 1342.051662][T32729] __should_failslab+0x11a/0x160 [ 1342.056620][T32729] ? btrfs_mount_root+0x2f4/0x1040 [ 1342.061730][T32729] should_failslab+0x9/0x20 [ 1342.066229][T32729] __kmalloc_track_caller+0x79/0x340 [ 1342.071513][T32729] kstrdup+0x34/0x70 [ 1342.075508][T32729] btrfs_mount_root+0x2f4/0x1040 [ 1342.080442][T32729] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1342.085717][T32729] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1342.091428][T32729] ? trace_kfree+0xb2/0x110 [ 1342.095933][T32729] legacy_get_tree+0xf9/0x1a0 [ 1342.100602][T32729] ? btrfs_control_open+0x40/0x40 [ 1342.105624][T32729] vfs_get_tree+0x8b/0x2a0 [ 1342.110066][T32729] vfs_kern_mount+0xc2/0x160 [ 1342.114652][T32729] btrfs_mount+0x34f/0x18e0 [ 1342.119155][T32729] ? check_preemption_disabled+0x47/0x2a0 [ 1342.124873][T32729] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1342.130152][T32729] ? cap_capable+0x250/0x290 [ 1342.134736][T32729] ? safesetid_security_capable+0x89/0xf0 [ 1342.140447][T32729] legacy_get_tree+0xf9/0x1a0 [ 1342.145129][T32729] ? btrfs_resize_thread_pool+0x290/0x290 [ 1342.150843][T32729] vfs_get_tree+0x8b/0x2a0 [ 1342.155253][T32729] do_mount+0x16c0/0x2510 [ 1342.159581][T32729] ? copy_mount_options+0x308/0x3c0 [ 1342.164771][T32729] ksys_mount+0xcc/0x100 [ 1342.169008][T32729] __x64_sys_mount+0xbf/0xd0 [ 1342.173595][T32729] do_syscall_64+0xf7/0x1c0 [ 1342.178097][T32729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1342.183981][T32729] RIP: 0033:0x45c98a [ 1342.187868][T32729] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1342.207470][T32729] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1342.215881][T32729] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1342.223852][T32729] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1342.231819][T32729] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1342.239784][T32729] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1342.247751][T32729] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:14:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r2, 0x0, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid'}}, {@seclabel='seclabel'}]}) 02:14:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:14:05 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x12', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:14:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r2, 0x0, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid'}}, {@seclabel='seclabel'}]}) [ 1342.632498][T32752] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:14:05 executing program 0 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:14:06 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x4000) 02:14:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf64(r1, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid'}}, {@seclabel='seclabel'}]}) 02:14:06 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus%', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1342.820007][T32752] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:14:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1343.005839][T32767] FAULT_INJECTION: forcing a failure. [ 1343.005839][T32767] name failslab, interval 1, probability 0, space 0, times 0 [ 1343.045599][T32767] CPU: 1 PID: 32767 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 02:14:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid'}}, {@seclabel='seclabel'}]}) [ 1343.053526][T32767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1343.056891][ T308] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 [ 1343.063574][T32767] Call Trace: [ 1343.063594][T32767] dump_stack+0x1d8/0x2f8 [ 1343.063612][T32767] should_fail+0x555/0x770 [ 1343.063630][T32767] __should_failslab+0x11a/0x160 [ 1343.063645][T32767] should_failslab+0x9/0x20 [ 1343.063655][T32767] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1343.063667][T32767] ? btrfs_mount_root+0x1b2/0x1040 [ 1343.106716][T32767] btrfs_mount_root+0x1b2/0x1040 [ 1343.111688][T32767] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1343.116972][T32767] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1343.122697][T32767] ? trace_kfree+0xb2/0x110 [ 1343.127198][T32767] legacy_get_tree+0xf9/0x1a0 [ 1343.127210][T32767] ? btrfs_control_open+0x40/0x40 [ 1343.127223][T32767] vfs_get_tree+0x8b/0x2a0 [ 1343.127237][T32767] vfs_kern_mount+0xc2/0x160 [ 1343.127248][T32767] btrfs_mount+0x34f/0x18e0 [ 