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", &(0x7f0000000000)="2a53375c366e1b4a6b142be212b9f096682cb9a43dfeb0a59307cb156f74434a17298f320d799e331a", 0x1000, 0xffffff58}) 02:43:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r2, &(0x7f00000001c0), 0x1000) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_netdev_private(r1, 0x89a0, &(0x7f0000000000)) close(r1) 02:43:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:43:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdirat$cgroup(r3, &(0x7f0000000000)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RNDADDENTROPY(r5, 0x40085203, &(0x7f0000000040)={0x7, 0x80, "80a6532a8fa264085869b9818953ffa84213489899eeeae9ddcbfd941eea34194c41fe79bea7ecbc6b64e83596e28f41d25e58cb6c30aeb235d208f10730198c17320ad1252d9a2d6a54911e82c69745d4da6144c161af02b14dbe76f1c92f187a3810ef7266e9b673358e90e2f89aaa551f83c06c1288b18c2cd10cf4748ffe"}) 02:43:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:43:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xf, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 02:43:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x96e, 0x2600) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000040)={0x1, {0x7, 0x0, 0x5e, 0x1}}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8000, 0x480000) getsockopt$rose(r1, 0x104, 0x7, &(0x7f0000000080), &(0x7f0000000140)=0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arb\x00', 0xd045f06cd6a6fcea, 0x0) ioctl$sock_netdev_private(r2, 0x89a0, &(0x7f0000000000)) close(r2) 02:43:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 02:43:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f0000000080)={0xa30000, 0x649d, 0x80000000, [], &(0x7f0000000040)={0x9c0907, 0x10000, [], @p_u32=&(0x7f0000000000)=0x1000}}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfdef) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) r2 = pkey_alloc(0x0, 0x3) pkey_free(r2) pkey_free(r2) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvmmsg(r4, &(0x7f0000003080)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/87, 0xd}], 0x1}}], 0xffffff1f, 0x0, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$FUSE_IOCTL(r6, &(0x7f0000000000)={0x20, 0xfffffffffffffff5, 0x7, {0x6, 0x8, 0x8000, 0x5a}}, 0x20) sendmsg$nl_route(r4, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000280)=@ipv4_newroute={0xd0, 0x18, 0x1, 0x70bd27, 0x25dfdbfb, {0x2, 0x9db3349e3626ed18, 0x80, 0x3, 0xfc, 0x4, 0x0, 0x3, 0x1800}, [@RTA_SRC={0x8, 0x2, @empty}, @RTA_SRC={0x8, 0x2, @multicast1}, @RTA_SRC={0x8, 0x2, @remote}, @RTA_PRIORITY={0x8, 0x6, 0x9}, @RTA_METRICS={0x8c, 0x8, "5a58e14cff9be5eb35672b7c30b5718856c86c3eb97f35e3e14acecb675f212d0c19c57c263cc6fba8688a2ea2d98e5739f184373966439e0d69286f436c7bca38229d21f4258256bc06512348659ae9771768a3c4d84258266d88d8124cd0111b0256223823e5b2ca56e46ee5e9082373c9700961e79b605af3fe01b47e62059d3edd3ebd"}, @RTA_GATEWAY={0x8, 0x5, @multicast1}]}, 0xd0}, 0x1, 0x0, 0x0, 0x20008011}, 0x0) 02:43:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_netdev_private(r1, 0x89a0, &(0x7f0000000000)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, 0xffffffffffffffff) close(r1) 02:43:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0xcc, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000000)=0x96e, 0x8) 02:43:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x10, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 02:43:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000000)=0x1, &(0x7f0000000040)=0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000080)=0x10001) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x5, 0x8, 0x3fb, 0x401, 0x3d0, 0x1, 0x2, [], r4, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], r4, 0xffffffffffffffff, 0x3, 0xffffffff}, 0x3c) 02:43:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 02:43:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCLINUX2(r3, 0x541c, &(0x7f0000000040)={0x2, 0x4, 0x1, 0x7, 0x4, 0x401}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_netdev_private(r1, 0x89a0, &(0x7f0000000000)) close(r1) 02:43:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x220000, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) r3 = getpgrp(0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3c) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r6, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r6, r8, 0x0, 0x11, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r3, r5, 0x0, 0x11, &(0x7f00000000c0)='/dev/vga_arbiter\x00', r9}, 0x30) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x10, 0x4, 0xb1, 0x42, 0x0, 0xffffffffffffffff, 0x1, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) [ 386.369026][ C1] net_ratelimit: 13 callbacks suppressed [ 386.369073][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 386.380666][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:43:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xff1e675d63c67343, 0x40) r3 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x8, 0x200000) renameat(r2, &(0x7f0000000040)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00') r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TUNSETSNDBUF(r6, 0x400454d4, &(0x7f00000001c0)=0x5) recvmmsg(r0, &(0x7f0000003080)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/87, 0x57}], 0x1}}], 0xffffff1f, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$TUNSETTXFILTER(r8, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB="090007002f6fa04b55fe1dbfd8fffad1ffffffffffffffff000000000180c2000000ffffff560553000000000000"]) 02:43:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 02:43:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x5, 0xa, 0x4) rt_sigaction(0x2c, &(0x7f0000000080)={&(0x7f0000000040)="470f01d046018f08000000c402fdde470e3e7b00c4c209bc82f80000000f4e19c4832d6a700e4dc4818974762ef6a9e384a112676645d87b03", {0xa6}, 0x30000000, &(0x7f0000000100)="f3450faedcc481fd5808f20f584e00660f69be80d703f8c481fc299a02000000c4c273f59137248c50f24e0f2aae48e70000660f16af00000000c4829906b63bb600008f6978010d00000000"}, 0x0, 0x8, &(0x7f0000000200)) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)}, 0x24001050) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_netdev_private(r1, 0x89a0, &(0x7f0000000000)) close(r2) 02:43:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x11, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r3, 0x40405515, &(0x7f0000000180)={0x8, 0x4, 0x4, 0x80000001, 'syz0\x00', 0x874a}) r4 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r4, &(0x7f0000000140), 0xcc, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r4, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00', 0x1a, "43b127b03e2c11e33191bef1841876947dedaa048a6ef5c7277d"}, &(0x7f0000000200)=0x3e) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r6 = dup(r5) fcntl$F_GET_RW_HINT(r6, 0x40b, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r6, 0x80045400, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000080)=""/177) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 386.849015][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 386.854905][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:43:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 02:43:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0xcc, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x0, 0x4) r2 = dup(r0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) [ 386.929032][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 386.929076][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 386.934836][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 386.940556][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:43:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) sysinfo(&(0x7f00000001c0)=""/233) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_netdev_private(r1, 0x89a0, &(0x7f0000000000)) close(r1) [ 387.009004][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 387.014879][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:43:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r2, &(0x7f00000001c0), 0x1000) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_netdev_private(r1, 0x89a0, &(0x7f0000000000)) close(r1) 02:43:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 02:43:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000040)={0x7, 0x1b, 0x1}, 0x7) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0xcc, 0x0) accept4(r3, 0x0, &(0x7f0000000080), 0x400) getpeername$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0xffffffffffffff01) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], r4, 0xffffffffffffffff, 0x3, 0x10}, 0x3c) 02:43:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x12, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 02:43:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r2, &(0x7f00000001c0), 0x1000) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_netdev_private(r1, 0x89a0, &(0x7f0000000000)) close(r1) 02:43:24 executing program 4: prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAF(r1, 0x5413, &(0x7f0000000000)) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000080)={{0x5, 0x0, @descriptor="88d0221b3856e481"}}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r4 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) io_uring_enter(r4, 0x1, 0x400, 0x2, &(0x7f0000000040)={0x5}, 0x8) 02:43:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_netdev_private(r1, 0x89a0, &(0x7f0000000000)) close(r1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) getpriority(0x2, r4) socket$nl_netfilter(0x10, 0x3, 0xc) 02:43:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) 02:43:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) sysfs$2(0x2, 0x1, &(0x7f0000000000)=""/97) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000180)=""/201, 0x20000, 0x2800, 0x7f}, 0x18) 02:43:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r2, &(0x7f00000001c0), 0x1000) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_netdev_private(r1, 0x89a0, &(0x7f0000000000)) close(r1) [ 387.845591][T21015] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 17050532955254037791 /dev/loop5 02:43:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_G_PARM(r3, 0xc0cc5615, &(0x7f0000000000)={0x2, @raw_data="9422d36f161cb7ad42ff6f89e9e2ae20b6cf5153d2710faa426ee026fcb684b492dcd6f9bab6ff1bdf87a9516255dee691c3b484be19e24c061d0a8e92f18a5af2e012189e92e15a3246c1e35cf3e36294ae1be4b53b1992d8c98aa4bd5f517cc7e25378b43cdf4ae7132304a4d7ee22161b54b1200baef2a27404855ba4cf45f25a77dcbe56c8d9069ddec1651a58f217d61c5f4ea247fc88f2f6728bb8e1925213dad66e46c3f12e6c991c15cec181235bde66bfac5b6832cf1f0300"}) 02:43:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x25, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) 02:43:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r2, &(0x7f00000001c0), 0x1000) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_netdev_private(r1, 0x89a0, &(0x7f0000000000)) 02:43:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:25 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000007700)=[{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000280)="1fb952ccbeb89badc60cedb2cdd778c66e2ee3ed74dafcec7e6bd09ac19bb1a99cc0a3d546d109bc342f16923136319d8d7f3f900348f1e87a2d460b94c957b93154e05d3f69e0ee0d362fddab431ae8eb12c43dd7958fb9787b8895a56406374cfa2bd0e44a1b92e8d3079422996954b4963a5b4cf85a7ac8d25b0f489fb5e60afafeff4264441d742356acd63ed712f3dd7fc7fd5e8d83eed642f159de63f9e23b9f1ad60549b9330fc824b073a90c2479e0387237c29489adf9dd3000c7a72672752bdce47e57b74f3585c459128839", 0xd1}, {&(0x7f0000000380)="6acbe10c6e4bfc6d2c48d780e5d3ea4882ab209a2888273d79c6167ba17c3dff9db19f8fec30dda0c71ee3f9ba74f1bff02b026f08ab285056f4c31a0abd9a6a15432ff2d4c40801bd7319a91a15dadc37abf95d5c7e21bcd5ce8e7f967d68f275e51d3658f51d6bc664914f147bbd63c90778cf342a0431a1d9a6d3dfa4558b71db0e1448aac86b82780d6ee4631ba47ebe06ace850ebd8bdfaac67c90bd170707b4f2a4d87955ee6009f06af11d88819e401b4a863595c3884d4e8e464174ee77257acd7c4834d9362cac096e547d6f9a7fe7ce0cef808f4f4decf33b9be0c71261fdb4c52cb0ea7a889", 0xeb}, {&(0x7f0000000480)="3181f2d2d8c633d75428f219a5c36f421b1332d2d862dc33d97fc698bbfb91b9a71e3a85101a8a6b3ed5072b01103f17ea907bc6e64e3eddcb3366deb2f80567856e5da325fe28cde47a76a921dacce505e6bcb1eea9cacc2da401b1853bc9c2736c339d77296761f695fc70cafba0934c56c727ecb968cdd443a45cb6a0664a173b79ccaf12a29c188f060157e40c2ec5fde84f937915c77c4519cdabc68c317113440c89d5", 0xa6}, {&(0x7f0000000540)="9643fb3e7b9cc8518f7e7baa8517b8ebad746fa348286ce018417937835a641ac694189d2d85eea2dbd00bcc7be2ee6fee25903e063cc4c157b8c86164e307a22f91ad4bb6d25b231f6c896077f868649e6dfb2b2bc95f89a3578cb807", 0x5d}, {&(0x7f00000005c0)="eea811fc3d4625027e7a4c4ca0998ee69cc7a8ffafbe6e415d7877f04d8532e0afbe9eabaed91080a47cc708fef0cd5d98b36b24e44cde31c196c47f1a5e06017ba60fead771e59ff7a51f37aeac22aa147b3d51484d4211e2ca3a08a5f80052f2fe143abfd1c3addd3815aae67464cf23ddd4f1b0cf8adbce01e7c115428f0b4e09bbd8581da34ab5ec195c9b427f3ce0adeafa1258feeeb528eabf9c253e18d339dce7b684279b865673ff5d992a381b0a5ca5599176a5883a78d807043974c07b02ee3ac5915f55fe5eaf907977d0e12b2668b2a943526be349da00a5e61f10c8cc631daa", 0xe6}, {&(0x7f00000006c0)="33c6ddaa0fac7325a79f1b2f1aeeffa1dd733648c7e34022981963f4379bcffa1ea6b6068f45b2cdee4817ab4f1eae1c627b00", 0x33}, {&(0x7f0000000700)="ea1f219c91e314d6bd29d0cf23c71209807412895e429420e77a4b7a44e8cde9d6518c913a589e0beba2e7b6a0cc6c2a15a92330bfd57da36792ca7ee66a86004a9d2d2001c18a695544b4a39de5d9d27f198bb90fcb7879e2e762482f3451b339d74edfe431c7b91b5694e83600f20dc3712dbcb3debfa212a7581218846826f9b38acfc5c7f85ee4aa661794896952e31985bf17b179f794cf24ce9d67bf8fbf348cd55845ecddcd6cb0273241d4d97c181d31a35484ddcdd822ad70512c9106d7e2830a75e06e413bbb76c3f0c8222b39dd7393f04e1ba59540bc9bfee16d42b620e61ab8f76b7d7e1c88f94e00b290b491", 0x25}], 0x7, &(0x7f0000000880)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x4}], 0x30, 0x80000}, {0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f00000008c0)="f6e2e473e10fb05fa2cea8d62d75f2323407cfb43912215d3f319db73f5403abf23d503187434cb8bd03b728ae422f", 0x2f}, {&(0x7f0000000900)="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", 0x1000}, {&(0x7f0000001900)="14a0ddba27581a34e584ed7e430d251042ee852e47b71b2bf8ef6b9900ec23e334fafa48f548be898772ad2c7325912c48d92c4e7b0243f8a0a16563245e21dc9e0595528daab0a88cd1fd42f4234a3923831d642061bbff21236775c222664c5b0feca2b5ca5347161a9c5ae34491fa1900c6bd1c1ed61703a06ca78d3d1deed73474f45eb57429d3fb2eccdd35fbc5f0f771315057d631f9e70f5a441d0f857256fddd91b30fd0fed04577d2c41c84cc3bbfc9fcf4c3440792ccbfa3", 0xbd}, {&(0x7f00000019c0)="85bb2836ec84e97a60e336861ac2aacd8644650110ad771b161624919c6376448dc07bc7e03c3ee72bb69ac431eab1716edbb484710921a7e02bd2d911482653d1fbc316f8c23074d946843626836914b067f0a6e155788386d3b10fc837687430211acef81febde3eae0a1ca38393728858c253af2a0d90639ef52f77fb4933258375a9ff9b7a4535b288e9287abd63b4f4e440fcd78ad6b260eb0d19738fcbc641b9d83a7c73ba1c9012e4d65f1cf3f1d79ec1368c896e72418b48166c5a3a5f632a371bc2591d6c", 0xc9}, {&(0x7f0000001ac0)="364444b01fb6a4bfa2c1b9738df7d2166da3ed59cd91e3cc082ea8ba5ad9c90e2cb568a2c28a85dd4b1b78596e71bcdede2078326db15c2db362f5b3df4c6d4a16187615f01374b57aa00e1fd044a64c8462413f4ed9427517f3085ab86a7f5473fa772d64e58c639cef6a09ed1109aa8430b1f8bc14551d95d13290fb1a68758c50220143b3416bf2e1a30dbb9194", 0x8f}, {&(0x7f0000001b80)="9cafa32890c25b696799cf59753e1c4b16e353d98838dd1f835d34dbc9e2903c390643774e37de125a88b48314dc22ed2bcd4f4e787cba5957256f69433d724a37d10391af0b99160c6f5b9fdf2e1a3f84d1b94b", 0x54}], 0x6, &(0x7f0000001c80)=[@op={0x18, 0x117, 0x3, 0x614542a4a05290d}], 0x18, 0x20000000}, {0x0, 0x0, &(0x7f0000003dc0)=[{&(0x7f0000001cc0)="1510e11f6efe6da799a3148bb1a53a5ebbfabfd12cdaed5821e3b5b508326a536a46448a39c739b7dd10dceaf6042ec42dcaddc24e8c319202c4b2af2d3aa79e628e740acca0236f1a9233336f794b8a7af8544bf3fb8834064d496407d36aeecae21afe1084827f283136c00b92cdee240142c7c5c471837fea8362c31d17acbf69da3289db6ea0b47d337bdd521259153a22c7da0c83481aa7bd6cea2df0db5c04f0f218ae98452223f3092aa070d2847eb0f3eb11a2928fa4a4cea068741c06af13ce9ffacc41aea7e1f8fcc04100b93bb4865c26254840fcc91264703eeace306bf4a06ac1dc5fe838f4389060119992420daf", 0xf5}, {&(0x7f0000001dc0)="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", 0x1000}, {&(0x7f0000002dc0)="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", 0x1000}], 0x3, &(0x7f0000003e00)=ANY=[@ANYBLOB="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"], 0x198, 0x804}, {0x0, 0x0, &(0x7f00000043c0)=[{&(0x7f0000003fc0)="78a8572b6cb80611d6b887108db9e4e85d9523dc97951d7b", 0x18}, {&(0x7f0000007940)="9b62a78bb629bfa850000000000000", 0x7}, {&(0x7f0000004040)="5b168e5a7e1d04d151cad270e46e86d216586999f77f647aa5452bc799a520cc24e31585a8a59c920d6f764855c8bf0451f9dadcbb6dd668", 0x38}, {&(0x7f0000004080)="09b60b75bf70951dbd9e82290c32c65ae7127b5c0741708d267a61dbcdc50512e34be574b4cda9861c7842ed2f75ce8bf1115eb28d80be5c8f86c88c1dce2a573ebc34d3e4602768038af31c4b197f7682dd182ef603f4091255b5d2e24293b4490bc6bbcff5bb806cae57d11c94083a8f4734322bc33ad39474e98c5f99ca6c93947506368f7efd850865e11815ed4f14a7d31a20a0f264c6a9d972f11e", 0x9e}, {&(0x7f0000004140)="09c9818a94c7466084d198273b6135f8fc3101a223c18112166680af830e7acf960726a857acad00701b1a9379c80a02372d1f53272086fd821214185aa2fe6b7f9b05c546410249901f132c5ee64c95a97d8e9b6ddc176a68ff1ef7e0048728c2991de565496eb1e9af71f2433d7bfb8bef1cd1788bdbfa18778b9405127ed1732e4cdc5de81207885b42dc16057d2fe829e3315aafecd578852c43c30b6c98af11", 0xa2}, {&(0x7f0000004200)="ec2acb4e16cecf0ccb14c5494f60cec540eeaab5a35b7a0eb71395fc640c49d5ec61cffff38ded57da409a2ef59487dea23f9a5e35b29c17f0d0967ec40225c67638", 0x42}, {&(0x7f0000004280)="61e435057a91e128ec9a2315295013f3e0a49db87cf5f1ccebbb8d6da9b741c3c10a4a16ec536423c58e25ba2fda230f0970537ef7a63cc73792381b49e657802cdc2f60d033d65d638490e2851f6ff534325487753e100b1a4f4dea3540b42f0349b0519b7ecf72cf1456a848cd9479b47c64765ff5ecd4ea47a17eb2cff2798cd7dbc8611c4c9f31b303e06d9fb88512197df9e6cb184a2878e807e559171d", 0xa0}, {&(0x7f0000004340)="d8826340f9006235c6820a87ecd5e72142cc16d508f508156f34947a14173ab33a54c1606f1599d61cc8e538247f331daad4cbd0be0fd063e3fe8c2cdeb08e40699f2611596c4db96313db31dac152f26abe8b80a3a9623065beb8dc4b6427", 0x5f}], 0x8, 0x0, 0x0, 0x80}, {0x0, 0x0, &(0x7f0000004540)=[{&(0x7f0000004440)="06be5132be300f8c4336c5b50d4dc18b19b4442f3ff923133a590d1fc3efb09680ff6d", 0x23}, {&(0x7f0000004480)="9dff60", 0x3}, {&(0x7f00000044c0)="f2bb4aa626de31f42c9e788e0d3fda6ef2fbcc0bb0bed0e4e0c5a79cf364a8dc", 0x20}, {&(0x7f0000004500)="8d678e", 0x3}], 0x4, &(0x7f0000004580)=[@assoc={0x18, 0x117, 0x4, 0x3}, @iv={0x18}, @iv={0xc8, 0x117, 0x2, 0xb2, "b0df1a26202197f0f4a54750fd63dc9c09cd9e2da0f0dd9a6e5c26ee770d082390c836722910e65597f7247347895fb1e1debad3188be287fc1ef9389d4f996e05676b2b35a37f5e4302fe45be47a3370f12299b1834ce6ed7759463a362e42cd99d93980cf73e3a63165b7e547be244ceb295aa17c37098a55fbaed90885c3edd1704b773b6a0be3a13555d36c935cc6b9b3673b7d7576f99a7b463d404111c3a373d098f2833d73b90f33d0e946e0eee54"}, @assoc={0x18, 0x117, 0x4, 0x1ff}], 0x110, 0x4800}, {0x0, 0x0, &(0x7f0000006940)=[{&(0x7f00000046c0)="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", 0x1000}, {&(0x7f00000056c0)="014fea86258777a4742a515a32db42b6b0de186c33457b18f18f8954bd23b817cd63195754e46fbe788540a7bf4bf44370f2de684ab583232c3c9dfff235ee", 0x3f}, {&(0x7f0000005700)="05f84efb62e0f2af34a1e39c72361c4edd9b968dfa16d3f8e20a331bd20c6a3b0a020bd68f863b2346564d1fe7fccb792ddc9f7139e76442048f04cb9be13f00a07c8128c946cb119b38cf1658c48c55637f4dcb4507905c00e373261e72d0733222212511b6a4af58ca6f9db50ffd5405177abea259351f36fb38d5b5f27c17fb436dc2d0b1f0530980fa93c3d2ba22fe05fb8dea31bdb361d00689582c49203e6c87f00cd6e9eb4e79ff07c663026302d1e3633f890fd5a4c092fc8fc694794e8c25a59ddab8064ee156c5cc21117fbf20b57691647909ac364d7ab2315d604f37008dd189626d8bab4fb9f7a52b25dd2f211b3f", 0xf5}, {&(0x7f0000005800)="453d5dc19fe81cf0f9dc3bacc02493c47d0c3da58c2867dd425cdaed543e755c466a035384be73a5339213e27ea0ee58cec2255e1a1e20dfb087ccea2abcf5b4d7551f05a513e9d8d754e5049ff389a6db765eb5f4f5ca5f828cc7883abfc4bda0c044291bb02930ae46e5104f0f29b6136d7f03bf83803de1d039cef5dc8efde103bf63190c102375cceddb85c2e362e0684aeee5828ec8f4e7c6db159aaded1b490f9ff5642967fcfbbb1f7da84929be851bfca20dcddf5468b53ee1234024a82c3ea51fb1df1c43417363ac9eccced49b38f744d95c28f7d826040e53de223c5010eb2824c96d11ba6b507dccb3", 0xef}, {&(0x7f0000005900)="71b7e8d56370b8da628ca9479ab05f49b5459c44e0b8bf", 0x17}, {&(0x7f0000005940)="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", 0x1000}], 0x6, &(0x7f00000069c0)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @iv={0x68, 0x117, 0x2, 0x4d, "5bc49b37e792dd547f6e413e9878fd69b0e3086c0c951ce383034dfe82ce6a3294041a7830c005d6e81b6a2f2bc142d85c7295de94a9098d8a191e9510c8d05c75873112e39bea9879707b945e"}, @assoc={0x18, 0x117, 0x4, 0x5}, @op={0x18}], 0xc8, 0x40000}, {0x0, 0x0, &(0x7f0000006f40)=[{&(0x7f0000006ac0)="d5e64ac176276a7ce2ef6846f1092c42e8acccd2f6b19e2d9eb4de4041665bed69af2576f48fc10a9ba307c8a42b19c0f2c1beef8d55da25c836083ae5018c934ca6c6f7660c779e75e720f5acc12401be2069143d54e54f203468b7281ee894029a53d97bacfa1b3c2ebd468b565e1b8407bd475cd347e4bc1f4df2c45c", 0x7e}, {&(0x7f0000006b40)="05ca5d1007cfc5d44a0581f1cd944529437e1d7d5ebc8e5183dde8dd57b27e9ba99f43de8c55c25e817b3bb16d171a569469f9a266d4607f1f3e3987cbe2a8ecb59b397da8dee138c0e53000cc9c5da737502ffcb4200cf9ee3d6f6dd774fd37d022bd52477d724a9810deea54655bcea798e8f3f3eaaa782b199a66536acf13efbb2b0e5f6f4aa0b32905d61b8b16ec6f8ddb7b4edd43673938fc8f6ff3ef0f580bcb63085edc9734a76b4abd15fdf4cc13ec9bea51873c8fb9fd003f", 0xbd}, {&(0x7f0000006c00)="404db7b0a994ec40a7a7b101d5b4a274be7090d00cfc1aa5c2b7b021", 0x1c}, {&(0x7f0000006c40)="9a2e8ddeeb5b7b6cc43ae70fc96ae647d7cb2de5da6a6317a7da67bb43eb52647be10f83a1c64df61caa8a767fef371196f6a89fa6471db9da0328ab2bf9d5020ae61a415e39441d9650d8f180c70771271d5ca53edf3b6d9e51d9ef028e02abf80bb4088f2b63c82a5cff9d373b7efa7b61cb98b1cfef3031e12bc25927fdc83d475a578bb7de1600453c6116149aa5ec6e26683b4bf6611638b881e437b02af7058e2ac6477358ebb6c39297cf044ed77ffb5048f1e273979f36f76f09b0903165a04de05236f8ad9765fa3f68cb6684edecb5d4f09278fa2c45703ca6339c2e07b0afd73363c102d1ee", 0xeb}, {&(0x7f0000006d40)="f717bbf5a08665fb55ee9ce6eac8bbee548988be80e7b73a89de0a0d08a8b94ee916986601838f", 0x27}, {&(0x7f0000006d80)="21a27a297625574ff6fd4121749c75ffbbaea20be75dab4526", 0x19}, {&(0x7f0000006dc0)="d87beb152d25e56f770c8384b85ded0eab1de692a0fbf8d46c50fa932374fa589543896452ff080010695c090b7bf6d75238fa789c5c98644561a986b2b55311dbd7101fe8784fc3f91c903b0046bfdba08195c47b36631d8fed6d260bbc65d8b648452f99dd2e1ab9c893364f8cb204f4900d55e3917369eefc5206be60fe31919ba8f3782af04a5d7978f00372b879f827d31b337dcf36c40c6657c7", 0x9d}, {&(0x7f0000006e80)="01015f30e7ea07d2d2b3660237a7aa3ffc5263dd100a0b30c4a1020143c7efa3a3c2dedbec1c6b55d80af60a067620afe6d445f6a2c6ebc1e4470541f9159afc36957ef118420a9818ad3df86ea432648bed661f4ec80ec5e78b234b1c09eadd0bc623b18e74aba34b3cb1c88673f082476c682cbcd5d7e7452baef84228edbd1ba8388b5458ab1a7b9a3c94c1b052e6b311af4e9e3a0fd26af6b033", 0x9c}], 0x8, &(0x7f0000006fc0)=[@op={0x18, 0x117, 0x3, 0x3}, @assoc={0x18, 0x117, 0x4, 0x3}, @assoc={0x18, 0x117, 0x4, 0x3}], 0x48, 0x2}, {0x0, 0x0, &(0x7f0000007200)=[{&(0x7f0000007040)="e56523bd3a6fc8a4e18e1664f0780d26fec312fa66dc8071cfaee1c039bb54ab31f0e430feaca6bc8076f7f1a84a1273698e5cf464d35077c72786db74f452cf0b6a49e85704fc5e3f285ec1d4a49f22da2053e0175f76234c1ee76c5952715d10e68bf3b37a15c88cef6775ccf906d2f2b6eb171bc992afae0225dd58ce8902c768a0c847dd95d8bd5bca94d737a699637a4e6d8d2b897e3c4900e313c2e65b5907551e66614c9338", 0xa9}, {&(0x7f0000007100)="285252cdb9c2116e8826837df94bcb42536dbd26fa557d9c5b05", 0x1a}, {&(0x7f0000007140)="92d699b537b7c310a5f8a48742995d00646965b0d4fbc234e2713c2bd1f0196385f8c146a6311659d56db7b40b50f50fff38faddec5e3a601171c33efb52b0e266dc36b5e5841fb891830950db6ac1784edf10f813ec087f94069b5fb8dc8971df173dc945364a838429dfa99a093f20c6d7a0775a00668445656d144c4b9f3bc0431717753b11aaabebdeadd33b5f7ccf15cbe8e06104fa91699910b0", 0x9d}], 0x3, 0x0, 0x0, 0x204c044}, {0x0, 0x0, &(0x7f00000074c0)=[{&(0x7f0000007980)="93f482fa0c7c9ece3b416119095adbc965d61a5ea74b3f183b184e4d3d749a69ebeb9d47fc41ec22a3e4939bfc3903aef9bdeecc8dfb4cb6c246e7a5d6e5429d00ab345c3e06465c1d40c00388191bee2d8045beee4ab356fc353c02", 0xa}, {&(0x7f0000007a00)="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", 0xbf}, {&(0x7f0000007340)="9adfbf396feef2713e481f2076ce69264e75771dee92340643f6065fc70c8bcf7690220c5320c52036f754101446357546f053", 0x33}, {&(0x7f0000007380)="6c94048efec4936078b5665a0abbaa80e8f192202b4dadc5a7e778e0da9a8d6c443cd68bc0945c8945", 0x29}, {&(0x7f00000073c0)="9862ae387b55ba58a87a77264a0c33113ff8472b", 0x14}, {&(0x7f0000007400)="213e0bf85c73a0b9dc24f2f1f8afae90d75cab4776a972a029d5895a3316b0138149b0cc0eb3c8a21e1ec1ecf6fc2569447bd3347cde3538a80dd1494a65396e5f2f69dd05d324b8ecc17847639d9057808a5aa43944d8df03a26ebc6dc047c2e6bb1f18d578c1fe", 0x68}, {&(0x7f0000007480)="7b455a99f0a07cf8215f6ed087da165670539e1c6ea2b4d66c8a7dee84d1f1ad21536a3c8b231a7d49cd20ad2fec8fa19f4b25a7", 0x34}], 0x7, &(0x7f0000007540)=[@iv={0x110, 0x117, 0x2, 0xfa, "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"}, @iv={0x88, 0x117, 0x2, 0x72, "d724c7a611a8ff1627c931d654a0653544acecb66d5e35cf12e554e849e6dd70edb8998391e8793d7570c233cf2ee2035e9dceb7a6daaf714ae3b1758fc50c3d51df772c676cc1eb69346d5ed64886eea8a462bff3ca33d12de99eaa7b23239756c7b19599e565560cf72db6e91552aa9051"}, @op={0x18}], 0x1b0, 0x4}], 0x9, 0x4) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000)={0x43, 0x1, 0x9c71de91ad4440a0}, 0x10) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:25 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f0000000140)={0x0, 0x9, 0x80, [], &(0x7f0000000080)=0x9}) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_netdev_private(r2, 0x89fa, &(0x7f00000001c0)="186432ec7526016d947bade4f2ba350dd71925181c829cc26f290ade429cf1ec7230e1666c2aa8f1cf22ef1c528d49a8775971fed140a52a000ab9053560447f2bc84a60daecd2f4f0c3a290de726499e835e57b711b9a0ee1cb21574cae677abd629b11b2106e3e77563db447226548103f39cb488dbccd8a6e3c156d8471c63057360f34ca3ae745fd275ce0101b3f5e7cf333474eaf94b35fa9cae16936551c7d21974ee4591d901c7acc86773a2a") close(r0) r3 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0xcc, 0x0) dup(r3) 02:43:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x101000, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_OVERLAY(r3, 0x4004560e, &(0x7f0000000140)=0x7fff) r4 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r4, &(0x7f0000000140), 0xcc, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f00000001c0)={0xf9, 0x6, 0x1f, 0x17, 0x3f, 0x1, 0x20, 0xff, 0x20, 0x80}, 0xb) getegid() ioctl$sock_netdev_private(r1, 0x89a0, &(0x7f0000000000)) close(r1) 02:43:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) 