1343.127268][T32767] ? check_preemption_disabled+0x47/0x2a0 [ 1343.127282][T32767] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1343.136945][T32767] ? cap_capable+0x250/0x290 [ 1343.136958][T32767] ? safesetid_security_capable+0x89/0xf0 [ 1343.136973][T32767] legacy_get_tree+0xf9/0x1a0 [ 1343.136984][T32767] ? btrfs_resize_thread_pool+0x290/0x290 [ 1343.136996][T32767] vfs_get_tree+0x8b/0x2a0 [ 1343.137011][T32767] do_mount+0x16c0/0x2510 [ 1343.190653][T32767] ? copy_mount_options+0x308/0x3c0 [ 1343.195829][T32767] ksys_mount+0xcc/0x100 [ 1343.200051][T32767] __x64_sys_mount+0xbf/0xd0 [ 1343.204617][T32767] do_syscall_64+0xf7/0x1c0 [ 1343.209094][T32767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1343.214957][T32767] RIP: 0033:0x45c98a [ 1343.218827][T32767] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1343.238402][T32767] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1343.246784][T32767] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1343.254730][T32767] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1343.262674][T32767] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1343.270621][T32767] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1343.278578][T32767] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:14:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)) socket$inet_udp(0x2, 0x2, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid'}}, {@seclabel='seclabel'}]}) 02:14:06 executing program 0 (fault-call:0 fault-nth:80): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:14:06 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplusH', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1343.480232][ T308] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:14:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)) socket$inet_udp(0x2, 0x2, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid'}}, {@seclabel='seclabel'}]}) 02:14:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1343.675409][ T326] FAULT_INJECTION: forcing a failure. [ 1343.675409][ T326] name failslab, interval 1, probability 0, space 0, times 0 [ 1343.699952][ T326] CPU: 0 PID: 326 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1343.707700][ T326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1343.717754][ T326] Call Trace: [ 1343.721053][ T326] dump_stack+0x1d8/0x2f8 02:14:06 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x4800) [ 1343.725389][ T326] should_fail+0x555/0x770 [ 1343.729816][ T326] __should_failslab+0x11a/0x160 [ 1343.734758][ T326] ? btrfs_mount_root+0x2f4/0x1040 [ 1343.739876][ T326] should_failslab+0x9/0x20 [ 1343.744386][ T326] __kmalloc_track_caller+0x79/0x340 [ 1343.749672][ T326] kstrdup+0x34/0x70 [ 1343.753566][ T326] btrfs_mount_root+0x2f4/0x1040 [ 1343.758503][ T326] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1343.763785][ T326] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1343.769524][ T326] ? trace_kfree+0xb2/0x110 [ 1343.774026][ T326] legacy_get_tree+0xf9/0x1a0 [ 1343.778705][ T326] ? btrfs_control_open+0x40/0x40 [ 1343.783728][ T326] vfs_get_tree+0x8b/0x2a0 [ 1343.788146][ T326] vfs_kern_mount+0xc2/0x160 [ 1343.792737][ T326] btrfs_mount+0x34f/0x18e0 [ 1343.797240][ T326] ? check_preemption_disabled+0x47/0x2a0 [ 1343.803049][ T326] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1343.808331][ T326] ? cap_capable+0x250/0x290 [ 1343.813013][ T326] ? safesetid_security_capable+0x89/0xf0 [ 1343.818735][ T326] legacy_get_tree+0xf9/0x1a0 [ 1343.823407][ T326] ? btrfs_resize_thread_pool+0x290/0x290 [ 1343.829127][ T326] vfs_get_tree+0x8b/0x2a0 [ 1343.833547][ T326] do_mount+0x16c0/0x2510 [ 1343.837878][ T326] ? copy_mount_options+0x308/0x3c0 [ 1343.843080][ T326] ksys_mount+0xcc/0x100 [ 1343.847321][ T326] __x64_sys_mount+0xbf/0xd0 [ 1343.851907][ T326] do_syscall_64+0xf7/0x1c0 [ 1343.856410][ T326] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1343.862410][ T326] RIP: 0033:0x45c98a [ 1343.866304][ T326] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1343.886074][ T326] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1343.894660][ T326] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1343.902638][ T326] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1343.910611][ T326] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1343.918579][ T326] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1343.926550][ T326] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:14:07 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplusL', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:14:07 executing program 0 (fault-call:0 fault-nth:81): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:14:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) pipe(&(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid'}}, {@seclabel='seclabel'}]}) [ 1344.226055][ T347] FAULT_INJECTION: forcing a failure. [ 1344.226055][ T347] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.267373][ T347] CPU: 0 PID: 347 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1344.275139][ T347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1344.285420][ T347] Call Trace: [ 1344.288715][ T347] dump_stack+0x1d8/0x2f8 [ 1344.293050][ T347] should_fail+0x555/0x770 [ 1344.297478][ T347] __should_failslab+0x11a/0x160 [ 1344.302420][ T347] ? btrfs_mount_root+0x2f4/0x1040 [ 1344.307529][ T347] should_failslab+0x9/0x20 [ 1344.312038][ T347] __kmalloc_track_caller+0x79/0x340 [ 1344.317320][ T347] kstrdup+0x34/0x70 [ 1344.321209][ T347] btrfs_mount_root+0x2f4/0x1040 [ 1344.326152][ T347] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1344.331443][ T347] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1344.337161][ T347] ? trace_kfree+0xb2/0x110 [ 1344.341660][ T347] legacy_get_tree+0xf9/0x1a0 [ 1344.346331][ T347] ? btrfs_control_open+0x40/0x40 [ 1344.351352][ T347] vfs_get_tree+0x8b/0x2a0 [ 1344.355771][ T347] vfs_kern_mount+0xc2/0x160 [ 1344.360358][ T347] btrfs_mount+0x34f/0x18e0 [ 1344.364863][ T347] ? check_preemption_disabled+0x47/0x2a0 [ 1344.370579][ T347] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1344.375851][ T347] ? cap_capable+0x250/0x290 [ 1344.380434][ T347] ? safesetid_security_capable+0x89/0xf0 [ 1344.386151][ T347] legacy_get_tree+0xf9/0x1a0 [ 1344.390826][ T347] ? btrfs_resize_thread_pool+0x290/0x290 [ 1344.396548][ T347] vfs_get_tree+0x8b/0x2a0 [ 1344.400965][ T347] do_mount+0x16c0/0x2510 [ 1344.405299][ T347] ? copy_mount_options+0x308/0x3c0 [ 1344.410501][ T347] ksys_mount+0xcc/0x100 [ 1344.414742][ T347] __x64_sys_mount+0xbf/0xd0 [ 1344.419328][ T347] do_syscall_64+0xf7/0x1c0 [ 1344.423835][ T347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1344.429723][ T347] RIP: 0033:0x45c98a [ 1344.433610][ T347] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1344.453209][ T347] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 02:14:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1344.461622][ T347] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1344.469596][ T347] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1344.477568][ T347] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1344.485537][ T347] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1344.493510][ T347] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:14:07 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\\', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:14:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid'}}, {@seclabel='seclabel'}]}) 02:14:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid'}}, {@seclabel='seclabel'}]}) [ 1344.897771][ T355] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:14:08 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus`', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) 02:14:08 executing program 0 (fault-call:0 fault-nth:82): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:14:08 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x4c00) 02:14:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid'}}, {@seclabel='seclabel'}]}) [ 1345.088180][ T355] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:14:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1345.228382][ T376] FAULT_INJECTION: forcing a failure. [ 1345.228382][ T376] name failslab, interval 1, probability 0, space 0, times 0 [ 1345.279914][ T376] CPU: 0 PID: 376 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1345.287672][ T376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1345.297724][ T376] Call Trace: [ 1345.301020][ T376] dump_stack+0x1d8/0x2f8 [ 1345.305351][ T376] should_fail+0x555/0x770 [ 1345.309777][ T376] __should_failslab+0x11a/0x160 [ 1345.314724][ T376] ? btrfs_mount_root+0x2f4/0x1040 [ 1345.319830][ T376] should_failslab+0x9/0x20 [ 1345.324325][ T376] __kmalloc_track_caller+0x79/0x340 [ 1345.329614][ T376] kstrdup+0x34/0x70 [ 1345.333508][ T376] btrfs_mount_root+0x2f4/0x1040 [ 1345.338538][ T376] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1345.343814][ T376] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1345.349525][ T376] ? trace_kfree+0xb2/0x110 [ 1345.354038][ T376] legacy_get_tree+0xf9/0x1a0 [ 1345.358712][ T376] ? btrfs_control_open+0x40/0x40 [ 1345.363736][ T376] vfs_get_tree+0x8b/0x2a0 [ 1345.368154][ T376] vfs_kern_mount+0xc2/0x160 [ 1345.372740][ T376] btrfs_mount+0x34f/0x18e0 [ 1345.377241][ T376] ? check_preemption_disabled+0x47/0x2a0 [ 1345.382956][ T376] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1345.388236][ T376] ? cap_capable+0x250/0x290 [ 1345.392818][ T376] ? safesetid_security_capable+0x89/0xf0 [ 1345.398532][ T376] legacy_get_tree+0xf9/0x1a0 [ 1345.403202][ T376] ? btrfs_resize_thread_pool+0x290/0x290 [ 1345.408913][ T376] vfs_get_tree+0x8b/0x2a0 [ 1345.413326][ T376] do_mount+0x16c0/0x2510 [ 1345.417650][ T376] ? copy_mount_options+0x278/0x3c0 [ 1345.422836][ T376] ? copy_mount_options+0x25e/0x3c0 [ 1345.428031][ T376] ? __sanitizer_cov_trace_pc+0x45/0x50 [ 1345.433583][ T376] ? copy_mount_options+0x308/0x3c0 [ 1345.438784][ T376] ksys_mount+0xcc/0x100 [ 1345.443035][ T376] __x64_sys_mount+0xbf/0xd0 [ 1345.447627][ T376] do_syscall_64+0xf7/0x1c0 [ 1345.452132][ T376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1345.458019][ T376] RIP: 0033:0x45c98a [ 1345.461912][ T376] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1345.481513][ T376] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1345.489925][ T376] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1345.497903][ T376] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1345.505878][ T376] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1345.513849][ T376] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1345.521819][ T376] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:14:08 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid'}}, {@seclabel='seclabel'}]}) 02:14:08 executing program 0 (fault-call:0 fault-nth:83): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:14:08 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MARK_BUFS(r4, 0x40206417, &(0x7f0000000080)={0x4, 0x8000, 0x200, 0x6, 0x10, 0x5}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000013c0)=ANY=[@ANYBLOB="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", @ANYBLOB="56a83b17195453b5219ad3dbce0b6b59df8977247cfdf2c5a2b764bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04651ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be41579fbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:14:09 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid'}}, {@seclabel='seclabel'}]}) 02:14:09 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplush', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1345.730514][ T391] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:14:09 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000001c0)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf00999552adec24105f91dae879f8d00ca738cacac1083f423ea79baa3ffa109529dc01816782441ef3cb4c65ec2eaacb694c88427e9fb91d617ee246bde1cd4a4a8a59f2add4a9eb4648a3a28b"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:14:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1345.867381][ T399] FAULT_INJECTION: forcing a failure. [ 1345.867381][ T399] name failslab, interval 1, probability 0, space 0, times 0 [ 1345.880771][ T399] CPU: 0 PID: 399 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1345.888484][ T399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1345.898532][ T399] Call Trace: [ 1345.901821][ T399] dump_stack+0x1d8/0x2f8 [ 1345.906171][ T399] should_fail+0x555/0x770 [ 1345.910597][ T399] __should_failslab+0x11a/0x160 [ 1345.915540][ T399] ? kzalloc+0x26/0x40 [ 1345.919622][ T399] should_failslab+0x9/0x20 [ 1345.924124][ T399] __kmalloc+0x7a/0x340 [ 1345.928281][ T399] kzalloc+0x26/0x40 [ 1345.932256][ T399] kobject_get_path+0xa7/0x1d0 [ 1345.937018][ T399] kobject_uevent_env+0x2f2/0x1260 [ 1345.942126][ T399] ? __kasan_check_write+0x14/0x20 [ 1345.947234][ T399] ? up_write+0xf3/0x450 [ 1345.951480][ T399] kobject_uevent+0x1f/0x30 [ 1345.955973][ T399] __loop_clr_fd+0x544/0x8e0 [ 1345.960571][ T399] lo_ioctl+0x100e/0x2200 [ 1345.964906][ T399] ? __kasan_slab_free+0x12a/0x1e0 [ 1345.970009][ T399] ? kasan_slab_free+0xe/0x10 [ 1345.974677][ T399] ? kfree+0x115/0x200 [ 1345.978738][ T399] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1345.984363][ T399] ? tomoyo_file_ioctl+0x23/0x30 [ 1345.989292][ T399] ? security_file_ioctl+0x6d/0xd0 [ 1345.994392][ T399] ? __x64_sys_ioctl+0xa3/0x120 [ 1345.999253][ T399] ? do_syscall_64+0xf7/0x1c0 [ 1346.003949][ T399] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1346.010021][ T399] ? debug_check_no_obj_freed+0x505/0x5b0 02:14:09 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x6400) [ 1346.015757][ T399] ? rcu_lock_release+0x9/0x30 [ 1346.020536][ T399] ? rcu_lock_release+0x9/0x30 [ 1346.025293][ T399] ? lo_release+0x1f0/0x1f0 [ 1346.029787][ T399] blkdev_ioctl+0x807/0x2980 [ 1346.034485][ T399] ? tomoyo_path_number_perm+0x53e/0x640 [ 1346.040136][ T399] block_ioctl+0xbd/0x100 [ 1346.044459][ T399] ? blkdev_iopoll+0x100/0x100 [ 1346.049217][ T399] do_vfs_ioctl+0x744/0x1730 [ 1346.053802][ T399] ? __fget+0x411/0x510 [ 1346.057959][ T399] ? tomoyo_file_ioctl+0x23/0x30 [ 1346.062891][ T399] ? security_file_ioctl+0xa1/0xd0 [ 1346.067994][ T399] __x64_sys_ioctl+0xe3/0x120 [ 1346.072668][ T399] do_syscall_64+0xf7/0x1c0 [ 1346.077170][ T399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1346.083054][ T399] RIP: 0033:0x459da7 [ 1346.086945][ T399] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1346.106542][ T399] RSP: 002b:00007faba37fba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1346.114950][ T399] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 0000000000459da7 [ 1346.122913][ T399] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 1346.130876][ T399] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1346.138850][ T399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1346.146812][ T399] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:14:09 executing program 0 (fault-call:0 fault-nth:84): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:14:09 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r1) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r3) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000040)) accept$netrom(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @netrom}, [@default, @bcast, @rose, @null, @netrom, @null, @bcast, @default]}, &(0x7f0000000080)=0x48) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[@ANYRES64=r5, @ANYBLOB="56c00fbced7db4eb3183a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6b21992b0b0c19e1e4a0018de01000000000000002d0d5c1be34952ae"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:14:09 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid'}}, {@seclabel='seclabel'}]}) [ 1346.297270][ T509] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 [ 1346.384041][ T509] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:14:09 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplusl', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1346.500246][ T623] FAULT_INJECTION: forcing a failure. [ 1346.500246][ T623] name failslab, interval 1, probability 0, space 0, times 0 [ 1346.513291][ T623] CPU: 0 PID: 623 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1346.520995][ T623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1346.531060][ T623] Call Trace: [ 1346.534351][ T623] dump_stack+0x1d8/0x2f8 [ 1346.538685][ T623] should_fail+0x555/0x770 [ 1346.543105][ T623] __should_failslab+0x11a/0x160 02:14:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 1346.548043][ T623] ? xas_create+0x1197/0x1910 [ 1346.552721][ T623] should_failslab+0x9/0x20 [ 1346.557222][ T623] kmem_cache_alloc+0x56/0x2e0 [ 1346.561987][ T623] xas_create+0x1197/0x1910 [ 1346.566492][ T623] ? rcu_lock_release+0x4/0x20 [ 1346.571266][ T623] xas_store+0x95/0x1440 [ 1346.575543][ T623] ? xas_load+0x434/0x450 [ 1346.579864][ T623] __add_to_page_cache_locked+0x5f0/0xbf0 [ 1346.579889][ T623] ? workingset_activation+0x2b0/0x2b0 [ 1346.579902][ T623] add_to_page_cache_lru+0x156/0x4a0 [ 1346.579918][ T623] do_read_cache_page+0x216/0xcb0 [ 1346.579935][ T623] read_cache_page_gfp+0x29/0x30 [ 1346.579947][ T623] btrfs_scan_one_device+0x16a/0x450 [ 1346.579958][ T623] ? trace_hardirqs_on+0x74/0x80 [ 1346.579972][ T623] btrfs_mount_root+0x4af/0x1040 [ 1346.579991][ T623] ? trace_kfree+0xb2/0x110 [ 1346.580004][ T623] legacy_get_tree+0xf9/0x1a0 [ 1346.580012][ T623] ? btrfs_control_open+0x40/0x40 [ 1346.580024][ T623] vfs_get_tree+0x8b/0x2a0 [ 1346.580036][ T623] vfs_kern_mount+0xc2/0x160 [ 1346.580048][ T623] btrfs_mount+0x34f/0x18e0 [ 1346.649277][ T623] ? check_preemption_disabled+0x47/0x2a0 [ 1346.655007][ T623] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1346.660283][ T623] ? cap_capable+0x250/0x290 [ 1346.664870][ T623] ? safesetid_security_capable+0x89/0xf0 [ 1346.670604][ T623] legacy_get_tree+0xf9/0x1a0 [ 1346.675283][ T623] ? btrfs_resize_thread_pool+0x290/0x290 [ 1346.680995][ T623] vfs_get_tree+0x8b/0x2a0 [ 1346.685407][ T623] do_mount+0x16c0/0x2510 [ 1346.689737][ T623] ? copy_mount_options+0x308/0x3c0 [ 1346.694925][ T623] ksys_mount+0xcc/0x100 [ 1346.699164][ T623] __x64_sys_mount+0xbf/0xd0 [ 1346.703755][ T623] do_syscall_64+0xf7/0x1c0 [ 1346.708258][ T623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1346.714139][ T623] RIP: 0033:0x45c98a [ 1346.718110][ T623] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1346.737794][ T623] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 02:14:10 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x802) r5 = dup(r4) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000200)={0x4, &(0x7f0000000100)=[{}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r5, 0x40086424, &(0x7f0000000240)={r6, 0x1}) ioctl$DRM_IOCTL_GET_CTX(r3, 0xc0086423, &(0x7f0000000040)={r6, 0x1}) ioctl$int_in(r0, 0x40000000af01, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r7, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) [ 1346.746212][ T623] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1346.754178][ T623] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1346.762144][ T623] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1346.770105][ T623] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1346.778065][ T623] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 02:14:10 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid'}}, {@seclabel='seclabel'}]}) 02:14:10 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x110540) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x81, 0x248400) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000200)) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000080)={0x3, r4}) ioctl$int_in(r0, 0x40000000af01, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$EXT4_IOC_GROUP_ADD(r9, 0x40286608, &(0x7f0000000180)={0x5, 0xfffffffffffffff9, 0x0, 0x1, 0x0, 0x1ff}) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = socket$inet6(0xa, 0x2, 0x0) r12 = fcntl$dupfd(r11, 0x0, r10) setsockopt$IP_VS_SO_SET_ADD(r12, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) r13 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r12, &(0x7f0000000640)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xc000408}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x218, r13, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x114, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xefe2}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffd}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9462}]}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1b59c0}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xce}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x1}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xc4}]}, @TIPC_NLA_MEDIA={0x78, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xdee}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffe00}]}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x1}, 0x40) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000280)=ANY=[@ANYRES64=r6, @ANYBLOB="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"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:14:10 executing program 0 (fault-call:0 fault-nth:85): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1346.969985][ T740] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop2 02:14:10 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/\xedevadsp\x00', 0x400, 0x0) ioctl$SIOCAX25GETINFO(r1, 0x89ed, &(0x7f0000000240)) ioctl$int_in(r0, 0x40000000af01, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$vbi(0x0, 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) syz_open_dev$evdev(0x0, 0x0, 0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps\x00') sendfile(r3, r4, 0x0, 0x80000001) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf"]) socketpair$tipc(0x1e, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_VERSION(r5, 0x0, 0x480, &(0x7f0000000080), &(0x7f0000000180)=0x40) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 02:14:10 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000080)=0xb0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x6800) 02:14:10 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplust', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 