02:43:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r2, &(0x7f00000001c0), 0x1000) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 02:43:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2", 0x98, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r2, &(0x7f00000001c0), 0x1000) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 02:43:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2", 0x98, 0x10000}], 0x0, 0x0) 02:43:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x5f, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x200, 0x4) read$alg(0xffffffffffffffff, &(0x7f0000000240)=""/94, 0x5e) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="ba531c9a7736717ca07bcd8cf851434b024c") r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0xffffffffffffff61, &(0x7f0000000200)={0x0, 0xfffffffffffffcb4}, 0x1, 0x0, 0x0, 0x40820}, 0x40) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r3 = semget(0x3, 0x5, 0x401) semctl$GETPID(r3, 0x1, 0xb, &(0x7f0000000340)=""/68) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) readlinkat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=""/10, 0xa) ioctl$sock_netdev_private(r2, 0x89a0, &(0x7f0000000000)) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f00000002c0)={0xec22, 0x3f7abe0e, 0x3, 0x0, 0x0, [{0xffffffffffffffff, 0x0, 0x4c}, {r7, 0x0, 0x6691}, {r0, 0x0, 0x1}]}) sendmmsg$alg(r5, &(0x7f0000000140), 0xcc, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r5, 0x400443c8, &(0x7f00000000c0)={r0}) close(r2) 02:43:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2", 0x98, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:25 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0xfffffffd, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) socket$inet6_udp(0xa, 0x2, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="04d80adce20f9259329568b6080100ec"}, {0x2, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r4}}, 0x48) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000000180), r4, 0x1}}, 0x18) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) syz_open_procfs(r2, &(0x7f0000000000)='oom_score\x00') 02:43:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x4) 02:43:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2", 0x98, 0x10000}], 0x0, 0x0) 02:43:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2", 0x98, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:26 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x5, 0x8, 0x3fb, 0x401, 0x3d0, 0x1, 0x2, [], r3, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x8ea5, 0x4, 0x42, 0x202, 0xffffffffffffffff, 0xfffffffe, [], r3, 0xffffffffffffffff, 0x3}, 0xf5303818c61f57e2) 02:43:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2", 0x98, 0x10000}], 0x0, 0x0) 02:43:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$nl_generic(0x10, 0x3, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0), 0x1000) 02:43:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c3", 0xb1, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x60, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_netdev_private(r1, 0x89a0, &(0x7f0000000000)) close(r1) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0xcc, 0x0) fchdir(r2) 02:43:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$nl_generic(0x10, 0x3, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0), 0x1000) 02:43:26 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0xcc, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x4, 0x4, 0x3e, 0x0, 0xffffffffffffffff, 0xffffffc0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c3", 0xb1, 0x10000}], 0x0, 0x0) 02:43:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c3", 0xb1, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$nl_generic(0x10, 0x3, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0), 0x1000) 02:43:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c3", 0xb1, 0x10000}], 0x0, 0x0) 02:43:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c3", 0xb1, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:27 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r0, &(0x7f00000001c0), 0x1000) 02:43:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c3", 0xb1, 0x10000}], 0x0, 0x0) 02:43:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x300, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:43:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:27 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r0, &(0x7f00000001c0), 0x1000) 02:43:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x5, 0x8, 0x3fb, 0x401, 0x3d0, 0x1, 0x2, [], r4, 0xffffffffffffffff, 0x5, 0x1}, 0x3c) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x5, 0x8, 0x3fb, 0x401, 0x3d0, 0x1, 0x2, [], r6, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000140)=0xe8) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r9, 0x1, 0x0, 0x6, @local}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x5, 0x8, 0x3fb, 0x401, 0x3d0, 0x1, 0x2, [], r9, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) getpeername$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@empty}}, &(0x7f00000005c0)=0xe8) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") recvmmsg(r12, &(0x7f0000006000)=[{{&(0x7f0000000600)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000680)=""/62, 0x3e}], 0x1}, 0x1}, {{&(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000780)=""/179, 0xb3}], 0x1, &(0x7f0000000880)=""/136, 0x88}, 0x2}, {{&(0x7f0000000940)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000001a80)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x2, &(0x7f0000001ac0)=""/41, 0x29}, 0x3}, {{&(0x7f0000001b00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001b80)=""/4096, 0x1000}], 0x1, &(0x7f0000002bc0)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000003bc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000003c40)=""/41, 0x29}, {&(0x7f0000003c80)=""/11, 0xb}, {&(0x7f0000003cc0)=""/89, 0x59}, {&(0x7f0000003d40)=""/32, 0x20}, {&(0x7f0000003d80)=""/170, 0xaa}, {&(0x7f0000003e40)=""/22, 0x16}, {&(0x7f0000003e80)=""/87, 0x57}, {&(0x7f0000003f00)=""/77, 0x4d}], 0x8, &(0x7f0000004000)=""/117, 0x75}, 0x5}, {{&(0x7f0000004080)=@xdp, 0x80, &(0x7f0000004300)=[{&(0x7f0000004100)=""/139, 0x8b}, {&(0x7f00000041c0)=""/55, 0x37}, {&(0x7f0000004200)=""/209, 0xd1}], 0x3, &(0x7f0000004340)=""/161, 0xa1}, 0x7}, {{0x0, 0x0, &(0x7f00000056c0)=[{&(0x7f0000004400)=""/4096, 0x1000}, {&(0x7f0000005400)=""/116, 0x74}, {&(0x7f0000005480)=""/117, 0x75}, {&(0x7f0000005500)=""/202, 0xca}, {&(0x7f0000005600)=""/141, 0x8d}], 0x5, &(0x7f0000005740)=""/173, 0xad}, 0x1}, {{0x0, 0x0, &(0x7f0000005c40)=[{&(0x7f0000005800)=""/240, 0xf0}, {&(0x7f0000005900)=""/143, 0x8f}, {&(0x7f00000059c0)=""/123, 0x7b}, {&(0x7f0000005a40)=""/28, 0x1c}, {&(0x7f0000005a80)=""/131, 0x83}, {&(0x7f0000005b40)=""/213, 0xd5}], 0x6}, 0x2}, {{0x0, 0x0, &(0x7f0000005d00)=[{&(0x7f0000005cc0)=""/5, 0x5}], 0x1}, 0x9}, {{&(0x7f0000005d40)=@hci, 0x80, &(0x7f0000005f80)=[{&(0x7f0000005dc0)=""/16, 0x10}, {&(0x7f0000005e00)=""/100, 0x64}, {&(0x7f0000005e80)=""/248, 0xf8}], 0x3, &(0x7f0000005fc0)=""/44, 0x2c}, 0x8}], 0xa, 0x40, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000006340)={@rand_addr, @local, 0x0}, &(0x7f0000006380)=0xc) getsockname(0xffffffffffffffff, &(0x7f00000063c0)=@hci={0x1f, 0x0}, &(0x7f0000006440)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000006940)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000006900)={&(0x7f0000006980)=ANY=[@ANYBLOB="78040000", @ANYRES16=r2, @ANYBLOB="10002bbd7000fbdbdf250200000008000100", @ANYRES32=r4, @ANYBLOB="7400020038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400000001003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080001003f6847aebbf26f505182c50b751cf2d3b9f54a994de88e7a3e64c763653f1b7bf8ae1346a739318a60da4e41522dfe3c177dd2d34d0350cb5188d8d08191ab4233ad269a545962383fea8e853c5f7f76ee7aa8a70800"/104, @ANYRES32=0x0, @ANYBLOB="a801020038000100240001006c625f73746175735f726566726573685f696e74657276616c00000000000000080103000300000008000400ba0500003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="7c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000004c0004000300c4f804000000ae0061900800000001000800b20600000900210301f0ffffff010204021e00000500058c0100000079ef303ff30000000600074007000000d800000793dd00003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400630d000008000600", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="d000020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r11, @ANYBLOB="08000700000000004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="080007000000000008000100", @ANYRES32=r14, @ANYBLOB="580102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r15, @ANYBLOB="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"], 0x19}, 0x1, 0x0, 0x0, 0x4048084}, 0x44804) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_netdev_private(r1, 0x89a0, &(0x7f0000000000)) close(r1) 02:43:27 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r0, &(0x7f00000001c0), 0x1000) 02:43:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:27 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r0, &(0x7f00000001c0), 0x1000) 02:43:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:43:27 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r0, &(0x7f00000001c0), 0x1000) 02:43:27 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0xcc, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x5, 0x8, 0x3fb, 0x401, 0x3d0, 0x1, 0x2, [], r6, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@mcast2, 0x0}, &(0x7f00000000c0)=0x14) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r9, 0x1, 0x0, 0x6, @local}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x5, 0x8, 0x3fb, 0x401, 0x3d0, 0x1, 0x2, [], r9, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r11, 0x1, 0x0, 0x6, @local}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x5, 0x8, 0x3fb, 0x401, 0x3d0, 0x1, 0x2, [], r11, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) r12 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r12, &(0x7f0000000140), 0xcc, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r12, 0x29, 0x23, &(0x7f0000004900)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000004a00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004b40)={{{@in6=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000004c40)=0xe8) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r16, 0x1, 0x0, 0x6, @local}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x5, 0x8, 0x3fb, 0x401, 0x3d0, 0x1, 0x2, [], r16, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) getsockname$packet(r1, &(0x7f0000004c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004cc0)=0x14) getsockname$packet(r0, &(0x7f0000004dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0x14) r19 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r19, &(0x7f0000000140), 0xcc, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r19, 0x29, 0x22, &(0x7f0000004e40)={{{@in6=@mcast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000004f40)=0xe8) r21 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r21, &(0x7f0000000140), 0xcc, 0x0) r22 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r22, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r22, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r23, 0x1, 0x0, 0x6, @local}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x5, 0x8, 0x3fb, 0x401, 0x3d0, 0x1, 0x2, [], r23, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) ioctl$ifreq_SIOCGIFINDEX_team(r21, 0x8933, &(0x7f0000004f80)={'team0\x00', r23}) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r26, 0x1, 0x0, 0x6, @local}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x5, 0x8, 0x3fb, 0x401, 0x3d0, 0x1, 0x2, [], r26, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000005080)={'vxcan0\x00', 0x0}) r28 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r28, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r28, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r29, 0x1, 0x0, 0x6, @local}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x5, 0x8, 0x3fb, 0x401, 0x3d0, 0x1, 0x2, [], r29, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a280)={@dev, 0x0}, &(0x7f000000a2c0)=0x14) getsockname$packet(r1, &(0x7f000000a300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a340)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f000000aac0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1200}, 0xc, &(0x7f000000aa80)={&(0x7f000000a380)={0x6f8, r4, 0x400, 0x70bd26, 0x25dfdbff, {}, [{{0x8, 0x1, r6}, {0x1a4, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6a0e5be6}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x200}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x200}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r11}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x24a}}, {0x8, 0x6, r13}}}]}}, {{0x8}, {0x44, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xe69}}, {0x8}}}]}}, {{0x0, 0x1, r14}, {0x1d0, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0xffffff4e, 0x6, r16}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8cc0}}, {0x8, 0x6, r17}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x5e9f, 0x9, 0x0, 0x6}, {0x200, 0x20, 0x20, 0x8001}, {0x1, 0x5a, 0x4, 0xa8}, {0x2, 0x2, 0x7, 0x401}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r18}}, {0x8}}}]}}, {{0x8, 0x1, r20}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r24}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r26}, {0x1a4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r29}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x68}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r30}}}]}}, {{0x8, 0x1, r31}, {0x88, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}]}, 0x6f8}, 0x1, 0x0, 0x0, 0x4}, 0x48000) r32 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r32, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0xb, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r32, 0x3}, 0x3c) 02:43:27 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r0, &(0x7f00000001c0), 0x1000) 02:43:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x500, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:43:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:28 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r0, &(0x7f00000001c0), 0x1000) 02:43:28 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r2, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r2, 0x1) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000040)={r4}, 0x14) r5 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r5, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r5, 0x1) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000040)={r7}, 0x14) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000180)={r4, 0x3, 0x1f, 0x4, 0x6, 0x9, 0x7, 0x1, {r7, @in6={{0xa, 0x4e22, 0x80, @mcast2, 0x40}}, 0x6, 0x8, 0xfffffff8, 0x9, 0x1000}}, &(0x7f00000000c0)=0xb0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000240)=""/4096, &(0x7f0000000100)=0x1000) sendto$x25(r8, &(0x7f0000000040)="067676016b18de82dc9ba034ed2314d058274aeb8b47b6db99a2e1ed10268ba3", 0x20, 0x8000080, &(0x7f0000000080)={0x9, @remote={[], 0x2}}, 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x4, 0x3, 0x42, 0x228, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r9 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001300)='/proc/capi/capi20\x00', 0x628122, 0x0) setsockopt$netrom_NETROM_N2(r9, 0x103, 0x3, &(0x7f0000001340)=0x1ff, 0x4) 02:43:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a2", 0xc4, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:28 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r0, &(0x7f00000001c0), 0x1000) 02:43:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a2", 0xc4, 0x10000}], 0x0, 0x0) 02:43:28 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r0, &(0x7f00000001c0), 0x1000) 02:43:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x600, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:28 executing program 4: r0 = dup(0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000080)=""/70, 0x46}, {&(0x7f0000000180)=""/242, 0xf2}, {&(0x7f0000000280)=""/176, 0xb0}, {&(0x7f0000000340)=""/160, 0xa0}, {&(0x7f0000000100)=""/63, 0x3f}], 0x5}, 0x80) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0xcc, 0x0) getsockopt$sock_buf(r2, 0x1, 0x2b, &(0x7f0000000680)=""/64, &(0x7f00000006c0)=0x40) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4005605}, 0xc, &(0x7f0000000600)={&(0x7f0000000880)=ANY=[@ANYBLOB="00002000d00320a245e645de3a4116178db579a74ffa45566d734b8faf9d3e1c6009d380cf187cc1a80c553d8200", @ANYRES16=r3, @ANYBLOB="00042cbd7000fddbdf250a00000008000400040000000800050080000000180001000c00070010000000090000000800090035000000eb45877253bc429113f796035d63a4c60c00020008000600090000000c000100080001000a0000003c00010008000b0073"], 0x3}}, 0x4) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000880}, 0xc, &(0x7f0000000600)={&(0x7f0000001940)={0xe4, r3, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_TUN_PORT={0x4, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xc4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xa5c2eecd6f052f17, 0x16}}]}, @IPVS_CMD_ATTR_SERVICE={0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x0, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x0, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x0, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x0, 0x3, @ipv4=@rand_addr=0x1}, @IPVS_SVC_ATTR_AF={0x0, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fff}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xffffff57}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x31783f3c}, @IPVS_DEST_ATTR_U_THRESH={0x0, 0x5, 0x70}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x2c0418c4}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) vmsplice(r2, &(0x7f0000000840)=[{&(0x7f0000000700)="8d186b0d0e16f787260e7745cbee029ad6808b3ce2a34d295fbb5afe7ff5a577e582efb70c4c0cc44fd418814803411c6e945b2eaf6e7234983e7f1762846ca48468f6dc4add40863060ca9dd629eb4f842d8b4f0fded6ed2794893c0dd8662d813eb4cc46eacbf8860c19b122187cf04e710ddae7dfafafb4f34bc944c3116d93dea3b63891576463a07f4185b4af8f91db6bac096fd07d7fb57999173fee789a7065d7e1682aef872ee68c4b17cb0b9ce03e34cfa9695999c56c947af2af78dd7900957a699532670c3a94727278fff5dc77537ae4a52d", 0xd8}, {&(0x7f0000000940)="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", 0x1000}, {&(0x7f0000000800)="a6f24b768f80a0ebdd9a4ccbeccd3c161e81a4a73a0ec78664995de0e096791e87d1e13ea262936f51b6f5566f6901aff74ef64760c3aa853b1140db4d", 0x3d}], 0x3, 0x0) 02:43:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a2", 0xc4, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a2", 0xc4, 0x10000}], 0x0, 0x0) 02:43:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a2", 0xc4, 0x10000}], 0x0, 0x0) 02:43:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x80, 0x200) sendto$x25(r3, &(0x7f00000002c0)="e6d7364a0aab744dcd26ab47fe302f53c24cc02ee849bc1ec4215123e22888fe8f90803964bdd3ca499145c87ffa1db4ff0f0d37", 0x34, 0x0, &(0x7f0000000300)={0x9, @null=' \x00'}, 0x12) sendmmsg$alg(r2, &(0x7f0000000140), 0xcc, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x200}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={r4, 0x9, 0x1, 0x5}, 0x10) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 02:43:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a2", 0xc4, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 02:43:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x700, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) sched_getattr(r4, &(0x7f0000000080)={0x30}, 0x30, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec9", 0xc7, 0x10000}], 0x0, 0x0) 02:43:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec9", 0xc7, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 02:43:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec9", 0xc7, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000140)='./bus\x00', 0x14103e, 0x0) accept$packet(r2, 0x0, &(0x7f0000000000)) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r4, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r4, 0x0, 0x1, &(0x7f00000003c0)='\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r3, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000000c0)='\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='*/bdev}]\x00', r5}, 0x30) get_robust_list(r6, &(0x7f0000000200)=&(0x7f00000001c0)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}}, &(0x7f0000000240)=0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec9", 0xc7, 0x10000}], 0x0, 0x0) 02:43:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x900, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 02:43:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec9", 0xc7, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec9", 0xc7, 0x10000}], 0x0, 0x0) 02:43:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, r0, 0x0, [], 0x0, 0xffffffffffffffff, 0x4}, 0x3c) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGSID(r4, 0x5429, &(0x7f00000000c0)=0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x100000000, 0x400800) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") kcmp$KCMP_EPOLL_TFD(r2, r5, 0x7, r6, &(0x7f0000000180)={r7, r8, 0x68}) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f0000000040)={0x80000000000000, 0x1000, 0x5, 0x4, 0x17}) pipe2(&(0x7f0000000000), 0xa71b9a76368b8b29) 02:43:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec98869", 0xc9, 0x10000}], 0x0, 0x0) 02:43:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xa00, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec98869", 0xc9, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents64(r2, &(0x7f0000000000)=""/36, 0x24) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec98869", 0xc9, 0x10000}], 0x0, 0x0) 02:43:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept4$llc(r1, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec98869", 0xc9, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec98869", 0xc9, 0x10000}], 0x0, 0x0) 02:43:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xb00, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400, 0x8) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000080)={0x9, 0x7, 0x20, 0x0, 0x0, 0x8, 0x40, 0x8, 0xfc, 0x0, 0x3f, 0x9, 0x0, 0x81, 0x1e, 0x81, 0x7, 0xe, 0x80}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001ff) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x80000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@local, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x8004, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) sendmsg$rds(r1, &(0x7f0000002d40)={&(0x7f0000000280)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000001600)=[{&(0x7f00000002c0)=""/138, 0x8a}, {&(0x7f0000000380)=""/23, 0x17}, {&(0x7f00000003c0)=""/30, 0x1e}, {&(0x7f0000000400)=""/187, 0xbb}, {&(0x7f00000004c0)=""/36, 0x24}, {&(0x7f0000000500)=""/246, 0xf6}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x7, &(0x7f0000002bc0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x0, 0x8}, &(0x7f0000001680)=0x2, &(0x7f00000016c0)=0x7, 0x3, 0x8, 0x1, 0x8, 0x0, 0x40}}, @rdma_dest={0x18, 0x114, 0x2, {0x0, 0x6}}, @cswp={0x58, 0x114, 0x7, {{0xd2a}, &(0x7f0000001700)=0xfffffffffffffff9, &(0x7f0000001740)=0x6, 0x8, 0x7, 0x10001, 0x0, 0x73, 0x2}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x7}, @fadd={0x58, 0x114, 0x6, {{0x9, 0x80000000}, &(0x7f0000001780)=0xd4, &(0x7f00000017c0)=0x80000000, 0x0, 0x4, 0xa04, 0x8, 0x49, 0x3}}, @rdma_args={0x48, 0x114, 0x1, {{0x80000001, 0x3}, {&(0x7f0000001800)=""/205, 0xcd}, &(0x7f0000002b80)=[{&(0x7f0000001900)=""/4096, 0x1000}, {&(0x7f0000002900)=""/236, 0xec}, {&(0x7f0000002a00)=""/80, 0x50}, {&(0x7f0000002a80)=""/249, 0xf9}], 0x4, 0x10, 0x7}}], 0x180, 0x12050}, 0x2008000) 02:43:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec98869", 0xc9, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca}], 0x0, 0x0) 02:43:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) mkdir(&(0x7f0000006940)='./file1\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@nfs_export_on='nfs_export=on'}, {@lowerdir={'lowerdir', 0x3d, './file1'}, 0x3a}]}) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000000)={{0x1, 0x0, @descriptor="e7a28fe80491ad8f"}}) 02:43:31 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 394.753869][T21581] overlayfs: NFS export requires "redirect_dir=nofollow" on non-upper mount, falling back to nfs_export=off. 02:43:31 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 394.799263][T21581] overlayfs: empty lowerdir [ 394.818286][T21581] overlayfs: NFS export requires "redirect_dir=nofollow" on non-upper mount, falling back to nfs_export=off. [ 394.831008][T21581] overlayfs: empty lowerdir 02:43:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xc00, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca}], 0x0, 0x0) 02:43:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$isdn_base(0x22, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x5, 0x8, 0x3fb, 0x401, 0x3d0, 0x1, 0x2, [], r4, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000000)={'team0\x00', r4}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:32 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x40000, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xb, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000040)=0x6) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$isdn_base(0x22, 0x3, 0x0) ioctl$PPPIOCGFLAGS1(r4, 0x8004745a, &(0x7f0000000000)) 02:43:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 02:43:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca}], 0x0, 0x0) 02:43:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xd00, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0), 0x1000) 02:43:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x8, 0x4, 0x42, 0x5, r3, 0x0, [], 0x0, r5, 0x3}, 0x3c) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@int=0x3, 0x4) r6 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0xcc, 0x0) accept4$alg(r1, 0x0, 0x0, 0x80000) recvfrom(r6, &(0x7f0000000040)=""/128, 0x80, 0x2001, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x2, 0x52, 0x4, 0x3}}, 0x80) 02:43:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000032126fb8bfd84289c6567b2c636cfeace3a50595a276a548670157bdfbe13edb24579391c66e4598846fe28a11561003130c2646bbe43640f956c6461e7fde09198c45037d3ccd289ddc879e65360300dec6d0ea4245d736"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4003300e0a377fbac141414e9", 0x0, 0x100}, 0x28) 02:43:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000080)={0x0, 0x80a, 0x2, &(0x7f0000000040)=0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0), 0x1000) 02:43:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0), 0x1000) 02:43:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = socket$caif_stream(0x25, 0x1, 0x4) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000000)="2fe55be4f05ec1d0594139da751a1461c688fd55df429fa77732183c9c2bc69ff4cfe6428fae887f3e80574738b6e5feb640ca130ccbb30f3dab7b957edb599c6a5e440e045edcf0f44a1fa280221ef63dbd7d5c263a67e04f3bd94ff446820703c0b3064896fa0dbbfbe4749815ef90adc78c38d4d6585108ddaef8041dd7fcd0a2dd47f91043b36402b7d288bdd7608bae96b7411728a010762f83ee0c1fae082b43d6c6e8d36254047c001d8305a8799255eee6fe89bc2014a4e6735bf02efd2b78bd1b80fc13e7154dd00d879e90518712cce6fcf2007e42618d49795f164ccc1ee7b23f163af25119ead2e63bf237a916a824a904d12160772e1f3056d4") ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r6 = gettid() sched_setattr(r6, &(0x7f0000000100)={0x30, 0x3, 0x1, 0x3, 0xfff, 0x2380, 0x1, 0x401}, 0x0) 02:43:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xe00, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:33 executing program 1: mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x10000, 0x2, &(0x7f0000ff0000/0x10000)=nil) 02:43:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) 02:43:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'ip6gre0\x00', 0x193}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:33 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = gettid() getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x3f) 02:43:33 executing program 1: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) fchmod(r0, 0x0) 02:43:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0xbee7, 0x5b, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x3c) 02:43:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:33 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x40802) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) write$RDMA_USER_CM_CMD_BIND(r1, 0x0, 0x0) 02:43:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xa, 0x8d}, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) 02:43:33 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) fdatasync(0xffffffffffffffff) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 02:43:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xf00, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0xcc, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x320, 0x1e0, 0x320, 0x1e0, 0x1e0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x5, &(0x7f0000000000), {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xff, 0xffffffff, 'ip6erspan0\x00', 'bond_slave_0\x00', {0xff}, {}, 0x67, 0x0, 0x22}, 0x0, 0xc8, 0x110, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6fd, 0x4, 0x5}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x10, @ipv6=@mcast1, @ipv4=@loopback, @gre_key=0xfffe, @gre_key=0x8000}}}, {{@uncond, 0x0, 0x98, 0xd0}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x8, @multicast2, @broadcast, @icmp_id=0x67, @icmp_id=0x68}}}}, {{@uncond, 0x0, 0x108, 0x140, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @common=@inet=@set4={0x50, 'set\x00', 0x4, {{0xffff, 0x5, 0x3}, {0x2, 0x1f}, {0x7fffffff, 0x7}, 0x1ff}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x1, @multicast1, @local, @port=0x4e21, @icmp_id=0x64}}}}, {{@uncond, 0x0, 0x98, 0xd0}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x21, @rand_addr=0x4a, @multicast1, @gre_key=0x20, @gre_key=0x1000}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 397.021738][ T26] audit: type=1800 audit(1573526613.941:51): pid=21795 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17610 res=0 02:43:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 02:43:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") shutdown(r2, 0x1) 02:43:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 397.304212][T21817] bond0: (slave bond_slave_1): Releasing backup interface 02:43:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) 02:43:34 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000b82000)={0x10000004}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r1, &(0x7f00000001c0)=[{}], 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) 02:43:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:34 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000140)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x38) wait4(0x0, 0x0, 0x0, 0x0) 02:43:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xf3c, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 397.708847][T21847] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 02:43:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0xcc, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') r4 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r4, &(0x7f0000000140), 0xcc, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r4, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x10, 0x70bd27, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000020) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x5, 0x8, 0x3fb, 0x401, 0x3d0, 0x1, 0x2, [], r6, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x8, 0x2, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0xfffff800, [], r6, 0xffffffffffffffff, 0x3}, 0x1d2) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = fcntl$dupfd(r7, 0x406, r0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000240)="9694bb18eb13fa27c2aaf6ae46e179d0202587219613ff582a94a1b7f13347d09a5cc5235755797e08f1236a5149c0430a3e8cb31dfce70711e6cd6897b9a0f5cdf2b7492ea5cd25975bd8dd3f44953ca63c4472fea53d32201dd694e34f1cb160914b006fad1899d50c2d3c49181da5a3c2ea5b21471ff084d3438da971c2634b29d3ac9c4c23aa16b0e15f0ad7e2ea42ae6a1dd8a5c2a53479aadb07180e2bf8d60b735bdf5cb5552d468e5ee31293510b0c869496d5bc687a0cfcc1e8e9b97bd5e08d", 0xc4) ioctl$sock_netrom_SIOCADDRT(r8, 0x890b, &(0x7f0000000000)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0xfff, 'syz1\x00', @null, 0x1f, 0x4, [@default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) [ 397.746635][T21847] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 397.769237][T21847] Error parsing options; rc = [-22] 02:43:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) r6 = syz_open_pts(r5, 0x4000000000000002) sendfile(r6, r4, 0x0, 0x6f0a77bd) 02:43:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 397.819561][T21848] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 397.864650][T21848] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 397.881773][T21848] Error parsing options; rc = [-22] 02:43:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) 02:43:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f0000000000)) 02:43:35 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0) 02:43:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) sendmmsg$sock(r0, &(0x7f0000001bc0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)="51d033563c0e1f70018ccde7334b95e86ca804a215775b07db924269a1f4e96c6c0ed22b5213a04370a8a3bd6a62c9aefe3d73c5e99d5d6c37da20622d6273808031ccd06e0313496d512a5ddfaf0a483cf84303acd3874bb90f89cce833c01c6817ab428f1810bf68cf", 0x6a}, {&(0x7f0000000080)="69c1b6899039d8", 0x7}, {&(0x7f00000000c0)="34a84dfe5ae4f745f6f19ea320d6c601e9260f62124fc2", 0x17}, {&(0x7f0000000180)="7e9d91c1a6c0c2ce9b810157e3521a088a33175693f8a2e6b25175afa607e30fb01a81708781da3f5b553657db045586f00e7db6bdf3351467b1eaafd6ff1e657154f31662dd403fa6e8a553dc", 0x4d}, {&(0x7f0000000200)="db2ad95eaa600b6ec368ef79fd0f5dbcc9b6e14cc96ed60e98562e95dc90776a228efb3422d589a0aa25709df9f20bd680481f76a402296a6b575997784ec4e70195bf6a89e526087602e1d84c095c5157adc2132ae20b1f5d1685c73dfebe5993e2", 0x62}, {&(0x7f0000000100)="bc97ed4edacc66ac8bedaa7ca716bd05c18fe34ac8971c59", 0x18}, {&(0x7f0000000280)="8d9eb99abc55d1", 0x7}, {&(0x7f00000002c0)="c4db314411dada58f9f90e4774bfc67dc853e95530b9361c1423024b7a8c6f9e5eeb335facba8fda21dc05e035f53576cb3b0f3efd61870fcf6ef6ab76096fd95ab90304566b85180052c269edecd3c7f8e72f67286b4f0bfa38cbdea5ba7a91132f92cedc487cb27e7b89dd554941b1c76c4ccf395a6ba1e3e713e91596a9a7d75e56d4dae725c005885fa27b149d", 0x8f}], 0x8, &(0x7f0000000400)=[@txtime={{0x18, 0x1, 0x3d, 0x3}}], 0x18}}, {{&(0x7f0000000440)=@tipc=@name={0x1e, 0x2, 0x3, {{}, 0x1}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000004c0)="0925644c5dd127e0ea7ce9f9c26bcd64aef3d0cdd81132c721ed4058570149ce69b6d02edf5f5cbffa85892dba28f37f6d30f9795a1c7f3586f5002ccb2eb716ddbdded2e325dc75c31bb031fbe3b241241f0c30b431f6c43163b9f130b9c59eb120ac06ab0d9952b81c6284e82b1c98546d2dfc06b2806e8254add2ccc15eb4e0dd86604824ef4f", 0x88}, {&(0x7f0000000580)="93557b45587af6a58abca2f6426586923bc18e791f6d6d16c7a8186382d1bd35", 0x20}, {&(0x7f00000005c0)="a8e5f1b8a52864a750ff87f2b9d5760a7589c07aeb9d89457c730364ab54008910df1db8f8fd6389a7d6b8b118abfebab170dd641a3c17998102892d661293d9b0de9e75685210e8d048f4ae212a21e800f9c603f85b3abbab7ef13888fcc7272b08", 0x62}, {&(0x7f0000000640)="5762c0af671f91648e4c9e3371c6891daa2b82713e36e45530d25511a78a326db27ba8ce33cd92dcb7c397b96aea8fbff4ad7df109d5311b70cac421c3ed5d06fd48872705e02f7309c97431762925b4cc9a3e161dcca8659bc97cc222ef09ce6f19d5efa5711532e84b2529daf1e750403f1e6f185cd12e7a", 0x79}], 0x4}}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000700)="9d1d4ee57e32984eb8b0ae33bd6008955e2579f8c7b9ec155717f3d28bf948c510c1b760d741983bfea1b8b8d99f28d5ba4b67f3ca8cf79118c0aa69214350540c798e26b16939da778f10c80e40a4c7c76c59341ddf278a726402bf07db637d1b8ed9026fef5df45efac241d94aed81628bdbc775026f403459b4b7dc4143b677d7c39800", 0x85}, {&(0x7f00000007c0)="506914f665635a1c5c3e76a9c4fdc9383beda3730d58ec4a23338b25ed53d3c888d9cde4d6f55bd2cf01e85c21ffc05de9b367d7cb54c813bcacf75ac2e0e7496b9db34d2ae851a963cf70671181c929357496d8df69f9f38cddcd06380a0d01bd9d124b2bd9c037adcf7694e92bfa42ed103ea4970beb61ab5dbf53f50e5cfef9a9f18f2a093c2f68c2fac4a99ae2c9499b62f057dc6c38498f1c3d2a2a73dd4610dd9183aca64e711d5a0918f3a41c2329bd510c47cc24db6dccd6751e39c95dd91f5e4affc9b09d3168dd733889cc2ff2d5684304e62f846a629c99a472634c00de222c75f22a26", 0xe9}, {&(0x7f00000008c0)="d32c25abc3c0a3a83391f015e60adbdb4e68bc44b63ece3d77562de03fbc53369b647386eada79f3131d5b5880e6e54c6175157537f69f135172732861bcb48eae1bb9e65b628aab824b5dade2b8d13051cf20ea7fd1b4609ecf4d23", 0x5c}], 0x3, &(0x7f0000000980)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x10001}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000a40)="a9627c07b20584caa98f27cae00f294ec8282729cdc8bdcab47c88103a77efe9ffa4d80dec92becdd9197d9138d288a6390ad2900ea6c3d3ff818d7a1568470dff7a2d268c6748539842f4980d64f9dde432474cb302d6266bbca68466ceec16e6100c86427cde2692c94b994455fd632a5586b9ca7a40d36a1c753b02ebde93c99e6b67234c7c797c485b67aa604dfda56745f9d40561a8f080c7ab3a", 0x9d}, {&(0x7f0000000b00)="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", 0x1000}], 0x2, &(0x7f0000001b40)=[@mark={{0x14, 0x1, 0x24, 0xfffff801}}, @txtime={{0x18, 0x1, 0x3d, 0x8000}}, @timestamping={{0x14, 0x1, 0x25, 0x3e45}}], 0x48}}], 0x4, 0x20040020) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) 02:43:37 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000140)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x38) wait4(0x0, 0x0, 0x0, 0x0) 02:43:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x800000100000004) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="480000001400199009004b0101048c01010000ebbd2e2ab9cf3d0000632379eb000000000000551f5f0028213ee20607000000000000003f6666a6e74558a5ff5290315aa474a8bf", 0x48}], 0x1) 02:43:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) ioctl(r2, 0x6, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000004c0)) r4 = dup(r0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCSTI(r6, 0x5412, 0x8562) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$cgroup_int(r8, &(0x7f0000000240)='rdma.max\x00', 0x2, 0x0) r10 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x8, 0x10000) write$UHID_CREATE2(r10, &(0x7f00000002c0)={0xb, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0xcc, 0x32, 0x7, 0x3, 0x2, 0x1f, "60a33dd9ff61a2d27fe2e3704f3c599f2b0a246fa0e5a6a859e52a6dfbfcb2f7bacf4df55c8d7d6bf50c2423f58de47861ac7eb7a82057cae761c54a501e7ceeb2b5633ed8ac226a78d8541fad65271a382d7ce192ebe011093ccd4f6e6773fffd82fd88d519663fddda276ae205ce0b954e6c1c198ef433d67c12c54c8a6f2356746b0df4820fe04db7c98c038eb7cbe5eca30003b7355f320d166134f00fc8d426b4b1452d23b36f20bc72969fd6dbe1d271877f02b03d86ce45c48ab9a06b841c468a1ca6a0a697b7012a"}, 0x1e4) fsetxattr$trusted_overlay_upper(r9, &(0x7f0000000200)='trper\x00\x00\x00\x00\x8fB\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x3e, 0x1, 0x0, "0586eaa4dc7f39018ea89dd862e31955", "539d2578974a3a381c0ef0b489f702eeb9339b5dc4615e862f58041b7943222226dff5620d1d15cde7"}, 0x3e, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) io_uring_register$IORING_UNREGISTER_FILES(r4, 0x3, 0x0, 0x0) 02:43:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) 02:43:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x1100, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:37 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = gettid() tkill(r0, 0x3f) [ 400.770466][T21941] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 02:43:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:37 executing program 1: unshare(0x20400) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x10008002) ioctl$SG_IO(r0, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f00000001c0)="e38d9069a2c50d79719c35303a9a47319d676747ace90f64646454eea8e2d97896", 0x0, 0x0, 0x0, 0x0, 0x0}) 02:43:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x200400, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x0, 0x0) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000200)=0x1, 0x4) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000380)={0x4, &(0x7f0000000000)=[{0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000100)={r4, &(0x7f0000000080)=""/97}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="aa17da385606ba66b011c448987eebc2b12c3291e4e75c4ff15a32d03d2c12dff9d747bb637e59d39cfa94946ec4b4eec029f1b308611ce67918873e84972e1d2db90e836d1ff8c3f7", 0x49, 0xffffffffffffffff) ioctl(r5, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa7000, 0x0) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e23, @rand_addr=0xffffff83}, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x64, {0x2, 0x4e20, @loopback}, 'nr0\x00'}) [ 400.850287][T21941] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 400.883552][T21941] Error parsing options; rc = [-22] 02:43:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) [ 400.983688][ C1] sd 0:0:1:0: [sg0] tag#6530 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 400.993322][ C1] sd 0:0:1:0: [sg0] tag#6530 CDB: opcode=0xe3 (vendor) [ 401.000256][ C1] sd 0:0:1:0: [sg0] tag#6530 CDB[00]: e3 8d 90 69 a2 c5 0d 79 71 9c 35 30 3a 9a 47 31 [ 401.009837][ C1] sd 0:0:1:0: [sg0] tag#6530 CDB[10]: 9d 67 67 47 ac e9 0f 64 64 64 54 ee a8 e2 d9 78 [ 401.019454][ C1] sd 0:0:1:0: [sg0] tag#6530 CDB[20]: 96 02:43:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:40 executing program 2: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1000000000000019, 0x0, 0x40004, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0}, 0x1d) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) fgetxattr(r1, &(0x7f00000000c0)=@known='system.posix_acl_default\x00', 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000)=0x1, 0x4) r2 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 02:43:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') getdents64(r0, &(0x7f0000000df0)=""/528, 0xfe06) r1 = gettid() getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000200)={0x9, 0x0, 0x0, 0x400}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x7) socket$inet6(0xa, 0x5, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x363) tkill(r1, 0x3f) socket$inet6(0xa, 0x0, 0x0) 02:43:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x4e21, @rand_addr=0x4}, @in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}], 0x30) sendmmsg$alg(r2, &(0x7f0000000140), 0xcc, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)=0x0) ptrace$getenv(0x4201, r3, 0x1000000000000000, &(0x7f0000000040)) ioctl$SIOCX25SCALLUSERDATA(r2, 0x89e5, &(0x7f0000000280)={0xd, "5638b901e6dd1e08955ee7837c9d9b8eb332b7ba53b5449294ea16f6374068dc6ed21b308f201b0a324075bb2cc97f17b1defbb949a4995690ad5049bff63ebb0f4ac7a44820979992787d2b6c34a69c33137b2fac5738f3b53b119b9f63d111b8167f48b2f557b71a5baffcfa48dd0dbcbdab00352db13d844c7025423baff6"}) r4 = socket(0x10, 0x803, 0x0) r5 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0xcc, 0x0) r6 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r6, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r6, 0x1) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000040)={r8}, 0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f00000000c0)={r8, 0x5, 0x30}, &(0x7f0000000240)=0xc) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r9, 0x1, 0x0, 0x6, @local}, 0x14) execveat(r1, &(0x7f0000000380)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='[\x00', &(0x7f0000000440)='+&$wlan1)self\x00'], &(0x7f0000000740)=[&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)='eth1\x00', &(0x7f0000000540)='*mime_type\x00', &(0x7f0000000580)='vboxnet1\x00', &(0x7f00000005c0)='+userposix_acl_access\x00', &(0x7f0000000600)='selinux)\x00', &(0x7f0000000640)='{\x00', &(0x7f0000000680)='wlan0\x00', &(0x7f00000006c0)='$\x00', &(0x7f0000000700)='ppp0!$[\x00'], 0x71ceeb2eb7c854a8) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x5, 0x8, 0x3fb, 0x401, 0x3d0, 0x1, 0x2, [], r9, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$BLKROGET(r11, 0x125e, &(0x7f0000000340)) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x40, 0x0, 0xffffffffffffffff, 0x0, [], r9, 0xffffffffffffffff, 0x3}, 0xffffffffffffff1e) 02:43:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x1200, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) 02:43:40 executing program 1: unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x227, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000100)="01", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r0, r0}, &(0x7f0000000480)=""/250, 0xfa, &(0x7f0000000580)={&(0x7f0000000080)={'wp256-generic\x00\x00\x00\x00\x00\x00\xa6\x11z\xe7\xe8\xeeJr\x00'}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') 02:43:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b", 0x5f, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:40 executing program 1: unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x227, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000100)="01", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r0, r0}, &(0x7f0000000480)=""/250, 0xfa, &(0x7f0000000580)={&(0x7f0000000080)={'wp256-generic\x00\x00\x00\x00\x00\x00\xa6\x11z\xe7\xe8\xeeJr\x00'}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') 02:43:40 executing program 2: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1000000000000019, 0x0, 0x40004, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0}, 0x1d) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) fgetxattr(r1, &(0x7f00000000c0)=@known='system.posix_acl_default\x00', 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000)=0x1, 0x4) r2 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 02:43:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") 02:43:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x10040, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000180)=ANY=[@ANYBLOB="62726f757465000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b062353b00000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/160], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f500"/88], 0xc8) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video37\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0x828b, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r5, 0xc4c85512, &(0x7f00000003c0)={{0x3, 0x1, 0x7, 0x7f, 'syz0\x00', 0x7ff}, 0x1, [0x8000, 0x3, 0xff, 0x200, 0x2, 0xffffffff80000001, 0x10001, 0x81b7, 0x8, 0x7ff, 0x2, 0x5b, 0xb918, 0x0, 0xfffffffffffffffd, 0x8, 0x7e0, 0x0, 0x0, 0x1, 0x3ff, 0x9, 0x0, 0x2, 0x4, 0x2, 0x0, 0xba, 0x2, 0x9, 0x3ff, 0x5, 0x101, 0x2, 0x8, 0x5, 0xa61, 0x1, 0x9, 0xfff, 0x2, 0x4, 0x3, 0x8, 0x41b, 0x81, 0x652fcc05, 0x2, 0x1, 0x5, 0x7, 0x2, 0x2, 0x6, 0x5, 0xffffffffffffff01, 0x20, 0x7ff, 0x3, 0x41ca68d2, 0x176f, 0x1, 0x6123, 0x8001, 0x33b1, 0x10001, 0x3, 0x80000000, 0x4, 0xc5, 0x5, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0xe080, 0x0, 0x0, 0x1000, 0x2, 0x1, 0x61005b22, 0x76, 0xff, 0x401, 0x3, 0x8, 0x2b9b, 0x2, 0xff, 0x7, 0x3, 0x8, 0x7, 0x7ce, 0x1, 0xe84, 0x8, 0x8, 0x7, 0x8001, 0x2, 0x3, 0x401, 0x6, 0xb5, 0x2, 0xfa, 0x8dd, 0x1, 0x1, 0x7, 0x7fff, 0x0, 0x4, 0x400, 0xab56, 0x1000, 0x6, 0x1, 0xb739, 0x0, 0x100000001, 0xe955, 0x7ff, 0x505, 0x5], {0x77359400}}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000300)={0x0, 0x5447345b}, &(0x7f0000000340)=0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f0000000280)={0x100000, &(0x7f0000000040), 0xad76338ee0887072, r1, 0x17}) 02:43:41 executing program 1: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a000000010000001d09"], 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$P9_RRENAMEAT(r1, &(0x7f00000001c0)={0x7, 0x4b, 0x2}, 0x7) open(0x0, 0x0, 0x0) 02:43:41 executing program 2: 02:43:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000000)) 02:43:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b", 0x5f, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 404.361311][ T26] audit: type=1804 audit(1573526621.281:52): pid=22040 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/" dev="sda1" ino=2333 res=1 02:43:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x1f00, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x238, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000010000000000000008006966623000000000000000000000000064756d6d79300000000000e1ff00000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000f000000070010000a8010000697000000000000000000000000000000000000000000000000000000000000020000000000000007f000001ac14140000000000000000000073412ab2f485d7e5b8580fe4fd20285b10286f3b230000000000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000002000000000006172707265706c7900000000000000000000001c0000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a310000000000000000000000000000000000000000000000005b650000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaa"]}, 0x2b0) accept(r0, &(0x7f0000000280)=@sco, &(0x7f0000000200)=0x80) socket$inet(0x2, 0x2000080001, 0x84) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) openat$cgroup_ro(r2, &(0x7f0000000340)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendto$llc(r3, &(0x7f0000000680)="f2032b7ddc1a9614de8a2b67ee8d0572ca25474e0a7eb6a64b2254021641526efb45ae3f7a902fa6cd2c090dc7494cd05781b167def09a42bc31c24cc4ce4bd652abb0ff6e713ef7a705132663fb068d686a319188ef308c06f46e3b7699642d2578cab9d9ab155cac82e4490a443473c18becc6e650963cfcfbe1780d6dc468b59248448a67793e5002ede684855ed456504d47a645cdab55a5cc7f915ed2a3c42c4083d84c71b6f287d4324f9d158180b229ca26d4e460", 0xb8, 0x4000, &(0x7f0000000380)={0x1a, 0x139, 0x0, 0x40, 0x5, 0x5, @broadcast}, 0x10) 02:43:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") [ 404.434653][ T26] audit: type=1804 audit(1573526621.351:53): pid=22049 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/" dev="sda1" ino=2333 res=1 02:43:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:41 executing program 1: unshare(0x400) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x77359400}}, 0x0) setpgid(0xffffffffffffffff, 0x0) 02:43:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b", 0x5f, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x4, 0x4, 0x42, 0x14, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:41 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000cffff0)={&(0x7f0000000200)=@allocspi={0xf8, 0x16, 0x9, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x17}, @in6=@local}, {@in6=@mcast2, 0x0, 0x32}, @in6=@mcast2}}}, 0xf8}}, 0x0) 02:43:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") 02:43:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b52", 0x8f, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000040), 0x4) socket$key(0xf, 0x3, 0x2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0xb, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x28}}, 0x0) 02:43:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040)=0x2, 0xfffffffffffffd77) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x2000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:42 executing program 2: 02:43:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b52", 0x8f, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0xcc, 0x0) setsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000)=0x3, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x7, 0x10042, 0x40, 0xffffffffffffffff, 0x7, [], 0x0, r1, 0x3}, 0x3c) 02:43:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") 02:43:42 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x420f5066) clone(0xa4100300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file1\x00') setxattr$trusted_overlay_origin(&(0x7f00000006c0)='./file2\x00', &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f00000002c0)='\t\x00', 0xfe1b, 0x1) 02:43:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b52", 0x8f, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f00000000c0)={0xf8, 0x8, 0x55ccf96f, 0x0, 0x1a, 0x80, 0x0, 0x5, 0xac6b, 0x1, 0x6, 0x1}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x0, 0x4, 0x42, 0x8c, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000180)=r3) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r4, 0x111, 0x3, 0x0, 0x4) r5 = socket(0x3, 0x80000, 0x41) sendmmsg$alg(r5, &(0x7f0000000140), 0xcc, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) 02:43:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") 02:43:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e3889", 0xa7, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:42 executing program 2: 02:43:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x2500, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r4, &(0x7f0000000140), 0xcc, 0x0) tee(0xffffffffffffffff, r4, 0x4, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f0000000000)={0x1, 0x444}) io_uring_setup(0x5d5, &(0x7f0000000040)={0x0, 0x0, 0x2, 0x0, 0x19d}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 02:43:42 executing program 2: 02:43:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e3889", 0xa7, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:43 executing program 