1347.174666][ T756] FAULT_INJECTION: forcing a failure. [ 1347.174666][ T756] name failslab, interval 1, probability 0, space 0, times 0 [ 1347.200802][ T756] CPU: 0 PID: 756 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1347.208555][ T756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1347.218617][ T756] Call Trace: [ 1347.221910][ T756] dump_stack+0x1d8/0x2f8 [ 1347.226252][ T756] should_fail+0x555/0x770 [ 1347.230676][ T756] __should_failslab+0x11a/0x160 [ 1347.235611][ T756] ? kzalloc+0x26/0x40 [ 1347.239677][ T756] should_failslab+0x9/0x20 [ 1347.244177][ T756] __kmalloc+0x7a/0x340 [ 1347.248336][ T756] kzalloc+0x26/0x40 [ 1347.252230][ T756] close_fs_devices+0x504/0x8d0 [ 1347.257086][ T756] btrfs_close_devices+0x33/0x130 [ 1347.262103][ T756] btrfs_mount_root+0xa9d/0x1040 [ 1347.267045][ T756] ? trace_kfree+0xb2/0x110 [ 1347.271548][ T756] legacy_get_tree+0xf9/0x1a0 [ 1347.276229][ T756] ? btrfs_control_open+0x40/0x40 [ 1347.281248][ T756] vfs_get_tree+0x8b/0x2a0 [ 1347.285661][ T756] vfs_kern_mount+0xc2/0x160 [ 1347.290249][ T756] btrfs_mount+0x34f/0x18e0 [ 1347.294753][ T756] ? check_preemption_disabled+0x47/0x2a0 [ 1347.300473][ T756] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1347.305750][ T756] ? cap_capable+0x250/0x290 [ 1347.310341][ T756] ? safesetid_security_capable+0x89/0xf0 [ 1347.316053][ T756] legacy_get_tree+0xf9/0x1a0 [ 1347.320724][ T756] ? btrfs_resize_thread_pool+0x290/0x290 [ 1347.326437][ T756] vfs_get_tree+0x8b/0x2a0 [ 1347.330850][ T756] do_mount+0x16c0/0x2510 [ 1347.335197][ T756] ? copy_mount_options+0x308/0x3c0 [ 1347.340391][ T756] ksys_mount+0xcc/0x100 [ 1347.344630][ T756] __x64_sys_mount+0xbf/0xd0 [ 1347.349242][ T756] do_syscall_64+0xf7/0x1c0 [ 1347.353739][ T756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1347.353749][ T756] RIP: 0033:0x45c98a 02:14:10 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5255e0bcfc87b0071") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x4ba5dc77, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="b011c24acdd1da543e6fd206a1d8330d60b3c80a716d864dcd37", 0x1a, 0x5b08}, {&(0x7f00000001c0)="9ecc8650d4b37cc3a7cae44debe26d3704279698fcd2cf", 0x17}], 0x281000, &(0x7f0000000340)={[{@device={'device', 0x3d, './file0'}}, {@nossd_spread='nossd_spread'}], [{@uid_eq={'uid'}}, {@seclabel='seclabel'}]}) [ 1347.353759][ T756] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1347.353764][ T756] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1347.353774][ T756] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1347.353780][ T756] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1347.353786][ T756] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1347.353791][ T756] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 02:14:10 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000001c0)=ANY=[@ANYRES64=r1, @ANYBLOB="56a83b17195453b5219ad3dbce64bc8d05a6f15b69bbf875401dbdfaa759c42bf6f47d9a0351d04650ce800db9bd26dc1f5d9c4f9dedbdfb262d149ec3e234260a650464aa525356444c3570efaaefa7e6be4157bfbf4e932d0d5c1be34952aec5b25f7cc87308c0bf687445ef7e445ed73a315b84e8b29101c7fe5c0e4e837b9e585b1d0d73d362f2a57024f7c5e9f47badca851c63987c69b572a2b98761ae3aec40dac6c15493cc01ccc1928b29304b3ff217e439a820"]) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000000c0)={0x6, @rand_addr, 0x15, 0x0, 'sh\x00', 0x6f, 0x8000, 0x6d}, 0x2c) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r7}) [ 1347.353800][ T756] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1347.372746][ T756] ------------[ cut here ]------------ [ 1347.436901][ T756] kernel BUG at fs/btrfs/volumes.c:1271! [ 1347.451200][ T756] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1347.457310][ T756] CPU: 0 PID: 756 Comm: syz-executor.0 Not tainted 5.4.0-rc4+ #0 [ 1347.465005][ T756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1347.475064][ T756] RIP: 0010:close_fs_devices+0x8c8/0x8d0 [ 1347.480683][ T756] Code: e9 73 ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 7c 87 48 89 df e8 29 81 f9 fe e9 7a ff ff ff e8 4f 41 c0 fe 0f 0b e8 48 41 c0 fe <0f> 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 [ 1347.500277][ T756] RSP: 0018:ffff8880628379a0 EFLAGS: 00010246 [ 1347.506335][ T756] RAX: ffffffff82b30228 RBX: ffff8880959be5d0 RCX: 0000000000040000 [ 1347.514299][ T756] RDX: ffffc90005f45000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1347.522280][ T756] RBP: ffff888062837a30 R08: ffffffff82b47ce5 