2: 02:43:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") 02:43:43 executing program 1: 02:43:43 executing program 2: 02:43:43 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0xcc, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) 02:43:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e3889", 0xa7, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:43 executing program 2: 02:43:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") 02:43:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x3c0f, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:43 executing program 1: 02:43:43 executing program 2: 02:43:43 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000001340)=[{0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000001540)="407763d6481261ed32aaf5d49c6ba728833a525c23918366c36eb1b5419d9b93c3ff1210feaf5b03c9f1847e071f885c4f0cc004c6a5a79f0efd2504256448029474f260bb47b45ccc680c"}, {&(0x7f00000015c0)="33b35ab6e19dc03378641de0670a49fdcf3ef8cac6aae781aab257501b75dc3d2fe4682ec91ccd8945bf58e3a4ce2b91aa69fadffed00cc91ad8bb4047c9e45deb1dd00240abc0ceea34852ac9e87cce717e57fe043d97d0a4e29ca7446e63d8d75101fc7c6f329c44513b723f4c0949c122de781ed9ebff44f60953ffa06f8b18b71387d0f027bde5b368df216382e2c301e20be1f156f866e64e8163696e95e0ba8c190345cdd47500e05125a832790b1d4fa215d69fa1d8"}, {&(0x7f0000001680)="fa47bed51d53053408e1f38da25c4ce6121084b8c94bb11a86bce4d7b5411133c7bda0ce76b39881ddf1f64b927e32fb06add201986fed5acabd282392cb5aca825c6d296620c5a8905cd495e85f1639745c4e56918d8e32a40939d08e9e98c3994048d9a29eebb8"}, {&(0x7f0000001700)="df709904757c11abec00ef0807c6eaa883d4e53b5a0f155cd15e4393a15a9d9d36971d6ead3f468ea742064553f8c2fcf61102b1013f64d3be3183372aee87997389196373b71010671052dec20c3eab8619a661ad809bde2c1286f74e6731d6d9c3e1d1cf2b5dc928ea9eb3f79f02af1a1b0bd2778dc937025643d2e708883d4043c9de73aa8f9eb6cb9ab2d64ea86e3ce6d780563b2a", 0x2a3}, {&(0x7f00000017c0)="72a760d71b2d588d2b21932c601fda8e404387214330c197d7d102b1bcf842e0e8e835236b19d5ae3bd9832baf6f3263"}], 0x0, &(0x7f0000001380)=[@iv={0x78, 0x117, 0x2, 0x5e, "aaadacb738dc43baec436d4d130af577fbcaf676ad2e28f7b06a442f0b4af9fc4fbe88d7a5238439cd69b94b49b3f8136a9127ff581826b9f3907d1d458ffa5eb4681aaf1b5ea388964c6a87b423beab6f590bea8cd91804bddedee64de3"}, @assoc={0x18, 0x117, 0x4, 0x7bdb}, @assoc={0x18, 0x117, 0x4, 0x6}, @assoc={0x0, 0x117, 0x4, 0x7}], 0x1b0, 0x4000801}], 0x1, 0x0) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000040)=0x30) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c36673", 0xb3, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:43 executing program 2: 02:43:43 executing program 1: 02:43:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") 02:43:43 executing program 2: 02:43:43 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000b0030000d8000000f0010000f0010000f001000000000000180300001803000018030000180300001803000004000000", @ANYPTR=&(0x7f0000000780)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800d80000000000000000000000000000000000000000000000000040005443504f50545354524950000000000000000000000000000000000000000700000006000000d60f00008300000009000000020000007f00000006000000ac1414aaac1414aac1a5a90b81ffff806c617062300000000000000000000000726f736530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080003140000000000000000000000000000f0001801000000000000000000000000000000000000000000000000280074746c0000000000000000000000000000000000000000000000000000000100000000000000300061680000000000000000000000000000000000000000000000000000000001000000000000800100000000000000280052454a454354000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c80028010000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000020000000400000001000000000000006000534554000000000000000000000000000000000000000000000000000000ffff0000060000005506000000000100ff03000020000000030000000304000001000000000400000100010004000000050000008d000000f0d5000003b90000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x410) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000000)="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", 0xff}, {&(0x7f0000000180)="8a660f30e14dc3baebb8f72fc248d57eed7adba00b72661193ce011d1d92c9914030304f9e749e50fe4785d40719a8549705e77beebe8da17016359035c785c8a237aac58635b0221a7ead65bdcd5ee0c5999a48e2d6aaceb2a99dfad788c1924fe9cf61302b898413f3f27b5854620342e7e2905e6bb579dd2a56e69094804e2e54804691865d9cd781cd991bd77d8acc2aaebf93bcaa920e212d625f27b8fcbb", 0xa1}, {&(0x7f0000000240)="b69f57e29b00a274ff33c8c92bb9d72f5fbe13e3fb85532834f37678c8e68fa36ef1065e59efcecb5b807187605e5d52f6119ddd531f65aa7efcc4d5d64498671526631b21477744bd9d36f5ff16aafc5263baa74a9b7067cc8b5011ea9fc647f84d28616a7e66213614ce841331c7e74b0ea550e50d4b248fe22263bf3101fde33c33fee864d1b3d915d4aa7a286553bbb74a4c8bd7cbb184", 0x99}], 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r4, &(0x7f0000004000)=[{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="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", 0x1000}], 0x1, 0x0, 0x0, 0x24000011}, {0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000001980)="f38d775f249e83a943a1cdda0c0443c9cd2aa2565eb68b6d1d5085b0e2cf1726d084c92573dd63feee10067c2dfb6b5c70dedd1f2393256d247c1b31dc", 0x3d}, {&(0x7f00000019c0)="16881a04aedea165ad926935b8154a3b822fd478132eaad90e4f2c79636dfaa8027cc5021ffe01dc2a07e7", 0x2b}, {&(0x7f0000001a00)="b0b7ded68a5f227fcdd2da31d476fe1f9f646d97b044c715287eaafcaf3d194afd10e613aab59e2cd24eda5fb9f85c3da7ae146d8cfaf9861cbd8fa8", 0x3c}, {&(0x7f0000001a40)="6665dd099e5019e476833ffa081e633fffc1a8cbe8df2144c282329cc3776ccfc009b190b14a0594a9478780280aa19d7130e2d90be043e61acb5b6f2824a11b79559769cbdc16051f98499de9d22eded45181fd72bb559abb6e0bfb902697f641654310a533249bd9687f49909911e6ca75be6aaae0c92cc974f0f88cf91dc6451f7660ae13f30bf0428fd739dbcf91dfe75da57dfb7a9371ec41db40afe1c346ecda79550a", 0xa6}, {&(0x7f0000001b00)="f756f40895bbcdb5495e014b1a8026f4e49a0ef370cab968c81c059dd623e719de1caf53bed2b7c5c67b2ebfcc3ea6058511738fddce00baf73c14190f97da0ea48381328ad6f46c8e567e72a8a1a88a1380ee5ab17265b15f1ee165cac3db4f7c4fbcf4d280da288ce2c7fb0e0e903d7e5879f68cfe49621e52cad4aa8eaac9ab1f73dea46091ff698c993c04d9034983ed728078502eda147ba2f6e2eaa9ef27d8354f5c6ad4caa9e2b31417485664a526dd194fa84f40e700d7f63f435c6aed127ef5a7f99e1af063b10d29cf6291d6e62517", 0xd4}, {&(0x7f0000001c00)="36470b2c4baa062a256a5c97563a0268ffa4ba9f8856713118ab5185cae7a498f7b1d311e5b055695923c496b4edaef7ba83df67f1b52e77c87e3bf8c1e2a2bf107f1688a3a27936b16201eb94a3529ad08e98a0cec24a014b17cd2db5cfebcd2321365a0bdef0d2cb72aa8e8ec0b90beee50ec52e1ebe757c745115eb6743ec3ea8108653eabcd0536322d01ad414df5f5a619ba767eac2dd2ca656a4d937bc8adf6ab9525b318e5e0f59894e6d8a1ee9c68bea7a1971a4d247551c231bbeab8e1050a043f2a206d6985e4c2b79d48dd58829e92ff0db70c6adb781ea0002d13aa7b280032efbbed9a39f2efb7c8ea810e9b3e8b6188305de9d8ad5f56276", 0xff}], 0x6, &(0x7f0000001d80)=[@iv={0x110, 0x117, 0x2, 0xfc, "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"}, @iv={0xa0, 0x117, 0x2, 0x88, "9345c34db0fd10687a56f376243464bd18d61607fb978bd88780e75189acbb17f8f6388048cfb729e126cc1f25a049229cc4f5bf37f03f618a01480760ea50a5850f97b5fee9e314fcb6eafedfc0afa1ae6978e2dec66ddfa595d2ffb440fc356c6f98f4ad0839b0c7e719693c73e6789c25f3e7e69560baeeae1e597d8892ac63abefcb8682a302"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}, @assoc={0x18, 0x117, 0x4, 0x5}, @iv={0x68, 0x117, 0x2, 0x4d, "6545794c254dfe1b09c213b5da06b992805f0b401c2ec1bdcb9a1c6e2792c90044b31db96119087663cda9befe11a920285c2923ec09c3b88770f59a6bb4efeae64dd3496be2ad05b5ef903b27"}, @op={0x18}, @iv={0xc8, 0x117, 0x2, 0xb4, "a958926d0d858b27650ac8d6c209c1a01c4996bc6b034518afb7524d2da105e99594061a34833801818674d4a8b0bbdceda059e4b7525c0ebcd9b296ea08d467ff2dff50a129e4f706c7d7214d519883cf62d61e3bdd19aa59f014d207be0915755288bfd877737093ca60d5acb46ce222fb35d69d981c0a0217d65609c4fd918e76878df5a81d63d7004af96318f7b6be4a2fd1b9b3b52708d22cce5ee7aebcc72fa5d7604ebcdbc53c175ccb656a065f75da74"}, @iv={0xfffffffffffffec0, 0x117, 0x2, 0x6, "bb9a15630e8e"}], 0x360, 0x40c0010}, {0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000002100)="750b7530172acbf934e46db7a07ad921", 0x10}, {&(0x7f0000002140)="3b812d201f258887bc11274bf5435df4165b24e41bea7ca50db5beb76add025167871b8f26ba404e01dc46a455a3348c82841687aa6c18f35c530af7b48ccc7f2388708a2dd692f74740958532eb5e8ec12e93633b6616371d8e4be7f6442712e15531e2fbb044414bdcd500531597aba40c040f55233785b05f0fd2c0027f6cd935a30a71bca39c654c8156c67363f1392e6ae994c72f1eee82cb73deb9860e5d1e806d94aed3ed4f00", 0xaa}], 0x2, &(0x7f0000002240)=[@assoc={0x18, 0x117, 0x4, 0x2}, @assoc={0x18, 0x117, 0x4, 0xffff}, @iv={0xd0, 0x117, 0x2, 0xb7, "edae89915bbafcbc87f223d2536e7e64bbb112bad41639babb86ecb90a34dd4ce426e3b919f2ce056fda12987afe52c10bbd9d1f0ba6d28c66ad8d7423f6e478dfa5d6c564df35844981c691d16290465fa37ef98227e96ba4f655d8a0ba91545d9e0e873164c06a5d6810caa329bf81ca1fb7090afa077a9b66d76e10bea8e1c0c4cbc65582c8caa563cd31fbd3b6d8a1738bdd2844b1ccb451c29cbbffc8057acd56127eac15e13684d2f8e523443a78326bc9a0f4d3"}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x6}, @assoc={0x18, 0x117, 0x4, 0x8}, @assoc={0x18, 0x117, 0x4, 0x4}, @iv={0x88, 0x117, 0x2, 0x6f, "1f4d53c1c30ad13d6b3617ebcd8d97757130ec70099cd7cea95fb814389d3e60b92c3d474745bdf62367fcabd9adcfdb53127a04609997be2eabde19c4cdc46e756455ad9bc52a905d84f3b74470eb314787cc851c5b986e7617ff471afc805235fdd11d45311b5c778fe038924a93"}], 0x1e8, 0x4008011}, {0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000002440)="801e5775047ade483f03aea7bc52203e0ac1f1c937126c84371f5b7fc0769f85718774e5396377c12d24402197eda85fa0b7b857cb39fcde804ec2fe8ad185d176acd7b2981dc65f5564d0f23dd87eaee24bbd49d8c16d6da29131ccb32ae0aea4daae187a83d350bc84f929049841327f8ee7238c730529", 0x78}, {&(0x7f00000024c0)="d63111564c9969b5b9e7d6e274e0a97b2954bb5111d3f168024a5c4fc608d46b538640b9661a9155fc3b4b7f93919c27ed8b899099cc23bb12438552dbdf62689d3ce54af7ce016be09931a7fa127fd51250372b7712b44a671a35aa1a9b311b94b43a491b39eaf6b9ce285a9ed3a29280f033801c5af5693e6543b9ae3b669222d61f3c189ad39b514c9fd34a75d68d317a47a394f7e4da0888bf4ff582fabf3493765d551c57a517acf02b5f533d8f369259f09dd732923183596f1e93b98beeae0b119e4419965e2e909edb13049743c51ba2e762bc0c7a3192a0ee48", 0xde}], 0x2, &(0x7f0000002600)=[@iv={0x90, 0x117, 0x2, 0x79, "393f37a85b5860f3d22e0cee99dc7dce096d25a5ced0848dcd5737205f0173a800db604eabee52c887f2115d42a4630d2a02720a2944c5fe2625ac5eccecf07651d9d86c36595ddafbdbea0bf0267f26dcaa5509876804eb74660060722de1c17a2b4b7ca295e8b6820f497b86973574bcf7fb1dc29f85a1c6"}, @iv={0x58, 0x117, 0x2, 0x41, "991d227596ad299f18f4b2aa1b4b88a224308b08f27af1fe2e570c8813cb10e9d9c5ad2aa48456a143ec341e0cc1b66af2bb6ede6bc478ec601e110e48afca8429"}, @iv={0xf0, 0x117, 0x2, 0xd8, "0018ea9c1e7974f0967c4f7fdb902ce4d46d1b9ec0142d43615c245ad568aeb5682db86b257c162198283d463c949f982d4be6dca5d5be09b8e1525c0d93ea932206b93211f50fdbdff1f768c61a685484fa3000df6dc4e42af28a8caf0f7c023f91e20bde314745baf19858b74da9d249b794b81ae5eb3149d6b510e713293583d7da24a3470b24538bf69e9ba56a9e589c972244f8c6ca7c8d0cb6be1b062dcab7596d840a3b55a8f85f2a640b6f144109126e08159a12fe3aee20ad98ee820e25acb4049881f98170c38f95546e344887162bea744479"}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x8}, @op={0x3b4}, @assoc={0x18, 0x117, 0x4, 0x2}], 0x238, 0x1}, {0x0, 0x0, &(0x7f0000002940), 0x1, &(0x7f0000002980)=[@assoc={0x18, 0x117, 0x4, 0x8}, @assoc={0x18, 0x117, 0x4, 0xffffffff}, @op={0x18}, @assoc={0x18}, @iv={0xb8, 0x117, 0x2, 0x9d, "fba701a88bc79d788e56563f664b061a10652b5723d0734244e2fecd80c12048eab0ecdd4dc25da789f1f80b338c5487081efaf7d7b8c913547b4769fe3fda146abc14bf1eccc10fbd912c7a71829726eec86af8338d4e66ffdae3058742861369ae1b8c3a3c7cacec47563a54f0b74913987a7b2d369775a3fe3c2fc1db81ad598cbd27214c2c8c7a615cda14fb7f5cc25728ccbe684792dd4990a558"}], 0x118, 0x6008140}, {0x0, 0x0, &(0x7f0000003e40), 0x6, &(0x7f0000003ec0)=[@iv={0xf0, 0x117, 0x2, 0xd6, "e14949389fe015b7ba6fad1df4f6652140169e1605fd0068c0d99453253029d6ae9f84a022bae4ebaa4cd0233be764f00c009aa6b62eee29de59825c6c2b4f4b51829c487dc673f35f96794ac1ed2c17fca68eff6364150dc4e874da9da28c0000839ceecbe369542cc576bd2ee828e2c6c60cbd6aac302fe9777c0c2b67a960c7383b021260342834a5dcee0197718cedf6a8ceecd241210435062bc84f6f46a53647de279ddb53769c79951baba35cc59f51424c4becb52c45521d75c8c252c1b893ace32b3af36b7a7d5bd3f0431a3e2cbd9ead14"}, @op={0x18, 0x117, 0x3, 0xe0d1de5f3ddd8211}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x5}], 0x138, 0x8000}], 0x6, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f0000000900)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x48081}, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000300)={0x17, 0xa3, &(0x7f0000000800)="d5613adfb09e7d096db16652c346f98d45c1112e494b5ed54adca1389dfd4b4a19b6759dc597ae706e13a0fb989490752b3c6caa3609fb4a4c254bd5e88edc2fcb63d1dae3a9e966f19eaba0381a5ff163b1121e9201266ba44bde7bfe0fd9f44efee203346ca00c0333583214991d5e094f1a2669fed8d5420671413940e1fc2da62b84c91a86667b873ffeac5d46381db3a55ce3b87cf80495cd895746f0329003c9"}) 02:43:43 executing program 1: 02:43:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c36673", 0xb3, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x3f00, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:44 executing program 2: 02:43:44 executing program 1: 02:43:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") 02:43:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x3, 0x4, 0x4, 0x42, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c36673", 0xb3, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:44 executing program 2: 02:43:44 executing program 1: 02:43:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:44 executing program 2: 02:43:44 executing program 1: 02:43:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b0", 0xb9, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x4000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:44 executing program 5: 02:43:44 executing program 2: 02:43:44 executing program 1: 02:43:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b0", 0xb9, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000000)=0xfc000000, &(0x7f0000000040)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:44 executing program 1: 02:43:45 executing program 5: 02:43:45 executing program 2: 02:43:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b0", 0xb9, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:45 executing program 1: 02:43:45 executing program 2: 02:43:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x5f00, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:45 executing program 5: 02:43:45 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0xcc, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$cgroup_ro(r5, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SG_GET_COMMAND_Q(r7, 0x2270, &(0x7f0000000000)) r8 = dup(r3) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4068aea3, &(0x7f0000000180)={0xcb, 0x0, [0x0, 0x7, 0x8001, 0x1f]}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:45 executing program 1: 02:43:45 executing program 2: 02:43:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d", 0xbc, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:45 executing program 2: 02:43:45 executing program 1: 02:43:45 executing program 5: 02:43:45 executing program 1: 02:43:45 executing program 2: 02:43:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d", 0xbc, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x6000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:46 executing program 2: 02:43:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$SCSI_IOCTL_SYNC(r3, 0x4) 02:43:46 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') getdents64(r1, &(0x7f0000000140)=""/4096, 0x1000) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000400)=0x8, 0x4) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz1\x00', {}, 0x11, [0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) r2 = dup3(0xffffffffffffffff, r0, 0x80000) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001000)=ANY=[@ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) getgid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x1, &(0x7f00000001c0)=[0xffffffffffffffff]) fstat(0xffffffffffffffff, 0x0) getegid() ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setuid(0x0) getpeername(0xffffffffffffffff, &(0x7f0000000300)=@can, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0x20000173, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0xffffffb6, &(0x7f0000000380)=""/181, 0x40f00, 0x8562149493411ab2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000002c0)) r3 = socket$netlink(0x10, 0x3, 0x0) ftruncate(0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r3, 0x0, 0x0) r4 = socket(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r4, 0x11, 0x64, &(0x7f00000004c0), 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f0000001140)=ANY=[@ANYBLOB="500000002d0001002cbd7000fcc0df650000000000000000339d1d2ba6f0673d68c90cb7c562cac8a331b1bdaa8ebc0adbb0e03b1dd0e5b583e320ee123d825feaeee4bb843ff0e57bf6e0670d37882d50ab1f259de2f518605d9223cf8b5320040a76f520b8b5261a0ec813f8b876cddb2efb31324b9086512f3d441fa7976fde7b1e127df24071e2f0b1a418ae1ba116a46d6d0ec85bc217a0110cdbb7f64225b579", @ANYBLOB="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"], 0x2}}, 0x2000) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x80000) 02:43:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000003740)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@bridge_newneigh={0x30, 0x1c, 0x1, 0x0, 0x0, {0x2}, [@NDA_DST_IPV6={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x30}}, 0x0) 02:43:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d", 0xbc, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x223e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xf98}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') writev(r3, &(0x7f0000000b40)=[{&(0x7f0000000380)="08d6bc530decf5942209871f8a0fb5b31caf9a6b8747459aac5cb0813503118438f8fa3bda12d3694bacd4eb96759af94badf70865f2729669ba19223f9e3dc873640a56526e1113ddddf492c61ba7bd6635b9ee9b551538c0dacb7c7c34f5f883a564f08bea212685f386db2d8cbdcbbf1613100d0e932bbed5ac3b0a8ec0d4b95590b6bf897de4b3", 0x89}], 0x1) 02:43:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) close(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) 02:43:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x3, 0x4, 0x42, 0x4, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x40000000}, 0x3c) 02:43:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d71", 0xbd, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) bind(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x24000000) 02:43:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x2000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x30000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x2, 0x200, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d71", 0xbd, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x25, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d71", 0xbd, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000040)=0x3) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x80, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) getresgid(&(0x7f0000000100), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") fstat(r8, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r14) r15 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r16) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r2, &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x2}, [{0x2, 0x1, r4}], {0x4, 0x4}, [{0x8, 0x4, r6}, {0x8, 0x6, r7}, {0x8, 0x6, r9}, {0x8, 0x0, r11}, {0x8, 0x2, r12}, {0x8, 0x1, r14}, {0x8, 0x0, r16}, {0x8, 0x0, r17}], {0x10, 0x1}, {0x20, 0x3}}, 0x6c, 0x1) r18 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x5, 0x8, 0x3fb, 0x401, 0x3d0, 0x1, 0x2, [], r3, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002400)={'team0\x00', r3}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], r4, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x34000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x16, 0x1, 0x1f, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0xcc, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000080)={{0x0, @loopback, 0x4e20, 0x4, 'wlc\x00', 0x20, 0x9, 0x4b}, {@local, 0x4e23, 0x3, 0x4, 0x2, 0x6}}, 0x44) 02:43:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 413.422532][T22526] IPVS: ftp: loaded support on port[0] = 21 [ 413.627225][T22526] chnl_net:caif_netlink_parms(): no params data found [ 413.661392][T22526] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.668588][T22526] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.677048][T22526] device bridge_slave_0 entered promiscuous mode [ 413.684797][T22526] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.694793][T22526] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.703752][T22526] device bridge_slave_1 entered promiscuous mode [ 413.719396][T22526] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 413.733389][T22526] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 413.751610][T22526] team0: Port device team_slave_0 added [ 413.758595][T22526] team0: Port device team_slave_1 added [ 413.823391][T22526] device hsr_slave_0 entered promiscuous mode [ 413.879476][T22526] device hsr_slave_1 entered promiscuous mode [ 413.939101][T22526] debugfs: Directory 'hsr0' with parent '/' already present! [ 413.954654][T22526] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.961749][T22526] bridge0: port 2(bridge_slave_1) entered forwarding state [ 413.969107][T22526] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.976142][T22526] bridge0: port 1(bridge_slave_0) entered forwarding state [ 414.065680][T22526] 8021q: adding VLAN 0 to HW filter on device bond0 [ 414.077364][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 414.086445][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.095156][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 414.105063][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 414.117661][T22526] 8021q: adding VLAN 0 to HW filter on device team0 [ 414.127781][ T7875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 414.136580][ T7875] bridge0: port 1(bridge_slave_0) entered blocking state [ 414.143693][ T7875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 414.160394][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 414.168647][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 414.175717][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 414.187616][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 414.196722][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 414.213234][ T7875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 414.227859][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 414.236287][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 414.246361][T22526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 414.325520][T22526] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 414.333211][ T7875] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 414.340957][ T7875] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 02:43:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xd, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) 02:43:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x10, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x2, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$NBD_DO_IT(r4, 0xab03) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r2, 0x28}, 0x10) 02:43:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x40000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) 02:43:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 02:43:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clock_settime(0x0, &(0x7f0000000000)) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) 02:43:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:43:52 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) 02:43:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x54542, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r4) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x2001000, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@appraise_type='appraise_type=imasig'}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x34, 0x36, 0x32, 0x32, 0x7f364f807e481acb, 0x64, 0x65], 0x2d, [0x31, 0x37, 0x65, 0x31], 0x2d, [0x66, 0x0, 0x62, 0x65], 0x2d, [0x64, 0x64, 0x62, 0x51], 0x2d, [0x61, 0x18, 0x30, 0x37, 0x65, 0x64, 0x33, 0xb4d1b6a385d6add0]}}}, {@smackfsdef={'smackfsdef', 0x3d, 'ppp1#keyringvboxnet0userppp1\'$'}}, {@fowner_eq={'fowner', 0x3d, r5}}, {@seclabel='seclabel'}, {@measure='measure'}, {@fsmagic={'fsmagic', 0x3d, 0x10000}}, {@appraise='appraise'}]}}) 02:43:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:52 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) 02:43:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x80000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:52 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:43:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:52 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) 02:43:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0xcc, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000001a00)={0x0, @multicast1, @initdev}, &(0x7f0000001a40)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001a80)={'team0\x00', 0x0}) getsockname$packet(r1, &(0x7f0000004780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000047c0)=0x14) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x5, 0x8, 0x3fb, 0x401, 0x3d0, 0x1, 0x2, [], r10, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r12, 0x1, 0x0, 0x6, @local}, 0x14) lstat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000001ac0), &(0x7f0000001b00), &(0x7f0000001b40)=0x0) write$P9_RGETATTR(r1, &(0x7f0000001b80)={0xa0, 0x19, 0x2, {0x400, {0xc, 0x2}, 0x42, r13, r14, 0x6, 0x6, 0x1, 0x7, 0x0, 0xc0000, 0x81, 0x7ff, 0x7f, 0xfff, 0x100000000, 0x5844, 0x0, 0xca6, 0x100000001}}, 0xa0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x5, 0x8, 0x3fb, 0x401, 0x3d0, 0x1, 0x2, [], r12, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000004ac0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4200000}, 0xc, &(0x7f0000004a80)={&(0x7f0000004800)={0x244, r4, 0x800, 0x70bd2d, 0x25dfdbff, {}, [{{0x8}, {0xf0, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xe72}}, {0x8}}}]}}, {{0x8, 0x1, r7}, {0x130, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xb19d}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}]}}]}, 0x244}, 0x1, 0x0, 0x0, 0x48850}, 0x40000) sendmmsg$alg(r2, &(0x7f0000000140), 0xcc, 0x0) accept4$bt_l2cap(r2, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x80000) r15 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r15, &(0x7f0000001880)=[{{&(0x7f0000000240)=@isdn, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/115, 0x73}, {&(0x7f0000000340)=""/19, 0x13}], 0x2, &(0x7f00000003c0)=""/21, 0x15}, 0x80000001}, {{0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000440)=""/221, 0xdd}, {&(0x7f0000000540)=""/81, 0x51}, {&(0x7f00000005c0)=""/217, 0xd9}, {&(0x7f00000006c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/4096, 0x1000}], 0x5, &(0x7f00000017c0)=""/191, 0xbf}, 0x180f}], 0x2, 0x2a142, &(0x7f0000001900)={0x77359400}) 02:43:53 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:43:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) 02:43:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:53 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:43:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) 02:43:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x400000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) 02:43:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) 02:43:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:43:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:43:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x4, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:43:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:43:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) 02:43:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:43:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:43:54 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:43:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000)=0x2084, 0x4) r2 = dup(r0) r3 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0xcc, 0x0) getsockopt$inet_udp_int(r3, 0x11, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) 02:43:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x400300, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:43:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:43:54 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:43:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 02:43:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0xcc, 0x0) r3 = fcntl$dupfd(r1, 0x80c, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x24, 0x27fffc, 0x42, 0xe4, 0xffffffffffffffff, 0x0, [], 0x0, r3, 0x3}, 0x3c) 02:43:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:43:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) 02:43:55 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:43:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 02:43:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0xcc, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4005605}, 0xc, &(0x7f0000000600)={&(0x7f0000000880)=ANY=[@ANYBLOB="00002000d00320a245e645de3a4116178db579a74ffa45566d734b8faf9d3e1c6009d380cf187cc1a80c553d8200", @ANYRES16=r3, @ANYBLOB="00042cbd7000fddbdf250a00000008000400040000000800050080000000180001000c00070010000000090000000800090035000000eb45877253bc429113f796035d63a4c60c00020008000600090000000c000100080001000a0000003c00010008000b0073"], 0x3}}, 0x4) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000882}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x188, r3, 0x200, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7ff}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x40}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2c}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x68}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_hsr\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xffffffff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x10000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x4}, 0x4040811) 02:43:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) 02:43:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x1000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSERGETLSR(r3, 0x5459, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000000)={0xff, 0x3}) 02:43:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:43:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 02:43:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:43:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) 02:43:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000040)={0x1, [0x0]}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x18, 0x4, 0x4, 0x9, 0x19, 0xffffffffffffffff, 0x0, [], 0x0, r3, 0x3, 0x5}, 0x3c) r4 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r4, &(0x7f0000000140), 0xcc, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000080)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x18) 02:43:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 02:43:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 02:43:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:43:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) rt_sigprocmask(0x1, &(0x7f0000001780)={0x6}, &(0x7f00000017c0), 0x8) r1 = dup(r0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000680)=""/210, 0xd2}, {&(0x7f0000000780)=""/4096, 0x1000}], 0x2, 0x9) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001800)='/dev/snapshot\x00', 0x2000, 0x0) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f0000001840)={'broute\x00'}, &(0x7f00000018c0)=0x78) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xc, 0x40, 0x2, 0x42, 0x344, r4, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0xfffffffffffffdfb) accept4(r1, &(0x7f0000000600)=@rc, &(0x7f0000000040)=0x80, 0x0) syz_mount_image$nfs(&(0x7f0000000000)='r\x04\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x3bf, 0x5, &(0x7f0000000440)=[{&(0x7f0000000080)="1446e6c3016c197a28c6ad4bf9e3cb70fa7abbbd5b4368bb5871247005f43d1705000000280000", 0x27, 0x6}, {&(0x7f0000000180)="ce295f79d0517007d0b110fad7b12da7f7c274f5eb05ea0e8d2f7f5ff244bd58001a1cc189f8a2bbf07ad9d3cd0fcc5b8c6ae4ce05302611b754398abc9cc80a88f327a5b5f8c538e0a52dad1c0c8197e46d08d4c2b27df72954560df793d224cbd8dacea82bbde589fefe87dd3b90cec1fdbc5d78dcd25beecfe682b10ed8cdce84fc27cbd2946bf33a6a0c11fe890992c564f0e94b556ec012342678b38f549ee9544cc14fb776444fc9dc9c2389f369e5fc71f591702dab363b340c2237119d4d415ce8fc7f311860d2755f5a4f6b21a50902ce6a0dd9a8767b59", 0xdc, 0x6}, {&(0x7f0000000280)="fcaeca2ee3dac23c5b557a4946221c096d6db7e8af7fc1f36909aa5b5b034099c2d591fa0af9f82ebafe74b0effba28cfc17a37daa912df7b234c34160f3b6e1a98cc86e779b35b9de32c384e5007285ee5e0e8c9ec8073d50b2383728f039c1fa7f558712d4b94aa0aaf494285347e1155ea2c20979dde38a3c7504d3929467bce6bc6f21fe4f23da4978aed3fcce2663e0ff35a3c0023ca861c8a6e903a0cffefd8489e34b8cf5c0b0726b4884c4ab55f7d623a40a69e1a0e635b3a2c1d0b00bd73662bebef8aded646d5187275445878aae459b6fc3f1b7b344ca817980460da33c3d090222", 0xe7, 0x8}, {&(0x7f0000000500)="b4641815f4538c60ffe17f301b6cd7bed48f733afeced14f0957c5aa4e38063011b8680b4d1948c7fec859b731422be0d932ae4f18b9e1f040539b124f2d9ed605b46e65d9ba1d9ba9b71994c85839766e5f1b203ed591717674de7535305ada1c7d8ef585ac39e896b0749b8d07eca159895119e8c6e88c1cbc92c1d7a88086c63c1c33ac7db5f025c3a835501671b106cc05deb0d856e47a3bc0b23c0b7e7cca0fb277b1151b304867320a5ce1d9a2ecd1217206edbee820832d5bea8842f056146c14e2ed2ab6356bf98225c0a6f1a1d13c1ec1c80210c788e02ec25473", 0xdf, 0x7}, {&(0x7f0000001900)="069517fd0017d06351b3c1b266cfa992bb89d7bb3b691cfb96078953c2d0cbfc507eae161e06d0afed188fb05c82bb261e9ad50ab82d243253e76ed52e239640388416b25c787df43cab69604ebd0e034a3717fead67cd9810c9a573be552d8c121405a58136911c5f0122edb24793ce9a6d4acff243138c7e35ddbfea75982cd8e9a406d5a37b61ee7cdc30ebaa5f46c7cb0bf37eb924fe9c23c578bf8f6c8fe38330b2793aa3d6f0855d79b7c2c3", 0xaf, 0x2}], 0x20000, &(0x7f00000004c0)='\x00') 02:43:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") [ 419.318542][ T7] device bridge_slave_1 left promiscuous mode [ 419.334745][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.354372][ T7] device bridge_slave_0 left promiscuous mode [ 419.360793][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.299323][ T7] device hsr_slave_0 left promiscuous mode [ 421.349160][ T7] device hsr_slave_1 left promiscuous mode [ 421.399411][ T7] team0 (unregistering): Port device team_slave_1 removed [ 421.411060][ T7] team0 (unregistering): Port device team_slave_0 removed [ 421.421674][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 421.473909][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 421.606884][ T7] bond0 (unregistering): Released all slaves 02:43:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x2000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 02:43:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:43:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 02:43:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") 02:43:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat(r5, &(0x7f0000000300)='./file0\x00', 0x200000, 0xb) r7 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r7, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r7, 0x1) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$IOC_PR_PREEMPT_ABORT(r4, 0x401870cc, &(0x7f00000000c0)={0x81, 0x0, 0x6, 0x4}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000040)={r9}, 0x14) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000400)={r9, 0x84, &(0x7f0000000340)=[@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}, @in6={0xa, 0x4e20, 0xfff, @empty, 0x5}, @in6={0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x19}, 0x9}, @in6={0xa, 0x4e20, 0x80, @rand_addr="224b92ee1398f11ae6114f6c43ab47ac", 0x3f}, @in={0x2, 0x4e22, @empty}]}, &(0x7f0000000440)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSSERIAL(r3, 0x541f, &(0x7f0000000040)={0x100, 0x7, 0x3, 0x80, 0x80000000, 0x25a, 0x9, 0x0, 0x20, 0x0, 0x1f, 0x3, 0x400, 0x3ff, &(0x7f0000000000)=""/42, 0x9, 0x401, 0x3}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x42, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 02:43:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:43:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 02:43:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") 02:43:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 02:43:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:43:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 02:43:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x3000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:43:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:43:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 02:43:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 02:43:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") 02:43:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'ip_vti0\x00', 0x800}) 02:43:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:43:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 02:43:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 02:43:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") 02:44:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 02:44:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 02:44:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'ip_vti0\x00', 0x800}) 02:44:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 02:44:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 02:44:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") 02:44:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x4000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 02:44:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 02:44:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 02:44:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 02:44:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") 02:44:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) 02:44:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'ip_vti0\x00', 0x800}) 02:44:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 02:44:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x5000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 02:44:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") 02:44:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 02:44:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x7, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) 02:44:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 02:44:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d", 0x4c, 0x10000}], 0x0, 0x0) 02:44:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") 02:44:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) 02:44:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 02:44:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 02:44:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x6000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 02:44:02 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2", 0x98, 0x10000}], 0x0, 0x0) 02:44:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 02:44:02 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 425.277309][T23205] FAULT_INJECTION: forcing a failure. [ 425.277309][T23205] name failslab, interval 1, probability 0, space 0, times 0 [ 425.350531][T23217] FAULT_INJECTION: forcing a failure. [ 425.350531][T23217] name failslab, interval 1, probability 0, space 0, times 0 [ 425.382787][T23205] CPU: 0 PID: 23205 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 425.390660][T23205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.390666][T23205] Call Trace: [ 425.390685][T23205] dump_stack+0x1fb/0x318 [ 425.390703][T23205] should_fail+0x555/0x770 [ 425.390720][T23205] __should_failslab+0x11a/0x160 [ 425.390733][T23205] ? __se_sys_memfd_create+0x10a/0x4b0 [ 425.390743][T23205] should_failslab+0x9/0x20 [ 425.390753][T23205] __kmalloc+0x7a/0x340 [ 425.390767][T23205] __se_sys_memfd_create+0x10a/0x4b0 [ 425.390778][T23205] ? do_syscall_64+0x1d/0x1c0 [ 425.390790][T23205] __x64_sys_memfd_create+0x5b/0x70 02:44:02 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 425.390801][T23205] do_syscall_64+0xf7/0x1c0 [ 425.390813][T23205] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.390826][T23205] RIP: 0033:0x45a219 [ 425.418618][T23205] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 425.418625][T23205] RSP: 002b:00007f5107f77a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 425.418636][T23205] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 425.418642][T23205] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 425.418648][T23205] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 425.418654][T23205] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5107f786d4 [ 425.418658][T23205] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 425.430789][T23217] CPU: 0 PID: 23217 Comm: syz-executor.4 Not tainted 5.4.0-rc7 #0 [ 425.442845][T23217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.442849][T23217] Call Trace: [ 425.442866][T23217] dump_stack+0x1fb/0x318 [ 425.442883][T23217] should_fail+0x555/0x770 [ 425.442899][T23217] __should_failslab+0x11a/0x160 [ 425.452565][T23217] ? __se_sys_memfd_create+0x10a/0x4b0 [ 425.452575][T23217] should_failslab+0x9/0x20 [ 425.452585][T23217] __kmalloc+0x7a/0x340 [ 425.452598][T23217] __se_sys_memfd_create+0x10a/0x4b0 [ 425.452609][T23217] ? do_syscall_64+0x1d/0x1c0 [ 425.452622][T23217] __x64_sys_memfd_create+0x5b/0x70 [ 425.452634][T23217] do_syscall_64+0xf7/0x1c0 [ 425.452648][T23217] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.452656][T23217] RIP: 0033:0x45a219 [ 425.452665][T23217] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 425.452670][T23217] RSP: 002b:00007ffbe3c3ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 425.452680][T23217] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 02:44:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2", 0x98, 0x10000}], 0x0, 0x0) 02:44:02 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 425.452685][T23217] RDX: 0000000020018050 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 425.452691][T23217] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 425.452697][T23217] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffbe3c3c6d4 [ 425.452702][T23217] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 425.754483][T23225] FAULT_INJECTION: forcing a failure. [ 425.754483][T23225] name failslab, interval 1, probability 0, space 0, times 0 [ 425.768330][T23225] CPU: 0 PID: 23225 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 425.776247][T23225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.786380][T23225] Call Trace: [ 425.789662][T23225] dump_stack+0x1fb/0x318 [ 425.793994][T23225] should_fail+0x555/0x770 [ 425.798419][T23225] __should_failslab+0x11a/0x160 [ 425.803360][T23225] ? shmem_alloc_inode+0x1b/0x40 [ 425.808378][T23225] should_failslab+0x9/0x20 [ 425.812870][T23225] kmem_cache_alloc+0x56/0x2e0 [ 425.817619][T23225] ? shmem_match+0x180/0x180 [ 425.822189][T23225] shmem_alloc_inode+0x1b/0x40 [ 425.826996][T23225] ? shmem_match+0x180/0x180 [ 425.831568][T23225] new_inode_pseudo+0x68/0x240 [ 425.836321][T23225] new_inode+0x28/0x1c0 [ 425.840453][T23225] ? __kasan_check_read+0x11/0x20 [ 425.845471][T23225] shmem_get_inode+0x108/0x6e0 [ 425.850226][T23225] __shmem_file_setup+0x129/0x280 [ 425.855240][T23225] shmem_file_setup+0x2f/0x40 [ 425.859905][T23225] __se_sys_memfd_create+0x28e/0x4b0 [ 425.865172][T23225] ? do_syscall_64+0x1d/0x1c0 [ 425.869846][T23225] __x64_sys_memfd_create+0x5b/0x70 [ 425.875036][T23225] do_syscall_64+0xf7/0x1c0 [ 425.879540][T23225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.885434][T23225] RIP: 0033:0x45a219 [ 425.889317][T23225] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 425.908914][T23225] RSP: 002b:00007f5107f77a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 425.917321][T23225] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 425.925273][T23225] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 425.933340][T23225] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 425.941317][T23225] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5107f786d4 [ 425.949444][T23225] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 02:44:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) [ 426.004715][T23231] FAULT_INJECTION: forcing a failure. [ 426.004715][T23231] name failslab, interval 1, probability 0, space 0, times 0 [ 426.084355][T23231] CPU: 0 PID: 23231 Comm: syz-executor.4 Not tainted 5.4.0-rc7 #0 [ 426.092404][T23231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.102466][T23231] Call Trace: [ 426.105764][T23231] dump_stack+0x1fb/0x318 [ 426.110113][T23231] should_fail+0x555/0x770 [ 426.114543][T23231] __should_failslab+0x11a/0x160 [ 426.119496][T23231] ? shmem_alloc_inode+0x1b/0x40 [ 426.124447][T23231] should_failslab+0x9/0x20 [ 426.128955][T23231] kmem_cache_alloc+0x56/0x2e0 [ 426.133810][T23231] ? shmem_match+0x180/0x180 [ 426.138422][T23231] shmem_alloc_inode+0x1b/0x40 [ 426.143318][T23231] ? shmem_match+0x180/0x180 [ 426.148139][T23231] new_inode_pseudo+0x68/0x240 [ 426.153168][T23231] new_inode+0x28/0x1c0 [ 426.157326][T23231] ? __kasan_check_read+0x11/0x20 [ 426.162357][T23231] shmem_get_inode+0x108/0x6e0 [ 426.167118][T23231] __shmem_file_setup+0x129/0x280 [ 426.172146][T23231] shmem_file_setup+0x2f/0x40 [ 426.176820][T23231] __se_sys_memfd_create+0x28e/0x4b0 [ 426.182095][T23231] ? do_syscall_64+0x1d/0x1c0 [ 426.186773][T23231] __x64_sys_memfd_create+0x5b/0x70 [ 426.191973][T23231] do_syscall_64+0xf7/0x1c0 [ 426.196562][T23231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.202573][T23231] RIP: 0033:0x45a219 [ 426.206467][T23231] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 426.226068][T23231] RSP: 002b:00007ffbe3c3ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 02:44:03 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 426.234488][T23231] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 426.242452][T23231] RDX: 0000000020018050 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 426.250495][T23231] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 426.258462][T23231] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffbe3c3c6d4 [ 426.266434][T23231] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 426.382227][T23252] FAULT_INJECTION: forcing a failure. [ 426.382227][T23252] name failslab, interval 1, probability 0, space 0, times 0 [ 426.442017][T23252] CPU: 1 PID: 23252 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 426.449857][T23252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.460081][T23252] Call Trace: [ 426.463366][T23252] dump_stack+0x1fb/0x318 [ 426.467687][T23252] should_fail+0x555/0x770 [ 426.472111][T23252] __should_failslab+0x11a/0x160 [ 426.477048][T23252] ? security_inode_alloc+0x36/0x1e0 [ 426.482370][T23252] should_failslab+0x9/0x20 [ 426.486876][T23252] kmem_cache_alloc+0x56/0x2e0 [ 426.491633][T23252] ? rcu_read_lock_sched_held+0x10b/0x170 [ 426.497335][T23252] security_inode_alloc+0x36/0x1e0 [ 426.502427][T23252] inode_init_always+0x3b5/0x920 [ 426.507355][T23252] ? shmem_match+0x180/0x180 [ 426.511934][T23252] new_inode_pseudo+0x7f/0x240 [ 426.517544][T23252] new_inode+0x28/0x1c0 [ 426.521678][T23252] ? __kasan_check_read+0x11/0x20 [ 426.526682][T23252] shmem_get_inode+0x108/0x6e0 [ 426.531425][T23252] __shmem_file_setup+0x129/0x280 [ 426.536442][T23252] shmem_file_setup+0x2f/0x40 [ 426.541180][T23252] __se_sys_memfd_create+0x28e/0x4b0 [ 426.546440][T23252] ? do_syscall_64+0x1d/0x1c0 [ 426.551103][T23252] __x64_sys_memfd_create+0x5b/0x70 [ 426.556278][T23252] do_syscall_64+0xf7/0x1c0 [ 426.560758][T23252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.566624][T23252] RIP: 0033:0x45a219 [ 426.570497][T23252] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 426.590076][T23252] RSP: 002b:00007f5107f77a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 426.598470][T23252] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 426.606417][T23252] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 426.614379][T23252] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 426.622935][T23252] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5107f786d4 [ 426.630892][T23252] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x7000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:03 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2", 0x98, 0x10000}], 0x0, 0x0) 02:44:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 02:44:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff6000000", 0x40, 0x10000}], 0x0, 0x0) 02:44:03 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 426.770190][T23267] FAULT_INJECTION: forcing a failure. [ 426.770190][T23267] name failslab, interval 1, probability 0, space 0, times 0 [ 426.783864][T23267] CPU: 0 PID: 23267 Comm: syz-executor.4 Not tainted 5.4.0-rc7 #0 [ 426.791667][T23267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.791672][T23267] Call Trace: [ 426.791690][T23267] dump_stack+0x1fb/0x318 [ 426.791705][T23267] should_fail+0x555/0x770 [ 426.791721][T23267] __should_failslab+0x11a/0x160 [ 426.791731][T23267] ? security_inode_alloc+0x36/0x1e0 [ 426.791743][T23267] should_failslab+0x9/0x20 [ 426.791754][T23267] kmem_cache_alloc+0x56/0x2e0 [ 426.791765][T23267] ? rcu_read_lock_sched_held+0x10b/0x170 [ 426.791782][T23267] security_inode_alloc+0x36/0x1e0 [ 426.791793][T23267] inode_init_always+0x3b5/0x920 [ 426.791801][T23267] ? shmem_match+0x180/0x180 [ 426.815130][T23267] new_inode_pseudo+0x7f/0x240 [ 426.815144][T23267] new_inode+0x28/0x1c0 [ 426.815155][T23267] ? __kasan_check_read+0x11/0x20 [ 426.815171][T23267] shmem_get_inode+0x108/0x6e0 [ 426.815187][T23267] __shmem_file_setup+0x129/0x280 [ 426.878520][T23267] shmem_file_setup+0x2f/0x40 [ 426.883195][T23267] __se_sys_memfd_create+0x28e/0x4b0 [ 426.888486][T23267] ? do_syscall_64+0x1d/0x1c0 [ 426.893160][T23267] __x64_sys_memfd_create+0x5b/0x70 [ 426.898412][T23267] do_syscall_64+0xf7/0x1c0 [ 426.903166][T23267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.909041][T23267] RIP: 0033:0x45a219 02:44:03 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 426.912923][T23267] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 426.912929][T23267] RSP: 002b:00007ffbe3c3ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 426.912939][T23267] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 426.912945][T23267] RDX: 0000000020018050 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 426.912952][T23267] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 426.912958][T23267] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffbe3c3c6d4 [ 426.912964][T23267] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 427.045807][T23280] FAULT_INJECTION: forcing a failure. [ 427.045807][T23280] name failslab, interval 1, probability 0, space 0, times 0 [ 427.071407][T23280] CPU: 1 PID: 23280 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 427.079242][T23280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.089297][T23280] Call Trace: 02:44:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c3", 0xb1, 0x10000}], 0x0, 0x0) [ 427.092609][T23280] dump_stack+0x1fb/0x318 [ 427.096945][T23280] should_fail+0x555/0x770 [ 427.096966][T23284] FAULT_INJECTION: forcing a failure. [ 427.096966][T23284] name failslab, interval 1, probability 0, space 0, times 0 [ 427.101364][T23280] __should_failslab+0x11a/0x160 [ 427.101376][T23280] ? __d_alloc+0x2d/0x6e0 [ 427.101388][T23280] should_failslab+0x9/0x20 [ 427.101400][T23280] kmem_cache_alloc+0x56/0x2e0 [ 427.101413][T23280] __d_alloc+0x2d/0x6e0 [ 427.101424][T23280] ? lockdep_init_map+0x2a/0x680 [ 427.101438][T23280] d_alloc_pseudo+0x1d/0x70 [ 427.119382][T23280] alloc_file_pseudo+0xc3/0x260 [ 427.119402][T23280] __shmem_file_setup+0x1a2/0x280 [ 427.119416][T23280] shmem_file_setup+0x2f/0x40 [ 427.119429][T23280] __se_sys_memfd_create+0x28e/0x4b0 [ 427.119440][T23280] ? do_syscall_64+0x1d/0x1c0 [ 427.119451][T23280] __x64_sys_memfd_create+0x5b/0x70 [ 427.119463][T23280] do_syscall_64+0xf7/0x1c0 [ 427.137403][T23280] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.137414][T23280] RIP: 0033:0x45a219 [ 427.137425][T23280] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 427.137431][T23280] RSP: 002b:00007f5107f77a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 427.137442][T23280] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 427.137448][T23280] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 427.137453][T23280] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 427.137478][T23280] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5107f786d4 [ 427.171386][T23280] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 427.189504][T23284] CPU: 1 PID: 23284 Comm: syz-executor.4 Not tainted 