R09: ffffed1015d46b05 [ 1347.530242][ T756] R10: ffffed1015d46b05 R11: 0000000000000000 R12: dffffc0000000000 [ 1347.538202][ T756] R13: ffff888099c26000 R14: 000000000000000a R15: ffff88808b920c00 [ 1347.546166][ T756] FS: 00007faba37fc700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 1347.555083][ T756] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1347.561657][ T756] CR2: 0000001b33623000 CR3: 0000000099020000 CR4: 00000000001406f0 [ 1347.569632][ T756] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1347.577590][ T756] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1347.585552][ T756] Call Trace: [ 1347.588850][ T756] btrfs_close_devices+0x33/0x130 [ 1347.593868][ T756] btrfs_mount_root+0xa9d/0x1040 [ 1347.598803][ T756] ? trace_kfree+0xb2/0x110 [ 1347.603299][ T756] legacy_get_tree+0xf9/0x1a0 [ 1347.607964][ T756] ? btrfs_control_open+0x40/0x40 [ 1347.612982][ T756] vfs_get_tree+0x8b/0x2a0 [ 1347.617388][ T756] vfs_kern_mount+0xc2/0x160 [ 1347.621968][ T756] btrfs_mount+0x34f/0x18e0 [ 1347.626472][ T756] ? check_preemption_disabled+0x47/0x2a0 [ 1347.632188][ T756] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1347.637461][ T756] ? cap_capable+0x250/0x290 [ 1347.642039][ T756] ? safesetid_security_capable+0x89/0xf0 [ 1347.647760][ T756] legacy_get_tree+0xf9/0x1a0 [ 1347.652438][ T756] ? btrfs_resize_thread_pool+0x290/0x290 [ 1347.658158][ T756] vfs_get_tree+0x8b/0x2a0 [ 1347.662575][ T756] do_mount+0x16c0/0x2510 [ 1347.666903][ T756] ? copy_mount_options+0x308/0x3c0 [ 1347.672099][ T756] ksys_mount+0xcc/0x100 [ 1347.676340][ T756] __x64_sys_mount+0xbf/0xd0 [ 1347.680959][ T756] do_syscall_64+0xf7/0x1c0 [ 1347.685455][ T756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1347.691429][ T756] RIP: 0033:0x45c98a [ 1347.695315][ T756] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1347.714920][ T756] RSP: 002b:00007faba37fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1347.723337][ T756] RAX: ffffffffffffffda RBX: 00007faba37fbb40 RCX: 000000000045c98a [ 1347.731306][ T756] RDX: 00007faba37fbae0 RSI: 0000000020000100 RDI: 00007faba37fbb00 [ 1347.739271][ T756] RBP: 0000000000000001 R08: 00007faba37fbb40 R09: 00007faba37fbae0 [ 1347.747231][ T756] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1347.755190][ T756] R13: 00000000004c94ef R14: 00000000004e0cd0 R15: 0000000000000003 [ 1347.763161][ T756] Modules linked in: [ 1347.774864][ T756] ---[ end trace 94a21628e8e04966 ]--- [ 1347.776657][ T761] kobject: 'loop4' (000000005b502b72): kobject_uevent_env [ 1347.780545][ T756] RIP: 0010:close_fs_devices+0x8c8/0x8d0 [ 1347.793334][ T756] Code: e9 73 ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 7c 87 48 89 df e8 29 81 f9 fe e9 7a ff ff ff e8 4f 41 c0 fe 0f 0b e8 48 41 c0 fe <0f> 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 [ 1347.794244][ T761] kobject: 'loop4' (000000005b502b72): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1347.813315][ T756] RSP: 0018:ffff8880628379a0 EFLAGS: 00010246 [ 1347.829770][ T756] RAX: ffffffff82b30228 RBX: ffff8880959be5d0 RCX: 0000000000040000 [ 1347.838017][ T756] RDX: ffffc90005f45000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1347.846188][ T756] RBP: ffff888062837a30 R08: ffffffff82b47ce5 R09: ffffed1015d46b05 [ 1347.854326][ T756] R10: ffffed1015d46b05 R11: 0000000000000000 R12: dffffc0000000000 [ 1347.862506][ T756] R13: ffff888099c26000 R14: 000000000000000a R15: ffff88808b920c00 [ 1347.870144][ T3899] kobject: 'loop5' (00000000c8e7e530): kobject_uevent_env [ 1347.875968][ T756] FS: 00007faba37fc700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 1347.877786][ T865] kobject: 'loop1' (00000000449d27b6): kobject_uevent_env [ 1347.886769][ T756] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1347.897695][ T3899] kobject: 'loop5' (00000000c8e7e530): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1347.907690][ T756] CR2: 0000000000960004 CR3: 0000000099020000 CR4: 00000000001406f0 [ 1347.911437][ T865] kobject: 'loop1' (00000000449d27b6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1347.921098][ T756] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1347.940794][ T869] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x12e8/0x1f10 [ 1347.942090][ T756] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1347.961775][ T756] Kernel panic - not syncing: Fatal exception [ 1347.969156][ T756] Kernel Offset: disabled [ 1347.973476][ T756] Rebooting in 86400 seconds..