5.4.0-rc7 #0 [ 427.210866][T23284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.210872][T23284] Call Trace: [ 427.210892][T23284] dump_stack+0x1fb/0x318 [ 427.210905][T23284] should_fail+0x555/0x770 [ 427.210921][T23284] __should_failslab+0x11a/0x160 02:44:04 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:04 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 427.210930][T23284] ? __d_alloc+0x2d/0x6e0 [ 427.210940][T23284] should_failslab+0x9/0x20 [ 427.210955][T23284] kmem_cache_alloc+0x56/0x2e0 [ 427.235387][T23284] __d_alloc+0x2d/0x6e0 [ 427.235400][T23284] ? lockdep_init_map+0x2a/0x680 [ 427.235411][T23284] d_alloc_pseudo+0x1d/0x70 [ 427.251326][T23284] alloc_file_pseudo+0xc3/0x260 [ 427.251348][T23284] __shmem_file_setup+0x1a2/0x280 [ 427.267228][T23284] shmem_file_setup+0x2f/0x40 [ 427.267241][T23284] __se_sys_memfd_create+0x28e/0x4b0 [ 427.267256][T23284] ? do_syscall_64+0x1d/0x1c0 [ 427.280568][T23284] __x64_sys_memfd_create+0x5b/0x70 [ 427.280579][T23284] do_syscall_64+0xf7/0x1c0 [ 427.280594][T23284] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.280604][T23284] RIP: 0033:0x45a219 [ 427.280615][T23284] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 427.289312][T23284] RSP: 002b:00007ffbe3c3ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 427.289322][T23284] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 427.289328][T23284] RDX: 0000000020018050 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 427.289334][T23284] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 427.289339][T23284] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffbe3c3c6d4 [ 427.289350][T23284] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff6000000", 0x40, 0x10000}], 0x0, 0x0) [ 427.518132][T23294] FAULT_INJECTION: forcing a failure. [ 427.518132][T23294] name failslab, interval 1, probability 0, space 0, times 0 [ 427.542196][T23296] FAULT_INJECTION: forcing a failure. [ 427.542196][T23296] name failslab, interval 1, probability 0, space 0, times 0 [ 427.567253][T23294] CPU: 1 PID: 23294 Comm: syz-executor.4 Not tainted 5.4.0-rc7 #0 [ 427.575085][T23294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.585131][T23294] Call Trace: [ 427.588422][T23294] dump_stack+0x1fb/0x318 [ 427.592748][T23294] should_fail+0x555/0x770 [ 427.597159][T23294] __should_failslab+0x11a/0x160 [ 427.602100][T23294] ? __alloc_file+0x2c/0x390 [ 427.606674][T23294] should_failslab+0x9/0x20 [ 427.611158][T23294] kmem_cache_alloc+0x56/0x2e0 [ 427.615920][T23294] __alloc_file+0x2c/0x390 [ 427.620332][T23294] alloc_empty_file+0xac/0x1b0 [ 427.625089][T23294] alloc_file+0x60/0x4c0 [ 427.629316][T23294] alloc_file_pseudo+0x1d4/0x260 [ 427.634238][T23294] __shmem_file_setup+0x1a2/0x280 [ 427.639245][T23294] shmem_file_setup+0x2f/0x40 [ 427.643903][T23294] __se_sys_memfd_create+0x28e/0x4b0 [ 427.649176][T23294] ? do_syscall_64+0x1d/0x1c0 [ 427.653924][T23294] __x64_sys_memfd_create+0x5b/0x70 [ 427.659101][T23294] do_syscall_64+0xf7/0x1c0 [ 427.663586][T23294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.669467][T23294] RIP: 0033:0x45a219 [ 427.673340][T23294] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 427.693294][T23294] RSP: 002b:00007ffbe3c3ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 427.701684][T23294] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 427.709642][T23294] RDX: 0000000020018050 RSI: 0000000000000000 RDI: 00000000004bf2b7 02:44:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) [ 427.717595][T23294] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 427.725547][T23294] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffbe3c3c6d4 [ 427.733503][T23294] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 427.741478][T23296] CPU: 0 PID: 23296 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 427.749287][T23296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.759371][T23296] Call Trace: [ 427.762659][T23296] dump_stack+0x1fb/0x318 [ 427.767461][T23296] should_fail+0x555/0x770 [ 427.771882][T23296] __should_failslab+0x11a/0x160 [ 427.776822][T23296] ? __alloc_file+0x2c/0x390 [ 427.781502][T23296] should_failslab+0x9/0x20 [ 427.786011][T23296] kmem_cache_alloc+0x56/0x2e0 [ 427.790772][T23296] __alloc_file+0x2c/0x390 [ 427.795174][T23296] alloc_empty_file+0xac/0x1b0 [ 427.799921][T23296] alloc_file+0x60/0x4c0 [ 427.804215][T23296] alloc_file_pseudo+0x1d4/0x260 [ 427.809133][T23296] __shmem_file_setup+0x1a2/0x280 [ 427.814321][T23296] shmem_file_setup+0x2f/0x40 [ 427.818993][T23296] __se_sys_memfd_create+0x28e/0x4b0 [ 427.824333][T23296] ? do_syscall_64+0x1d/0x1c0 [ 427.828994][T23296] __x64_sys_memfd_create+0x5b/0x70 [ 427.834335][T23296] do_syscall_64+0xf7/0x1c0 [ 427.838822][T23296] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.844691][T23296] RIP: 0033:0x45a219 [ 427.848734][T23296] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 427.868319][T23296] RSP: 002b:00007f5107f77a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 427.876709][T23296] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 427.884672][T23296] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 427.892716][T23296] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 427.900677][T23296] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5107f786d4 [ 427.908640][T23296] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x8000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:05 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:05 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c3", 0xb1, 0x10000}], 0x0, 0x0) 02:44:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff6000000", 0x40, 0x10000}], 0x0, 0x0) 02:44:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) [ 428.171454][T23321] FAULT_INJECTION: forcing a failure. [ 428.171454][T23321] name failslab, interval 1, probability 0, space 0, times 0 [ 428.177919][T23322] FAULT_INJECTION: forcing a failure. [ 428.177919][T23322] name failslab, interval 1, probability 0, space 0, times 0 [ 428.211958][T23322] CPU: 1 PID: 23322 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 428.219814][T23322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.219819][T23322] Call Trace: [ 428.219837][T23322] dump_stack+0x1fb/0x318 [ 428.219853][T23322] should_fail+0x555/0x770 [ 428.219869][T23322] __should_failslab+0x11a/0x160 [ 428.219882][T23322] ? security_file_alloc+0x36/0x200 [ 428.219893][T23322] should_failslab+0x9/0x20 [ 428.219908][T23322] kmem_cache_alloc+0x56/0x2e0 [ 428.246885][T23322] security_file_alloc+0x36/0x200 [ 428.246900][T23322] __alloc_file+0xde/0x390 [ 428.246913][T23322] alloc_empty_file+0xac/0x1b0 [ 428.246925][T23322] alloc_file+0x60/0x4c0 [ 428.275499][T23322] alloc_file_pseudo+0x1d4/0x260 [ 428.275521][T23322] __shmem_file_setup+0x1a2/0x280 [ 428.275536][T23322] shmem_file_setup+0x2f/0x40 [ 428.294360][T23322] __se_sys_memfd_create+0x28e/0x4b0 [ 428.299657][T23322] ? do_syscall_64+0x1d/0x1c0 [ 428.299674][T23322] __x64_sys_memfd_create+0x5b/0x70 02:44:05 executing program 0 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 428.299694][T23322] do_syscall_64+0xf7/0x1c0 [ 428.299711][T23322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.299720][T23322] RIP: 0033:0x45a219 [ 428.299735][T23322] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 428.309842][T23322] RSP: 002b:00007f5107f77a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 428.309854][T23322] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 428.309859][T23322] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 428.309864][T23322] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 428.309870][T23322] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5107f786d4 [ 428.309876][T23322] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 428.365556][T23321] CPU: 1 PID: 23321 Comm: syz-executor.4 Not tainted 5.4.0-rc7 #0 [ 428.378260][T23321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.394160][T23321] Call Trace: [ 428.394176][T23321] dump_stack+0x1fb/0x318 [ 428.394192][T23321] should_fail+0x555/0x770 [ 428.394207][T23321] __should_failslab+0x11a/0x160 [ 428.412061][T23321] ? __alloc_file+0x2c/0x390 [ 428.412074][T23321] should_failslab+0x9/0x20 [ 428.412083][T23321] kmem_cache_alloc+0x56/0x2e0 [ 428.412095][T23321] __alloc_file+0x2c/0x390 [ 428.419695][T23321] alloc_empty_file+0xac/0x1b0 [ 428.419705][T23321] alloc_file+0x60/0x4c0 [ 428.419718][T23321] alloc_file_pseudo+0x1d4/0x260 02:44:05 executing program 4 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 428.419742][T23321] __shmem_file_setup+0x1a2/0x280 [ 428.433644][T23321] shmem_file_setup+0x2f/0x40 [ 428.442863][T23321] __se_sys_memfd_create+0x28e/0x4b0 [ 428.442874][T23321] ? do_syscall_64+0x1d/0x1c0 [ 428.442884][T23321] __x64_sys_memfd_create+0x5b/0x70 [ 428.442894][T23321] do_syscall_64+0xf7/0x1c0 [ 428.442908][T23321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.452026][T23321] RIP: 0033:0x45a219 [ 428.452036][T23321] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 428.452041][T23321] RSP: 002b:00007ffbe3c3ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 428.452053][T23321] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 428.461187][T23321] RDX: 0000000020018050 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 428.461193][T23321] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 428.461199][T23321] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffbe3c3c6d4 [ 428.461204][T23321] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 428.688213][T23343] FAULT_INJECTION: forcing a failure. [ 428.688213][T23343] name failslab, interval 1, probability 0, space 0, times 0 [ 428.689785][T23342] FAULT_INJECTION: forcing a failure. [ 428.689785][T23342] name failslab, interval 1, probability 0, space 0, times 0 [ 428.707991][T23343] CPU: 0 PID: 23343 Comm: syz-executor.4 Not tainted 5.4.0-rc7 #0 [ 428.721609][T23343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.731661][T23343] Call Trace: [ 428.734949][T23343] dump_stack+0x1fb/0x318 [ 428.739264][T23343] should_fail+0x555/0x770 [ 428.743663][T23343] __should_failslab+0x11a/0x160 [ 428.748579][T23343] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 428.754889][T23343] should_failslab+0x9/0x20 [ 428.759369][T23343] __kmalloc+0x7a/0x340 [ 428.763502][T23343] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 428.769209][T23343] tomoyo_realpath_from_path+0xdc/0x7c0 [ 428.774824][T23343] tomoyo_path_perm+0x192/0x850 [ 428.779670][T23343] tomoyo_path_truncate+0x1c/0x20 [ 428.784669][T23343] security_path_truncate+0xd5/0x150 [ 428.789933][T23343] do_sys_ftruncate+0x493/0x710 [ 428.794777][T23343] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 428.800483][T23343] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 428.805931][T23343] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 428.811626][T23343] ? do_syscall_64+0x1d/0x1c0 [ 428.816289][T23343] __x64_sys_ftruncate+0x60/0x70 [ 428.821203][T23343] do_syscall_64+0xf7/0x1c0 [ 428.825699][T23343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.831580][T23343] RIP: 0033:0x45a1e7 [ 428.835540][T23343] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 428.855122][T23343] RSP: 002b:00007ffbe3c3ba88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 428.863508][T23343] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a1e7 [ 428.871458][T23343] RDX: 0000000020018050 RSI: 0000000008100000 RDI: 0000000000000004 [ 428.880014][T23343] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 428.887960][T23343] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 428.895909][T23343] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 428.909384][T23342] CPU: 0 PID: 23342 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 428.912584][T23343] ERROR: Out of memory at tomoyo_realpath_from_path. [ 428.917207][T23342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.917211][T23342] Call Trace: [ 428.917227][T23342] dump_stack+0x1fb/0x318 [ 428.917244][T23342] should_fail+0x555/0x770 [ 428.917262][T23342] __should_failslab+0x11a/0x160 [ 428.917276][T23342] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 428.917287][T23342] should_failslab+0x9/0x20 [ 428.917298][T23342] __kmalloc+0x7a/0x340 [ 428.917309][T23342] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 428.971062][T23342] tomoyo_realpath_from_path+0xdc/0x7c0 [ 428.976617][T23342] tomoyo_path_perm+0x192/0x850 [ 428.981487][T23342] tomoyo_path_truncate+0x1c/0x20 [ 428.986528][T23342] security_path_truncate+0xd5/0x150 [ 428.991803][T23342] do_sys_ftruncate+0x493/0x710 [ 428.996651][T23342] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 429.002367][T23342] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 429.007822][T23342] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 429.013544][T23342] ? do_syscall_64+0x1d/0x1c0 [ 429.018205][T23342] __x64_sys_ftruncate+0x60/0x70 [ 429.023127][T23342] do_syscall_64+0xf7/0x1c0 [ 429.027620][T23342] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.033500][T23342] RIP: 0033:0x45a1e7 [ 429.037372][T23342] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 429.056970][T23342] RSP: 002b:00007f5107f77a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 429.065375][T23342] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a1e7 [ 429.073333][T23342] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000004 [ 429.081295][T23342] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 02:44:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c3", 0xb1, 0x10000}], 0x0, 0x0) [ 429.089261][T23342] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 429.097215][T23342] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 429.115893][T23342] ERROR: Out of memory at tomoyo_realpath_from_path. 02:44:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f", 0x65, 0x10000}], 0x0, 0x0) 02:44:06 executing program 0 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x9000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:06 executing program 4 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 429.546220][T23371] FAULT_INJECTION: forcing a failure. [ 429.546220][T23371] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 429.559460][T23371] CPU: 0 PID: 23371 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 429.567372][T23371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.577426][T23371] Call Trace: [ 429.580723][T23371] dump_stack+0x1fb/0x318 [ 429.585085][T23371] should_fail+0x555/0x770 [ 429.589513][T23371] should_fail_alloc_page+0x55/0x60 [ 429.594716][T23371] prepare_alloc_pages+0x283/0x460 [ 429.599859][T23371] __alloc_pages_nodemask+0xb2/0x5d0 [ 429.599885][T23371] kmem_getpages+0x4d/0xa00 [ 429.599898][T23371] cache_grow_begin+0x7e/0x2c0 [ 429.599911][T23371] cache_alloc_refill+0x311/0x3f0 [ 429.599923][T23371] ? check_preemption_disabled+0xb7/0x2a0 [ 429.599938][T23371] __kmalloc+0x318/0x340 [ 429.599951][T23371] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 429.609799][T23371] tomoyo_realpath_from_path+0xdc/0x7c0 [ 429.609818][T23371] tomoyo_path_perm+0x192/0x850 02:44:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 429.609854][T23371] tomoyo_path_truncate+0x1c/0x20 [ 429.619619][T23371] security_path_truncate+0xd5/0x150 [ 429.619634][T23371] do_sys_ftruncate+0x493/0x710 [ 429.619649][T23371] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 429.619661][T23371] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 429.619669][T23371] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 429.619678][T23371] ? do_syscall_64+0x1d/0x1c0 [ 429.619689][T23371] __x64_sys_ftruncate+0x60/0x70 [ 429.619699][T23371] do_syscall_64+0xf7/0x1c0 [ 429.619713][T23371] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.619721][T23371] RIP: 0033:0x45a1e7 [ 429.619734][T23371] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 429.629650][T23371] RSP: 002b:00007f5107f77a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 429.629661][T23371] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a1e7 [ 429.629667][T23371] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000004 [ 429.629674][T23371] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 429.629679][T23371] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 429.629685][T23371] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 429.662579][T23376] FAULT_INJECTION: forcing a failure. [ 429.662579][T23376] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 429.678012][T23376] CPU: 0 PID: 23376 Comm: syz-executor.4 Not tainted 5.4.0-rc7 #0 [ 429.678019][T23376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.678023][T23376] Call Trace: [ 429.678038][T23376] dump_stack+0x1fb/0x318 [ 429.678053][T23376] should_fail+0x555/0x770 [ 429.678070][T23376] should_fail_alloc_page+0x55/0x60 [ 429.698622][T23376] prepare_alloc_pages+0x283/0x460 [ 429.698637][T23376] __alloc_pages_nodemask+0xb2/0x5d0 [ 429.698659][T23376] kmem_getpages+0x4d/0xa00 [ 429.698672][T23376] cache_grow_begin+0x7e/0x2c0 [ 429.698688][T23376] cache_alloc_refill+0x311/0x3f0 [ 429.722165][T23376] ? check_preemption_disabled+0xb7/0x2a0 [ 429.722184][T23376] __kmalloc+0x318/0x340 [ 429.722194][T23376] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 429.722207][T23376] tomoyo_realpath_from_path+0xdc/0x7c0 [ 429.722226][T23376] tomoyo_path_perm+0x192/0x850 [ 429.722262][T23376] tomoyo_path_truncate+0x1c/0x20 [ 429.722271][T23376] security_path_truncate+0xd5/0x150 [ 429.722283][T23376] do_sys_ftruncate+0x493/0x710 [ 429.722297][T23376] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 429.722312][T23376] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 429.757530][T23376] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 429.757543][T23376] ? do_syscall_64+0x1d/0x1c0 [ 429.757558][T23376] __x64_sys_ftruncate+0x60/0x70 [ 429.757573][T23376] do_syscall_64+0xf7/0x1c0 [ 429.757588][T23376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.757597][T23376] RIP: 0033:0x45a1e7 [ 429.757607][T23376] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 429.757613][T23376] RSP: 002b:00007ffbe3c3ba88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 429.757623][T23376] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a1e7 [ 429.757629][T23376] RDX: 0000000020018050 RSI: 0000000008100000 RDI: 0000000000000004 [ 429.757635][T23376] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 429.757640][T23376] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 429.757652][T23376] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2", 0x98, 0x10000}], 0x0, 0x0) 02:44:07 executing program 0 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 430.402153][T23406] FAULT_INJECTION: forcing a failure. [ 430.402153][T23406] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 430.418523][T23406] CPU: 1 PID: 23406 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 430.426346][T23406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.436750][T23406] Call Trace: [ 430.440027][T23406] dump_stack+0x1fb/0x318 [ 430.444343][T23406] should_fail+0x555/0x770 [ 430.448763][T23406] should_fail_alloc_page+0x55/0x60 [ 430.453934][T23406] prepare_alloc_pages+0x283/0x460 [ 430.459024][T23406] __alloc_pages_nodemask+0xb2/0x5d0 [ 430.464293][T23406] alloc_pages_vma+0x4f7/0xd50 [ 430.469046][T23406] shmem_alloc_and_acct_page+0x425/0xbb0 [ 430.474666][T23406] shmem_getpage_gfp+0x2313/0x2a90 [ 430.479770][T23406] shmem_write_begin+0xcb/0x1b0 [ 430.484610][T23406] generic_perform_write+0x25d/0x4e0 [ 430.489893][T23406] __generic_file_write_iter+0x235/0x500 [ 430.495505][T23406] generic_file_write_iter+0x48e/0x630 [ 430.500945][T23406] __vfs_write+0x5a1/0x740 [ 430.505343][T23406] vfs_write+0x275/0x590 [ 430.509566][T23406] __x64_sys_pwrite64+0x162/0x1d0 [ 430.514571][T23406] do_syscall_64+0xf7/0x1c0 [ 430.519051][T23406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.524914][T23406] RIP: 0033:0x414017 [ 430.528808][T23406] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 430.548407][T23406] RSP: 002b:00007f5107f77a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 430.556801][T23406] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000414017 [ 430.564760][T23406] RDX: 00000000000000be RSI: 0000000020000240 RDI: 0000000000000004 [ 430.572717][T23406] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 430.580667][T23406] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 430.588623][T23406] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xa000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2", 0x98, 0x10000}], 0x0, 0x0) 02:44:07 executing program 0 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f", 0x49, 0x10000}], 0x0, 0x0) 02:44:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='%trfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 431.093001][T23443] FAULT_INJECTION: forcing a failure. [ 431.093001][T23443] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 431.137243][T23443] CPU: 1 PID: 23443 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 431.145434][T23443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.155485][T23443] Call Trace: [ 431.158775][T23443] dump_stack+0x1fb/0x318 [ 431.163101][T23443] should_fail+0x555/0x770 [ 431.167511][T23443] should_fail_alloc_page+0x55/0x60 [ 431.172686][T23443] prepare_alloc_pages+0x283/0x460 [ 431.177881][T23443] __alloc_pages_nodemask+0xb2/0x5d0 [ 431.183168][T23443] alloc_pages_vma+0x4f7/0xd50 [ 431.187911][T23443] shmem_alloc_and_acct_page+0x425/0xbb0 [ 431.193554][T23443] shmem_getpage_gfp+0x2313/0x2a90 [ 431.198657][T23443] shmem_write_begin+0xcb/0x1b0 [ 431.203508][T23443] generic_perform_write+0x25d/0x4e0 [ 431.208891][T23443] __generic_file_write_iter+0x235/0x500 [ 431.214542][T23443] generic_file_write_iter+0x48e/0x630 [ 431.219992][T23443] __vfs_write+0x5a1/0x740 [ 431.224396][T23443] vfs_write+0x275/0x590 [ 431.228631][T23443] __x64_sys_pwrite64+0x162/0x1d0 [ 431.233643][T23443] do_syscall_64+0xf7/0x1c0 [ 431.238127][T23443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.243994][T23443] RIP: 0033:0x414017 [ 431.247954][T23443] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 431.267535][T23443] RSP: 002b:00007f5107f77a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 431.275934][T23443] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000414017 [ 431.283896][T23443] RDX: 00000000000000be RSI: 0000000020000240 RDI: 0000000000000004 [ 431.291864][T23443] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 431.300082][T23443] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 431.308033][T23443] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2", 0x98, 0x10000}], 0x0, 0x0) 02:44:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 02:44:08 executing program 0 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 431.670868][T23471] FAULT_INJECTION: forcing a failure. [ 431.670868][T23471] name failslab, interval 1, probability 0, space 0, times 0 [ 431.683776][T23471] CPU: 0 PID: 23471 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 431.691678][T23471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.701728][T23471] Call Trace: [ 431.705015][T23471] dump_stack+0x1fb/0x318 [ 431.709345][T23471] should_fail+0x555/0x770 [ 431.713761][T23471] __should_failslab+0x11a/0x160 [ 431.718697][T23471] ? xas_create+0x1197/0x1910 [ 431.723374][T23471] should_failslab+0x9/0x20 [ 431.727875][T23471] kmem_cache_alloc+0x56/0x2e0 [ 431.732673][T23471] xas_create+0x1197/0x1910 [ 431.737183][T23471] xas_create_range+0x142/0x700 [ 431.742044][T23471] shmem_add_to_page_cache+0x91e/0x1290 [ 431.747603][T23471] shmem_getpage_gfp+0x121e/0x2a90 [ 431.752764][T23471] shmem_write_begin+0xcb/0x1b0 [ 431.758826][T23471] generic_perform_write+0x25d/0x4e0 [ 431.764123][T23471] __generic_file_write_iter+0x235/0x500 [ 431.769749][T23471] generic_file_write_iter+0x48e/0x630 [ 431.775212][T23471] __vfs_write+0x5a1/0x740 [ 431.779634][T23471] vfs_write+0x275/0x590 [ 431.783877][T23471] __x64_sys_pwrite64+0x162/0x1d0 [ 431.788899][T23471] do_syscall_64+0xf7/0x1c0 [ 431.793401][T23471] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.799284][T23471] RIP: 0033:0x414017 02:44:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xb000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 431.803191][T23471] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 431.822790][T23471] RSP: 002b:00007f5107f77a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 431.831205][T23471] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000414017 [ 431.839171][T23471] RDX: 00000000000000be RSI: 0000000020000240 RDI: 0000000000000004 [ 431.847135][T23471] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 431.855102][T23471] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 431.863064][T23471] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a2", 0xc4, 0x10000}], 0x0, 0x0) 02:44:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c3", 0xb1, 0x10000}], 0x0, 0x0) 02:44:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 02:44:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='\\trfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:09 executing program 0 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a2", 0xc4, 0x10000}], 0x0, 0x0) [ 432.361193][T23508] FAULT_INJECTION: forcing a failure. [ 432.361193][T23508] name failslab, interval 1, probability 0, space 0, times 0 [ 432.379197][T23508] CPU: 1 PID: 23508 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 432.387026][T23508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.397076][T23508] Call Trace: [ 432.400366][T23508] dump_stack+0x1fb/0x318 [ 432.404698][T23508] should_fail+0x555/0x770 [ 432.409116][T23508] __should_failslab+0x11a/0x160 [ 432.414037][T23508] ? getname_flags+0xba/0x640 [ 432.418693][T23508] should_failslab+0x9/0x20 [ 432.423458][T23508] kmem_cache_alloc+0x56/0x2e0 [ 432.428217][T23508] ? check_preemption_disabled+0xb7/0x2a0 [ 432.433914][T23508] getname_flags+0xba/0x640 [ 432.438394][T23508] getname+0x19/0x20 [ 432.442274][T23508] do_sys_open+0x261/0x560 [ 432.446679][T23508] __x64_sys_open+0x87/0x90 [ 432.451162][T23508] do_syscall_64+0xf7/0x1c0 [ 432.455658][T23508] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.461523][T23508] RIP: 0033:0x413fb1 [ 432.465391][T23508] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 432.484970][T23508] RSP: 002b:00007f5107f77a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 432.493355][T23508] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413fb1 [ 432.501303][T23508] RDX: 00007f5107f77b0a RSI: 0000000000000002 RDI: 00007f5107f77b00 [ 432.509260][T23508] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 432.517206][T23508] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 432.525155][T23508] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c3", 0xb1, 0x10000}], 0x0, 0x0) 02:44:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 02:44:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a2", 0xc4, 0x10000}], 0x0, 0x0) 02:44:09 executing program 0 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='b%rfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xc000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c3", 0xb1, 0x10000}], 0x0, 0x0) 02:44:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec9", 0xc7, 0x10000}], 0x0, 0x0) [ 433.182261][T23560] FAULT_INJECTION: forcing a failure. [ 433.182261][T23560] name failslab, interval 1, probability 0, space 0, times 0 02:44:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) [ 433.300228][T23560] CPU: 0 PID: 23560 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 433.308085][T23560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.318146][T23560] Call Trace: [ 433.321445][T23560] dump_stack+0x1fb/0x318 [ 433.325771][T23560] should_fail+0x555/0x770 [ 433.330189][T23560] __should_failslab+0x11a/0x160 [ 433.335126][T23560] ? security_file_alloc+0x36/0x200 [ 433.340327][T23560] should_failslab+0x9/0x20 [ 433.344833][T23560] kmem_cache_alloc+0x56/0x2e0 02:44:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 433.349592][T23560] security_file_alloc+0x36/0x200 [ 433.354613][T23560] __alloc_file+0xde/0x390 [ 433.359065][T23560] alloc_empty_file+0xac/0x1b0 [ 433.363822][T23560] path_openat+0x9e/0x4420 [ 433.368232][T23560] ? __kasan_kmalloc+0x178/0x1b0 [ 433.373166][T23560] ? __lock_acquire+0xc75/0x1be0 [ 433.378113][T23560] ? __kasan_check_write+0x14/0x20 [ 433.383235][T23560] do_filp_open+0x192/0x3d0 [ 433.387727][T23560] ? _raw_spin_unlock+0x2c/0x50 [ 433.392592][T23560] do_sys_open+0x29f/0x560 02:44:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='b\\rfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 433.397020][T23560] __x64_sys_open+0x87/0x90 [ 433.401525][T23560] do_syscall_64+0xf7/0x1c0 [ 433.406031][T23560] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.412783][T23560] RIP: 0033:0x413fb1 [ 433.416667][T23560] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 433.436341][T23560] RSP: 002b:00007f5107f77a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 02:44:10 executing program 0 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 433.444744][T23560] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413fb1 [ 433.444751][T23560] RDX: 00007f5107f77b0a RSI: 0000000000000002 RDI: 00007f5107f77b00 [ 433.444757][T23560] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 433.444763][T23560] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 433.444769][T23560] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 433.593055][T23584] FAULT_INJECTION: forcing a failure. [ 433.593055][T23584] name failslab, interval 1, probability 0, space 0, times 0 [ 433.613463][T23584] CPU: 0 PID: 23584 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 433.621287][T23584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.621292][T23584] Call Trace: [ 433.621310][T23584] dump_stack+0x1fb/0x318 [ 433.621325][T23584] should_fail+0x555/0x770 [ 433.621341][T23584] __should_failslab+0x11a/0x160 [ 433.621352][T23584] ? __alloc_file+0x2c/0x390 [ 433.621363][T23584] should_failslab+0x9/0x20 [ 433.621373][T23584] kmem_cache_alloc+0x56/0x2e0 [ 433.621386][T23584] __alloc_file+0x2c/0x390 [ 433.621399][T23584] alloc_empty_file+0xac/0x1b0 [ 433.621409][T23584] path_openat+0x9e/0x4420 [ 433.621460][T23584] ? __kasan_kmalloc+0x178/0x1b0 [ 433.657682][T23584] ? __lock_acquire+0xc75/0x1be0 [ 433.657696][T23584] ? rcu_read_lock_sched_held+0x10b/0x170 [ 433.657735][T23584] do_filp_open+0x192/0x3d0 [ 433.657751][T23584] ? _raw_spin_unlock+0x2c/0x50 [ 433.657774][T23584] do_sys_open+0x29f/0x560 [ 433.676054][T23584] __x64_sys_open+0x87/0x90 [ 433.676070][T23584] do_syscall_64+0xf7/0x1c0 [ 433.676086][T23584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.676096][T23584] RIP: 0033:0x413fb1 [ 433.676106][T23584] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 433.676111][T23584] RSP: 002b:00007f5107f77a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 433.676125][T23584] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413fb1 [ 433.691652][T23584] RDX: 00007f5107f77b0a RSI: 0000000000000002 RDI: 00007f5107f77b00 [ 433.691659][T23584] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 433.691666][T23584] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 433.691672][T23584] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:10 executing program 0 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec9", 0xc7, 0x10000}], 0x0, 0x0) [ 434.025093][T23596] FAULT_INJECTION: forcing a failure. [ 434.025093][T23596] name failslab, interval 1, probability 0, space 0, times 0 02:44:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 02:44:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366", 0xb2, 0x10000}], 0x0, 0x0) [ 434.115587][T23596] CPU: 0 PID: 23596 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 434.123421][T23596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.123431][T23596] Call Trace: [ 434.136786][T23596] dump_stack+0x1fb/0x318 [ 434.141115][T23596] should_fail+0x555/0x770 [ 434.141133][T23596] __should_failslab+0x11a/0x160 [ 434.141147][T23596] ? tomoyo_encode2+0x273/0x5a0 [ 434.155318][T23596] should_failslab+0x9/0x20 [ 434.159827][T23596] __kmalloc+0x7a/0x340 [ 434.163985][T23596] tomoyo_encode2+0x273/0x5a0 [ 434.169436][T23596] tomoyo_realpath_from_path+0x769/0x7c0 [ 434.175058][T23596] tomoyo_check_open_permission+0x1ce/0x9d0 [ 434.180962][T23596] tomoyo_file_open+0x141/0x190 [ 434.185792][T23596] security_file_open+0x65/0x2f0 [ 434.190708][T23596] do_dentry_open+0x351/0x10c0 [ 434.195454][T23596] vfs_open+0x73/0x80 [ 434.199413][T23596] path_openat+0x1397/0x4420 [ 434.204004][T23596] do_filp_open+0x192/0x3d0 [ 434.208584][T23596] do_sys_open+0x29f/0x560 [ 434.212979][T23596] __x64_sys_open+0x87/0x90 [ 434.217460][T23596] do_syscall_64+0xf7/0x1c0 [ 434.221939][T23596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.227804][T23596] RIP: 0033:0x413fb1 [ 434.231674][T23596] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 434.251584][T23596] RSP: 002b:00007f5107f77a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 434.259972][T23596] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413fb1 [ 434.267918][T23596] RDX: 00007f5107f77b0a RSI: 0000000000000002 RDI: 00007f5107f77b00 [ 434.275873][T23596] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 434.283818][T23596] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 434.291764][T23596] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xd000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='bt\\fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 434.401176][T23596] ERROR: Out of memory at tomoyo_realpath_from_path. 02:44:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec9", 0xc7, 0x10000}], 0x0, 0x0) 02:44:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366", 0xb2, 0x10000}], 0x0, 0x0) 02:44:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 02:44:11 executing program 0 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec98869", 0xc9, 0x10000}], 0x0, 0x0) [ 434.874570][T23646] FAULT_INJECTION: forcing a failure. [ 434.874570][T23646] name failslab, interval 1, probability 0, space 0, times 0 [ 434.901996][T23646] CPU: 0 PID: 23646 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 434.909829][T23646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.909839][T23646] Call Trace: [ 434.923181][T23646] dump_stack+0x1fb/0x318 [ 434.927511][T23646] should_fail+0x555/0x770 [ 434.931932][T23646] __should_failslab+0x11a/0x160 [ 434.936867][T23646] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 434.942587][T23646] should_failslab+0x9/0x20 [ 434.947070][T23646] __kmalloc+0x7a/0x340 [ 434.951201][T23646] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 434.956896][T23646] tomoyo_realpath_from_path+0xdc/0x7c0 [ 434.962422][T23646] tomoyo_check_open_permission+0x1ce/0x9d0 [ 434.968308][T23646] tomoyo_file_open+0x141/0x190 [ 434.973136][T23646] security_file_open+0x65/0x2f0 [ 434.978050][T23646] do_dentry_open+0x351/0x10c0 [ 434.982794][T23646] vfs_open+0x73/0x80 [ 434.986761][T23646] path_openat+0x1397/0x4420 [ 434.991361][T23646] do_filp_open+0x192/0x3d0 [ 434.995875][T23646] do_sys_open+0x29f/0x560 [ 435.000276][T23646] __x64_sys_open+0x87/0x90 [ 435.004757][T23646] do_syscall_64+0xf7/0x1c0 [ 435.009240][T23646] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.015114][T23646] RIP: 0033:0x413fb1 [ 435.018998][T23646] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 435.038579][T23646] RSP: 002b:00007f5107f77a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 435.046972][T23646] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413fb1 [ 435.054921][T23646] RDX: 00007f5107f77b0a RSI: 0000000000000002 RDI: 00007f5107f77b00 [ 435.062867][T23646] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 02:44:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btr%s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) [ 435.070828][T23646] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 435.078773][T23646] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xe000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366", 0xb2, 0x10000}], 0x0, 0x0) 02:44:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec98869", 0xc9, 0x10000}], 0x0, 0x0) [ 435.259162][T23646] ERROR: Out of memory at tomoyo_realpath_from_path. 02:44:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 02:44:12 executing program 0 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btr\\s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 435.651257][T23697] FAULT_INJECTION: forcing a failure. [ 435.651257][T23697] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 435.664498][T23697] CPU: 1 PID: 23697 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 435.672754][T23697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.682801][T23697] Call Trace: [ 435.686077][T23697] dump_stack+0x1fb/0x318 [ 435.690389][T23697] should_fail+0x555/0x770 [ 435.694961][T23697] should_fail_alloc_page+0x55/0x60 [ 435.700135][T23697] prepare_alloc_pages+0x283/0x460 [ 435.705224][T23697] __alloc_pages_nodemask+0xb2/0x5d0 [ 435.710492][T23697] kmem_getpages+0x4d/0xa00 [ 435.714969][T23697] cache_grow_begin+0x7e/0x2c0 [ 435.719711][T23697] cache_alloc_refill+0x311/0x3f0 [ 435.724711][T23697] ? check_preemption_disabled+0xb7/0x2a0 [ 435.730406][T23697] __kmalloc+0x318/0x340 [ 435.734624][T23697] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 435.740320][T23697] tomoyo_realpath_from_path+0xdc/0x7c0 [ 435.746022][T23697] tomoyo_check_open_permission+0x1ce/0x9d0 [ 435.752081][T23697] tomoyo_file_open+0x141/0x190 [ 435.756918][T23697] security_file_open+0x65/0x2f0 [ 435.761832][T23697] do_dentry_open+0x351/0x10c0 [ 435.766577][T23697] vfs_open+0x73/0x80 [ 435.770534][T23697] path_openat+0x1397/0x4420 [ 435.775124][T23697] do_filp_open+0x192/0x3d0 [ 435.779619][T23697] do_sys_open+0x29f/0x560 [ 435.784011][T23697] __x64_sys_open+0x87/0x90 [ 435.788492][T23697] do_syscall_64+0xf7/0x1c0 [ 435.792972][T23697] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.798839][T23697] RIP: 0033:0x413fb1 [ 435.802707][T23697] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 435.825062][T23697] RSP: 002b:00007f5107f77a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 435.833447][T23697] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413fb1 [ 435.841395][T23697] RDX: 00007f5107f77b0a RSI: 0000000000000002 RDI: 00007f5107f77b00 02:44:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532", 0xb8, 0x10000}], 0x0, 0x0) [ 435.849365][T23697] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 435.857340][T23697] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 435.865950][T23697] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 02:44:12 executing program 0 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec98869", 0xc9, 0x10000}], 0x0, 0x0) 02:44:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xf000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 436.181730][T23723] FAULT_INJECTION: forcing a failure. [ 436.181730][T23723] name failslab, interval 1, probability 0, space 0, times 0 [ 436.206781][T23723] CPU: 0 PID: 23723 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 436.214632][T23723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.224689][T23723] Call Trace: [ 436.227990][T23723] dump_stack+0x1fb/0x318 [ 436.232334][T23723] should_fail+0x555/0x770 [ 436.236756][T23723] __should_failslab+0x11a/0x160 [ 436.241687][T23723] ? tomoyo_encode2+0x273/0x5a0 [ 436.247667][T23723] should_failslab+0x9/0x20 [ 436.247679][T23723] __kmalloc+0x7a/0x340 [ 436.247697][T23723] tomoyo_encode2+0x273/0x5a0 [ 436.247713][T23723] tomoyo_realpath_from_path+0x769/0x7c0 [ 436.247732][T23723] tomoyo_check_open_permission+0x1ce/0x9d0 [ 436.256531][T23723] tomoyo_file_open+0x141/0x190 [ 436.256546][T23723] security_file_open+0x65/0x2f0 [ 436.256562][T23723] do_dentry_open+0x351/0x10c0 [ 436.267101][T23723] vfs_open+0x73/0x80 [ 436.267113][T23723] path_openat+0x1397/0x4420 [ 436.267161][T23723] do_filp_open+0x192/0x3d0 [ 436.277911][T23723] do_sys_open+0x29f/0x560 [ 436.289425][T23723] __x64_sys_open+0x87/0x90 [ 436.289441][T23723] do_syscall_64+0xf7/0x1c0 [ 436.289455][T23723] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.289465][T23723] RIP: 0033:0x413fb1 [ 436.289476][T23723] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 436.289480][T23723] RSP: 002b:00007f5107f77a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 436.289490][T23723] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413fb1 [ 436.289495][T23723] RDX: 00007f5107f77b0a RSI: 0000000000000002 RDI: 00007f5107f77b00 [ 436.289500][T23723] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 02:44:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532", 0xb8, 0x10000}], 0x0, 0x0) [ 436.289505][T23723] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 436.289510][T23723] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 436.301095][T23723] ERROR: Out of memory at tomoyo_realpath_from_path. 02:44:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca}], 0x0, 0x0) 02:44:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532", 0xb8, 0x10000}], 0x0, 0x0) 02:44:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xd000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:13 executing program 0 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x10000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca}], 0x0, 0x0) [ 436.954705][T23767] FAULT_INJECTION: forcing a failure. [ 436.954705][T23767] name failslab, interval 1, probability 0, space 0, times 0 [ 436.969728][T23767] CPU: 0 PID: 23767 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 436.977551][T23767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.987626][T23767] Call Trace: [ 436.990913][T23767] dump_stack+0x1fb/0x318 [ 436.995249][T23767] should_fail+0x555/0x770 [ 436.999652][T23767] __should_failslab+0x11a/0x160 [ 437.004566][T23767] ? __kernfs_new_node+0x97/0x6b0 [ 437.009568][T23767] should_failslab+0x9/0x20 [ 437.014048][T23767] kmem_cache_alloc+0x56/0x2e0 [ 437.018788][T23767] __kernfs_new_node+0x97/0x6b0 [ 437.023626][T23767] ? __schedule+0x876/0xc30 [ 437.028104][T23767] ? bd_set_size+0x97/0xb0 [ 437.032499][T23767] kernfs_create_dir_ns+0x9b/0x230 [ 437.037772][T23767] internal_create_group+0x207/0xd80 [ 437.043037][T23767] sysfs_create_group+0x1f/0x30 [ 437.047866][T23767] loop_set_fd+0xf54/0x1470 [ 437.052351][T23767] lo_ioctl+0xd5/0x2200 [ 437.056491][T23767] ? __kasan_slab_free+0x12a/0x1e0 [ 437.061574][T23767] ? kasan_slab_free+0xe/0x10 [ 437.066234][T23767] ? kfree+0x115/0x200 [ 437.070276][T23767] ? tomoyo_path_number_perm+0x4e1/0x640 [ 437.075879][T23767] ? tomoyo_file_ioctl+0x23/0x30 [ 437.080807][T23767] ? security_file_ioctl+0x6d/0xd0 [ 437.085900][T23767] ? __x64_sys_ioctl+0xa3/0x120 [ 437.090726][T23767] ? do_syscall_64+0xf7/0x1c0 [ 437.095418][T23767] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.101471][T23767] ? debug_check_no_obj_freed+0x505/0x5b0 [ 437.107184][T23767] ? rcu_lock_release+0x9/0x30 [ 437.111927][T23767] ? rcu_lock_release+0x9/0x30 [ 437.116667][T23767] ? lo_release+0x1f0/0x1f0 [ 437.121159][T23767] blkdev_ioctl+0x807/0x2980 [ 437.125740][T23767] ? tomoyo_path_number_perm+0x53e/0x640 [ 437.131384][T23767] block_ioctl+0xbd/0x100 [ 437.135707][T23767] ? blkdev_iopoll+0x100/0x100 [ 437.140472][T23767] do_vfs_ioctl+0x744/0x1730 [ 437.145042][T23767] ? __fget+0x411/0x510 [ 437.149181][T23767] ? tomoyo_file_ioctl+0x23/0x30 [ 437.154104][T23767] ? security_file_ioctl+0xa1/0xd0 [ 437.159195][T23767] __x64_sys_ioctl+0xe3/0x120 [ 437.163854][T23767] do_syscall_64+0xf7/0x1c0 [ 437.168334][T23767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.174203][T23767] RIP: 0033:0x45a087 [ 437.178573][T23767] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 437.198152][T23767] RSP: 002b:00007f5107f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 437.206536][T23767] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 437.214483][T23767] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 437.222444][T23767] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 437.230484][T23767] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 437.238433][T23767] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b09094", 0xbb, 0x10000}], 0x0, 0x0) 02:44:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:14 executing program 0 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca}], 0x0, 0x0) 02:44:14 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b09094", 0xbb, 0x10000}], 0x0, 0x0) [ 437.731318][T23806] FAULT_INJECTION: forcing a failure. [ 437.731318][T23806] name failslab, interval 1, probability 0, space 0, times 0 [ 437.769080][T23806] CPU: 1 PID: 23806 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 437.776905][T23806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.776914][T23806] Call Trace: [ 437.790415][T23806] dump_stack+0x1fb/0x318 [ 437.794729][T23806] should_fail+0x555/0x770 [ 437.799130][T23806] __should_failslab+0x11a/0x160 [ 437.804042][T23806] ? tomoyo_encode2+0x273/0x5a0 [ 437.808867][T23806] should_failslab+0x9/0x20 [ 437.813343][T23806] __kmalloc+0x7a/0x340 [ 437.817585][T23806] tomoyo_encode2+0x273/0x5a0 [ 437.822241][T23806] tomoyo_realpath_from_path+0x769/0x7c0 [ 437.827856][T23806] tomoyo_path_number_perm+0x166/0x640 [ 437.833311][T23806] ? smack_file_ioctl+0x226/0x2e0 [ 437.838310][T23806] ? __fget+0x411/0x510 [ 437.842452][T23806] tomoyo_file_ioctl+0x23/0x30 [ 437.847190][T23806] security_file_ioctl+0x6d/0xd0 [ 437.852103][T23806] __x64_sys_ioctl+0xa3/0x120 [ 437.856758][T23806] do_syscall_64+0xf7/0x1c0 [ 437.861242][T23806] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.867455][T23806] RIP: 0033:0x45a087 [ 437.871325][T23806] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 437.890916][T23806] RSP: 002b:00007f5107f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 437.899310][T23806] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 437.907254][T23806] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 437.915226][T23806] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 437.923180][T23806] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 437.931125][T23806] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 437.946029][T23806] ERROR: Out of memory at tomoyo_realpath_from_path. [ 438.021054][T23817] FAULT_INJECTION: forcing a failure. [ 438.021054][T23817] name failslab, interval 1, probability 0, space 0, times 0 [ 438.069164][T23817] CPU: 1 PID: 23817 Comm: syz-executor.2 Not tainted 5.4.0-rc7 #0 [ 438.077001][T23817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.087154][T23817] Call Trace: [ 438.090426][T23817] dump_stack+0x1fb/0x318 [ 438.094734][T23817] should_fail+0x555/0x770 [ 438.099132][T23817] __should_failslab+0x11a/0x160 [ 438.104063][T23817] ? __se_sys_memfd_create+0x10a/0x4b0 [ 438.109499][T23817] should_failslab+0x9/0x20 [ 438.113980][T23817] __kmalloc+0x7a/0x340 [ 438.118124][T23817] __se_sys_memfd_create+0x10a/0x4b0 [ 438.123407][T23817] ? do_syscall_64+0x1d/0x1c0 [ 438.128077][T23817] __x64_sys_memfd_create+0x5b/0x70 [ 438.133293][T23817] do_syscall_64+0xf7/0x1c0 [ 438.137807][T23817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.143675][T23817] RIP: 0033:0x45a219 [ 438.147545][T23817] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:44:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 438.167324][T23817] RSP: 002b:00007f3eb565fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 438.175726][T23817] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 438.183857][T23817] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 438.191813][T23817] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 438.199864][T23817] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f3eb56606d4 [ 438.207990][T23817] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:15 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:15 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 438.352228][T23830] FAULT_INJECTION: forcing a failure. [ 438.352228][T23830] name failslab, interval 1, probability 0, space 0, times 0 [ 438.365601][T23831] FAULT_INJECTION: forcing a failure. [ 438.365601][T23831] name failslab, interval 1, probability 0, space 0, times 0 [ 438.379022][T23830] CPU: 1 PID: 23830 Comm: syz-executor.5 Not tainted 5.4.0-rc7 #0 [ 438.386833][T23830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.386839][T23830] Call Trace: 02:44:15 executing program 0 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 438.386856][T23830] dump_stack+0x1fb/0x318 [ 438.386874][T23830] should_fail+0x555/0x770 [ 438.408922][T23830] __should_failslab+0x11a/0x160 [ 438.414303][T23830] ? __se_sys_memfd_create+0x10a/0x4b0 [ 438.419764][T23830] should_failslab+0x9/0x20 [ 438.419777][T23830] __kmalloc+0x7a/0x340 [ 438.419797][T23830] __se_sys_memfd_create+0x10a/0x4b0 [ 438.419808][T23830] ? do_syscall_64+0x1d/0x1c0 [ 438.419820][T23830] __x64_sys_memfd_create+0x5b/0x70 [ 438.419831][T23830] do_syscall_64+0xf7/0x1c0 [ 438.419847][T23830] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.428470][T23830] RIP: 0033:0x45a219 [ 438.428480][T23830] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 438.428486][T23830] RSP: 002b:00007facae199a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 438.428496][T23830] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 438.428502][T23830] RDX: 0000000020018050 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 438.428509][T23830] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 438.428514][T23830] R10: 0000000000000000 R11: 0000000000000246 R12: 00007facae19a6d4 [ 438.428523][T23830] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 438.440193][T23831] CPU: 1 PID: 23831 Comm: syz-executor.2 Not tainted 5.4.0-rc7 #0 [ 438.454050][T23831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.454055][T23831] Call Trace: [ 438.454073][T23831] dump_stack+0x1fb/0x318 [ 438.454090][T23831] should_fail+0x555/0x770 [ 438.454107][T23831] __should_failslab+0x11a/0x160 [ 438.454122][T23831] ? shmem_alloc_inode+0x1b/0x40 [ 438.477860][T23831] should_failslab+0x9/0x20 [ 438.477873][T23831] kmem_cache_alloc+0x56/0x2e0 [ 438.477883][T23831] ? shmem_match+0x180/0x180 [ 438.477893][T23831] shmem_alloc_inode+0x1b/0x40 [ 438.477902][T23831] ? shmem_match+0x180/0x180 [ 438.477911][T23831] new_inode_pseudo+0x68/0x240 [ 438.477922][T23831] new_inode+0x28/0x1c0 [ 438.477933][T23831] ? __kasan_check_read+0x11/0x20 [ 438.477945][T23831] shmem_get_inode+0x108/0x6e0 [ 438.477961][T23831] __shmem_file_setup+0x129/0x280 [ 438.494747][T23831] shmem_file_setup+0x2f/0x40 [ 438.494761][T23831] __se_sys_memfd_create+0x28e/0x4b0 [ 438.494773][T23831] ? do_syscall_64+0x1d/0x1c0 [ 438.494786][T23831] __x64_sys_memfd_create+0x5b/0x70 [ 438.494796][T23831] do_syscall_64+0xf7/0x1c0 [ 438.494811][T23831] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.494820][T23831] RIP: 0033:0x45a219 [ 438.494828][T23831] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 438.494836][T23831] RSP: 002b:00007f3eb565fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 438.510827][T23831] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 438.510833][T23831] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 438.510839][T23831] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 438.510844][T23831] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f3eb56606d4 [ 438.510849][T23831] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 438.725817][T23836] FAULT_INJECTION: forcing a failure. [ 438.725817][T23836] name failslab, interval 1, probability 0, space 0, times 0 [ 438.764615][T23836] CPU: 0 PID: 23836 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 438.772457][T23836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.782512][T23836] Call Trace: [ 438.785810][T23836] dump_stack+0x1fb/0x318 [ 438.790150][T23836] should_fail+0x555/0x770 [ 438.794575][T23836] __should_failslab+0x11a/0x160 [ 438.799518][T23836] ? tomoyo_encode2+0x273/0x5a0 [ 438.804371][T23836] should_failslab+0x9/0x20 [ 438.808881][T23836] __kmalloc+0x7a/0x340 [ 438.813040][T23836] tomoyo_encode2+0x273/0x5a0 [ 438.817708][T23836] tomoyo_realpath_from_path+0x769/0x7c0 [ 438.823325][T23836] tomoyo_path_number_perm+0x166/0x640 [ 438.828774][T23836] ? smack_file_ioctl+0x226/0x2e0 [ 438.833787][T23836] ? __fget+0x411/0x510 [ 438.837953][T23836] tomoyo_file_ioctl+0x23/0x30 [ 438.842721][T23836] security_file_ioctl+0x6d/0xd0 [ 438.847741][T23836] __x64_sys_ioctl+0xa3/0x120 [ 438.852410][T23836] do_syscall_64+0xf7/0x1c0 [ 438.856914][T23836] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.862794][T23836] RIP: 0033:0x45a087 [ 438.862805][T23836] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 438.862810][T23836] RSP: 002b:00007f5107f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 438.886286][T23836] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 438.886293][T23836] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 02:44:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x11000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:15 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:15 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b09094", 0xbb, 0x10000}], 0x0, 0x0) [ 438.886298][T23836] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 438.886303][T23836] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 438.886309][T23836] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 438.887675][T23836] ERROR: Out of memory at tomoyo_realpath_from_path. [ 439.027901][T23850] FAULT_INJECTION: forcing a failure. [ 439.027901][T23850] name failslab, interval 1, probability 0, space 0, times 0 [ 439.050262][T23856] FAULT_INJECTION: forcing a failure. [ 439.050262][T23856] name failslab, interval 1, probability 0, space 0, times 0 [ 439.063043][T23850] CPU: 0 PID: 23850 Comm: syz-executor.2 Not tainted 5.4.0-rc7 #0 [ 439.063051][T23850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.063054][T23850] Call Trace: [ 439.063077][T23850] dump_stack+0x1fb/0x318 [ 439.063093][T23850] should_fail+0x555/0x770 [ 439.063110][T23850] __should_failslab+0x11a/0x160 [ 439.063124][T23850] ? security_inode_alloc+0x36/0x1e0 [ 439.103302][T23850] should_failslab+0x9/0x20 [ 439.103317][T23850] kmem_cache_alloc+0x56/0x2e0 [ 439.103326][T23850] ? rcu_read_lock_sched_held+0x10b/0x170 [ 439.103338][T23850] security_inode_alloc+0x36/0x1e0 [ 439.112794][T23850] inode_init_always+0x3b5/0x920 [ 439.112807][T23850] ? shmem_match+0x180/0x180 [ 439.112819][T23850] new_inode_pseudo+0x7f/0x240 [ 439.112831][T23850] new_inode+0x28/0x1c0 [ 439.112841][T23850] ? __kasan_check_read+0x11/0x20 [ 439.112854][T23850] shmem_get_inode+0x108/0x6e0 [ 439.123658][T23850] __shmem_file_setup+0x129/0x280 [ 439.123674][T23850] shmem_file_setup+0x2f/0x40 [ 439.123687][T23850] __se_sys_memfd_create+0x28e/0x4b0 [ 439.123702][T23850] ? do_syscall_64+0x1d/0x1c0 [ 439.138107][T23850] __x64_sys_memfd_create+0x5b/0x70 [ 439.138124][T23850] do_syscall_64+0xf7/0x1c0 [ 439.138139][T23850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.138148][T23850] RIP: 0033:0x45a219 [ 439.138160][T23850] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 439.138166][T23850] RSP: 002b:00007f3eb565fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 439.138174][T23850] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 02:44:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 439.138184][T23850] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 439.152078][T23850] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 439.167009][T23850] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f3eb56606d4 [ 439.167016][T23850] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 439.177353][T23856] CPU: 0 PID: 23856 Comm: syz-executor.5 Not tainted 5.4.0-rc7 #0 [ 439.187542][T23856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.211006][T23856] Call Trace: [ 439.211025][T23856] dump_stack+0x1fb/0x318 [ 439.211040][T23856] should_fail+0x555/0x770 [ 439.211057][T23856] __should_failslab+0x11a/0x160 [ 439.211068][T23856] ? shmem_alloc_inode+0x1b/0x40 [ 439.211079][T23856] should_failslab+0x9/0x20 [ 439.211088][T23856] kmem_cache_alloc+0x56/0x2e0 [ 439.211096][T23856] ? shmem_match+0x180/0x180 [ 439.211107][T23856] shmem_alloc_inode+0x1b/0x40 [ 439.211115][T23856] ? shmem_match+0x180/0x180 [ 439.211125][T23856] new_inode_pseudo+0x68/0x240 [ 439.211134][T23856] new_inode+0x28/0x1c0 [ 439.211141][T23856] ? __kasan_check_read+0x11/0x20 [ 439.211152][T23856] shmem_get_inode+0x108/0x6e0 [ 439.211170][T23856] __shmem_file_setup+0x129/0x280 [ 439.227557][T23856] shmem_file_setup+0x2f/0x40 [ 439.227579][T23856] __se_sys_memfd_create+0x28e/0x4b0 [ 439.227591][T23856] ? do_syscall_64+0x1d/0x1c0 [ 439.227603][T23856] __x64_sys_memfd_create+0x5b/0x70 [ 439.227619][T23856] do_syscall_64+0xf7/0x1c0 [ 439.243812][T23856] entry_SYSCALL_64_after_hwframe+0x49/0xbe 02:44:16 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:16 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 439.243824][T23856] RIP: 0033:0x45a219 [ 439.243835][T23856] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 439.243840][T23856] RSP: 002b:00007facae199a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 439.243849][T23856] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 439.243853][T23856] RDX: 0000000020018050 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 439.243859][T23856] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 439.243863][T23856] R10: 0000000000000000 R11: 0000000000000246 R12: 00007facae19a6d4 [ 439.243869][T23856] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 439.467350][T23867] FAULT_INJECTION: forcing a failure. [ 439.467350][T23867] name failslab, interval 1, probability 0, space 0, times 0 02:44:16 executing program 0 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 439.504692][T23869] FAULT_INJECTION: forcing a failure. [ 439.504692][T23869] name failslab, interval 1, probability 0, space 0, times 0 [ 439.519218][T23867] CPU: 1 PID: 23867 Comm: syz-executor.2 Not tainted 5.4.0-rc7 #0 [ 439.527055][T23867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.527071][T23867] Call Trace: [ 439.540422][T23867] dump_stack+0x1fb/0x318 [ 439.544756][T23867] should_fail+0x555/0x770 [ 439.549166][T23867] __should_failslab+0x11a/0x160 [ 439.554095][T23867] ? __d_alloc+0x2d/0x6e0 [ 439.554108][T23867] should_failslab+0x9/0x20 [ 439.554118][T23867] kmem_cache_alloc+0x56/0x2e0 [ 439.554130][T23867] __d_alloc+0x2d/0x6e0 [ 439.567868][T23867] ? lockdep_init_map+0x2a/0x680 [ 439.567881][T23867] d_alloc_pseudo+0x1d/0x70 [ 439.567893][T23867] alloc_file_pseudo+0xc3/0x260 [ 439.567917][T23867] __shmem_file_setup+0x1a2/0x280 [ 439.586388][T23867] shmem_file_setup+0x2f/0x40 [ 439.586401][T23867] __se_sys_memfd_create+0x28e/0x4b0 [ 439.586415][T23867] ? do_syscall_64+0x1d/0x1c0 [ 439.605980][T23867] __x64_sys_memfd_create+0x5b/0x70 [ 439.605994][T23867] do_syscall_64+0xf7/0x1c0 [ 439.606008][T23867] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.621530][T23867] RIP: 0033:0x45a219 [ 439.625447][T23867] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 439.625453][T23867] RSP: 002b:00007f3eb565fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 439.625462][T23867] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 439.625469][T23867] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 439.625474][T23867] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 439.625484][T23867] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f3eb56606d4 [ 439.678054][T23867] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 439.693908][T23869] CPU: 0 PID: 23869 Comm: syz-executor.5 Not tainted 5.4.0-rc7 #0 [ 439.701992][T23869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.712143][T23869] Call Trace: [ 439.715438][T23869] dump_stack+0x1fb/0x318 [ 439.719754][T23869] should_fail+0x555/0x770 [ 439.724154][T23869] __should_failslab+0x11a/0x160 [ 439.729087][T23869] ? security_inode_alloc+0x36/0x1e0 [ 439.734374][T23869] should_failslab+0x9/0x20 [ 439.738869][T23869] kmem_cache_alloc+0x56/0x2e0 [ 439.743627][T23869] ? rcu_read_lock_sched_held+0x10b/0x170 [ 439.749332][T23869] security_inode_alloc+0x36/0x1e0 [ 439.754427][T23869] inode_init_always+0x3b5/0x920 [ 439.759344][T23869] ? shmem_match+0x180/0x180 [ 439.763913][T23869] new_inode_pseudo+0x7f/0x240 [ 439.768652][T23869] new_inode+0x28/0x1c0 [ 439.772785][T23869] ? __kasan_check_read+0x11/0x20 [ 439.777786][T23869] shmem_get_inode+0x108/0x6e0 [ 439.782532][T23869] __shmem_file_setup+0x129/0x280 [ 439.787539][T23869] shmem_file_setup+0x2f/0x40 [ 439.792195][T23869] __se_sys_memfd_create+0x28e/0x4b0 [ 439.797456][T23869] ? do_syscall_64+0x1d/0x1c0 [ 439.802109][T23869] __x64_sys_memfd_create+0x5b/0x70 [ 439.807286][T23869] do_syscall_64+0xf7/0x1c0 [ 439.811776][T23869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.817646][T23869] RIP: 0033:0x45a219 [ 439.821519][T23869] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 439.844921][T23869] RSP: 002b:00007facae199a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 439.853311][T23869] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 439.861265][T23869] RDX: 0000000020018050 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 439.869226][T23869] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 439.877178][T23869] R10: 0000000000000000 R11: 0000000000000246 R12: 00007facae19a6d4 [ 439.885125][T23869] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:16 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 439.955695][T23878] FAULT_INJECTION: forcing a failure. [ 439.955695][T23878] name failslab, interval 1, probability 0, space 0, times 0 [ 440.001341][T23878] CPU: 1 PID: 23878 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 440.009214][T23878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.019443][T23878] Call Trace: [ 440.023948][T23878] dump_stack+0x1fb/0x318 [ 440.028275][T23878] should_fail+0x555/0x770 [ 440.032687][T23878] __should_failslab+0x11a/0x160 [ 440.037623][T23878] ? loop_set_fd+0x1470/0x1470 [ 440.042368][T23878] should_failslab+0x9/0x20 [ 440.046851][T23878] kmem_cache_alloc_trace+0x5d/0x2f0 [ 440.052113][T23878] ? __kthread_create_on_node+0xb2/0x3b0 [ 440.057722][T23878] ? loop_set_fd+0x1470/0x1470 [ 440.062465][T23878] __kthread_create_on_node+0xb2/0x3b0 [ 440.067915][T23878] ? loop_set_fd+0x1470/0x1470 [ 440.072656][T23878] kthread_create_on_node+0x72/0xa0 [ 440.077831][T23878] ? lockdep_init_map+0x2a/0x680 [ 440.082748][T23878] ? __kthread_init_worker+0x5a/0xe0 [ 440.088009][T23878] loop_set_fd+0x6a8/0x1470 [ 440.092492][T23878] ? check_preemption_disabled+0xb7/0x2a0 [ 440.098212][T23878] ? tomoyo_path_number_perm+0x4e1/0x640 [ 440.103846][T23878] lo_ioctl+0xd5/0x2200 [ 440.107976][T23878] ? __kasan_slab_free+0x12a/0x1e0 [ 440.113064][T23878] ? kasan_slab_free+0xe/0x10 [ 440.117716][T23878] ? kfree+0x115/0x200 [ 440.121762][T23878] ? tomoyo_path_number_perm+0x4e1/0x640 [ 440.127382][T23878] ? tomoyo_file_ioctl+0x23/0x30 [ 440.132312][T23878] ? security_file_ioctl+0x6d/0xd0 [ 440.137430][T23878] ? __x64_sys_ioctl+0xa3/0x120 [ 440.142280][T23878] ? do_syscall_64+0xf7/0x1c0 [ 440.146946][T23878] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.153019][T23878] ? debug_check_no_obj_freed+0x505/0x5b0 [ 440.158733][T23878] ? rcu_lock_release+0x9/0x30 [ 440.163497][T23878] ? rcu_lock_release+0x9/0x30 [ 440.168342][T23878] ? lo_release+0x1f0/0x1f0 [ 440.172828][T23878] blkdev_ioctl+0x807/0x2980 [ 440.177397][T23878] ? tomoyo_path_number_perm+0x53e/0x640 [ 440.183027][T23878] block_ioctl+0xbd/0x100 [ 440.187334][T23878] ? blkdev_iopoll+0x100/0x100 [ 440.192079][T23878] do_vfs_ioctl+0x744/0x1730 [ 440.196821][T23878] ? __fget+0x411/0x510 [ 440.200964][T23878] ? tomoyo_file_ioctl+0x23/0x30 [ 440.205879][T23878] ? security_file_ioctl+0xa1/0xd0 [ 440.210978][T23878] __x64_sys_ioctl+0xe3/0x120 [ 440.215652][T23878] do_syscall_64+0xf7/0x1c0 [ 440.220153][T23878] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.226027][T23878] RIP: 0033:0x45a087 [ 440.229900][T23878] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:44:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d71", 0xbd, 0x10000}], 0x0, 0x0) [ 440.249602][T23878] RSP: 002b:00007f5107f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 440.257992][T23878] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 440.266121][T23878] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 440.274073][T23878] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 440.282039][T23878] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 440.290098][T23878] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x12000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 440.421635][T23886] FAULT_INJECTION: forcing a failure. [ 440.421635][T23886] name failslab, interval 1, probability 0, space 0, times 0 [ 440.454291][T23886] CPU: 1 PID: 23886 Comm: syz-executor.2 Not tainted 5.4.0-rc7 #0 [ 440.462123][T23886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.462132][T23886] Call Trace: [ 440.475468][T23886] dump_stack+0x1fb/0x318 [ 440.475491][T23886] should_fail+0x555/0x770 [ 440.475508][T23886] __should_failslab+0x11a/0x160 [ 440.475521][T23886] ? __alloc_file+0x2c/0x390 [ 440.484233][T23886] should_failslab+0x9/0x20 [ 440.484246][T23886] kmem_cache_alloc+0x56/0x2e0 [ 440.484259][T23886] __alloc_file+0x2c/0x390 [ 440.484272][T23886] alloc_empty_file+0xac/0x1b0 [ 440.484281][T23886] alloc_file+0x60/0x4c0 [ 440.484294][T23886] alloc_file_pseudo+0x1d4/0x260 02:44:17 executing program 0 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:17 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 440.493805][T23886] __shmem_file_setup+0x1a2/0x280 [ 440.493822][T23886] shmem_file_setup+0x2f/0x40 [ 440.493836][T23886] __se_sys_memfd_create+0x28e/0x4b0 [ 440.493847][T23886] ? do_syscall_64+0x1d/0x1c0 [ 440.493864][T23886] __x64_sys_memfd_create+0x5b/0x70 [ 440.503117][T23886] do_syscall_64+0xf7/0x1c0 [ 440.503133][T23886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.503143][T23886] RIP: 0033:0x45a219 [ 440.503153][T23886] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 440.503158][T23886] RSP: 002b:00007f3eb565fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 440.512306][T23886] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 440.512313][T23886] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 440.512319][T23886] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 440.512325][T23886] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f3eb56606d4 [ 440.512331][T23886] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d71", 0xbd, 0x10000}], 0x0, 0x0) [ 440.723518][T23900] FAULT_INJECTION: forcing a failure. [ 440.723518][T23900] name failslab, interval 1, probability 0, space 0, times 0 [ 440.748640][T23902] FAULT_INJECTION: forcing a failure. [ 440.748640][T23902] name failslab, interval 1, probability 0, space 0, times 0 [ 440.775585][T23900] CPU: 0 PID: 23900 Comm: syz-executor.2 Not tainted 5.4.0-rc7 #0 [ 440.783426][T23900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.793663][T23900] Call Trace: [ 440.796981][T23900] dump_stack+0x1fb/0x318 [ 440.801311][T23900] should_fail+0x555/0x770 [ 440.805739][T23900] __should_failslab+0x11a/0x160 [ 440.810683][T23900] ? security_file_alloc+0x36/0x200 [ 440.815872][T23900] should_failslab+0x9/0x20 [ 440.821173][T23900] kmem_cache_alloc+0x56/0x2e0 [ 440.825937][T23900] security_file_alloc+0x36/0x200 [ 440.830956][T23900] __alloc_file+0xde/0x390 [ 440.835363][T23900] alloc_empty_file+0xac/0x1b0 [ 440.840119][T23900] alloc_file+0x60/0x4c0 [ 440.844441][T23900] alloc_file_pseudo+0x1d4/0x260 [ 440.849376][T23900] __shmem_file_setup+0x1a2/0x280 [ 440.854392][T23900] shmem_file_setup+0x2f/0x40 [ 440.859055][T23900] __se_sys_memfd_create+0x28e/0x4b0 [ 440.864346][T23900] ? do_syscall_64+0x1d/0x1c0 [ 440.869028][T23900] __x64_sys_memfd_create+0x5b/0x70 [ 440.874212][T23900] do_syscall_64+0xf7/0x1c0 [ 440.878699][T23900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.884573][T23900] RIP: 0033:0x45a219 [ 440.888459][T23900] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 440.908225][T23900] RSP: 002b:00007f3eb565fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 440.916626][T23900] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 440.924623][T23900] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 440.933359][T23900] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 440.941321][T23900] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f3eb56606d4 [ 440.949285][T23900] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 440.957276][T23902] CPU: 1 PID: 23902 Comm: syz-executor.0 Not tainted 5.4.0-rc7 #0 [ 440.965090][T23902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.975156][T23902] Call Trace: [ 440.978449][T23902] dump_stack+0x1fb/0x318 [ 440.982783][T23902] should_fail+0x555/0x770 [ 440.987252][T23902] __should_failslab+0x11a/0x160 [ 440.992256][T23902] ? __kernfs_new_node+0x97/0x6b0 [ 440.997288][T23902] should_failslab+0x9/0x20 [ 441.001969][T23902] kmem_cache_alloc+0x56/0x2e0 [ 441.006715][T23902] __kernfs_new_node+0x97/0x6b0 [ 441.011560][T23902] ? __kasan_check_write+0x14/0x20 [ 441.016671][T23902] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 441.022342][T23902] kernfs_new_node+0x97/0x170 [ 441.027200][T23902] __kernfs_create_file+0x4a/0x2f0 [ 441.032318][T23902] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 441.037679][T23902] internal_create_group+0x4be/0xd80 [ 441.042953][T23902] sysfs_create_group+0x1f/0x30 [ 441.047803][T23902] loop_set_fd+0xf54/0x1470 [ 441.052305][T23902] lo_ioctl+0xd5/0x2200 [ 441.056446][T23902] ? __kasan_slab_free+0x12a/0x1e0 [ 441.061538][T23902] ? kasan_slab_free+0xe/0x10 [ 441.066193][T23902] ? kfree+0x115/0x200 [ 441.070248][T23902] ? tomoyo_path_number_perm+0x4e1/0x640 [ 441.075867][T23902] ? tomoyo_file_ioctl+0x23/0x30 [ 441.080800][T23902] ? security_file_ioctl+0x6d/0xd0 [ 441.085907][T23902] ? __x64_sys_ioctl+0xa3/0x120 [ 441.090750][T23902] ? do_syscall_64+0xf7/0x1c0 [ 441.095425][T23902] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.101581][T23902] ? debug_check_no_obj_freed+0x505/0x5b0 [ 441.107301][T23902] ? rcu_lock_release+0x9/0x30 [ 441.112114][T23902] ? rcu_lock_release+0x9/0x30 [ 441.116881][T23902] ? lo_release+0x1f0/0x1f0 [ 441.121376][T23902] blkdev_ioctl+0x807/0x2980 [ 441.125967][T23902] ? tomoyo_path_number_perm+0x53e/0x640 [ 441.131596][T23902] block_ioctl+0xbd/0x100 [ 441.135915][T23902] ? blkdev_iopoll+0x100/0x100 [ 441.140674][T23902] do_vfs_ioctl+0x744/0x1730 [ 441.145283][T23902] ? __fget+0x411/0x510 [ 441.149432][T23902] ? tomoyo_file_ioctl+0x23/0x30 [ 441.154365][T23902] ? security_file_ioctl+0xa1/0xd0 [ 441.159464][T23902] __x64_sys_ioctl+0xe3/0x120 [ 441.164146][T23902] do_syscall_64+0xf7/0x1c0 [ 441.168641][T23902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.174521][T23902] RIP: 0033:0x45a087 [ 441.178408][T23902] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 441.198091][T23902] RSP: 002b:00007f5107f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 441.206501][T23902] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 441.214459][T23902] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 02:44:18 executing program 2 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 441.222456][T23902] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 441.230443][T23902] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 441.238400][T23902] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 441.326782][T23917] FAULT_INJECTION: forcing a failure. [ 441.326782][T23917] name failslab, interval 1, probability 0, space 0, times 0 [ 441.340865][T23917] CPU: 0 PID: 23917 Comm: syz-executor.2 Not tainted 5.4.0-rc7 #0 [ 441.348811][T23917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.358905][T23917] Call Trace: [ 441.362205][T23917] dump_stack+0x1fb/0x318 [ 441.366548][T23917] should_fail+0x555/0x770 [ 441.370970][T23917] __should_failslab+0x11a/0x160 [ 441.370985][T23917] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 441.371000][T23917] should_failslab+0x9/0x20 [ 441.381637][T23917] __kmalloc+0x7a/0x340 [ 441.381650][T23917] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 441.381664][T23917] tomoyo_realpath_from_path+0xdc/0x7c0 [ 441.381683][T23917] tomoyo_path_perm+0x192/0x850 [ 441.381730][T23917] tomoyo_path_truncate+0x1c/0x20 [ 441.381739][T23917] security_path_truncate+0xd5/0x150 [ 441.381753][T23917] do_sys_ftruncate+0x493/0x710 [ 441.381767][T23917] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 441.381778][T23917] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 441.381786][T23917] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 441.381795][T23917] ? do_syscall_64+0x1d/0x1c0 [ 441.381806][T23917] __x64_sys_ftruncate+0x60/0x70 [ 441.381818][T23917] do_syscall_64+0xf7/0x1c0 [ 441.453150][T23917] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.459020][T23917] RIP: 0033:0x45a1e7 [ 441.462903][T23917] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 441.482485][T23917] RSP: 002b:00007f3eb565fa88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 441.490884][T23917] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a1e7 [ 441.498834][T23917] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000004 [ 441.506809][T23917] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 441.514780][T23917] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 441.522731][T23917] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 441.537736][T23917] ERROR: Out of memory at tomoyo_realpath_from_path. 02:44:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf/\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='\\trfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x1f000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d71", 0xbd, 0x10000}], 0x0, 0x0) 02:44:18 executing program 2 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 442.019777][T23956] FAULT_INJECTION: forcing a failure. [ 442.019777][T23956] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 442.033048][T23956] CPU: 1 PID: 23956 Comm: syz-executor.2 Not tainted 5.4.0-rc7 #0 [ 442.040865][T23956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.050919][T23956] Call Trace: [ 442.054220][T23956] dump_stack+0x1fb/0x318 [ 442.058568][T23956] should_fail+0x555/0x770 [ 442.062997][T23956] should_fail_alloc_page+0x55/0x60 [ 442.068197][T23956] prepare_alloc_pages+0x283/0x460 [ 442.073314][T23956] __alloc_pages_nodemask+0xb2/0x5d0 [ 442.078636][T23956] kmem_getpages+0x4d/0xa00 [ 442.083169][T23956] cache_grow_begin+0x7e/0x2c0 [ 442.087943][T23956] cache_alloc_refill+0x311/0x3f0 [ 442.092968][T23956] ? check_preemption_disabled+0xb7/0x2a0 [ 442.098685][T23956] __kmalloc+0x318/0x340 [ 442.103009][T23956] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 442.103021][T23956] tomoyo_realpath_from_path+0xdc/0x7c0 [ 442.103038][T23956] tomoyo_path_perm+0x192/0x850 02:44:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='b%rfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 442.103073][T23956] tomoyo_path_truncate+0x1c/0x20 [ 442.103083][T23956] security_path_truncate+0xd5/0x150 [ 442.103097][T23956] do_sys_ftruncate+0x493/0x710 [ 442.114325][T23956] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 442.124178][T23956] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 442.124190][T23956] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 442.124200][T23956] ? do_syscall_64+0x1d/0x1c0 [ 442.124215][T23956] __x64_sys_ftruncate+0x60/0x70 [ 442.124227][T23956] do_syscall_64+0xf7/0x1c0 [ 442.124242][T23956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.124255][T23956] RIP: 0033:0x45a1e7 [ 442.134379][T23956] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 442.134385][T23956] RSP: 002b:00007f3eb565fa88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 442.134396][T23956] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a1e7 [ 442.134402][T23956] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000004 [ 442.134409][T23956] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 442.134415][T23956] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 442.134421][T23956] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='\x02trfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='b\\rfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfL\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe}], 0x0, 0x0) 02:44:19 executing program 2 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x20000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='%trfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe}], 0x0, 0x0) 02:44:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='bt\\fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 442.867609][T24010] FAULT_INJECTION: forcing a failure. [ 442.867609][T24010] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 442.899728][T24010] CPU: 1 PID: 24010 Comm: syz-executor.2 Not tainted 5.4.0-rc7 #0 [ 442.907586][T24010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.907604][T24010] Call Trace: [ 442.907620][T24010] dump_stack+0x1fb/0x318 [ 442.907635][T24010] should_fail+0x555/0x770 [ 442.920991][T24010] should_fail_alloc_page+0x55/0x60 [ 442.921001][T24010] prepare_alloc_pages+0x283/0x460 [ 442.921014][T24010] __alloc_pages_nodemask+0xb2/0x5d0 [ 442.921034][T24010] alloc_pages_vma+0x4f7/0xd50 [ 442.921050][T24010] shmem_alloc_and_acct_page+0x425/0xbb0 [ 442.929775][T24010] shmem_getpage_gfp+0x2313/0x2a90 [ 442.929810][T24010] shmem_write_begin+0xcb/0x1b0 [ 442.940067][T24010] generic_perform_write+0x25d/0x4e0 [ 442.940091][T24010] __generic_file_write_iter+0x235/0x500 [ 442.940106][T24010] generic_file_write_iter+0x48e/0x630 [ 442.940126][T24010] __vfs_write+0x5a1/0x740 [ 442.950145][T24010] vfs_write+0x275/0x590 [ 442.950162][T24010] __x64_sys_pwrite64+0x162/0x1d0 [ 442.950178][T24010] do_syscall_64+0xf7/0x1c0 [ 442.950193][T24010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.960892][T24010] RIP: 0033:0x414017 [ 442.960904][T24010] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 442.960909][T24010] RSP: 002b:00007f3eb565fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 442.960919][T24010] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000414017 [ 442.960925][T24010] RDX: 0000000000000048 RSI: 0000000020000240 RDI: 0000000000000004 [ 442.960930][T24010] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 442.960936][T24010] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 442.960941][T24010] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:20 executing program 2 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe}], 0x0, 0x0) 02:44:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btr%s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='\\trfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 443.444698][T24042] FAULT_INJECTION: forcing a failure. [ 443.444698][T24042] name failslab, interval 1, probability 0, space 0, times 0 [ 443.457329][T24042] CPU: 0 PID: 24042 Comm: syz-executor.2 Not tainted 5.4.0-rc7 #0 [ 443.465130][T24042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.475194][T24042] Call Trace: [ 443.478470][T24042] dump_stack+0x1fb/0x318 [ 443.482792][T24042] should_fail+0x555/0x770 [ 443.487216][T24042] __should_failslab+0x11a/0x160 [ 443.492278][T24042] ? xas_create+0x1197/0x1910 [ 443.496949][T24042] should_failslab+0x9/0x20 [ 443.501462][T24042] kmem_cache_alloc+0x56/0x2e0 [ 443.506219][T24042] xas_create+0x1197/0x1910 [ 443.510816][T24042] xas_create_range+0x142/0x700 [ 443.515767][T24042] shmem_add_to_page_cache+0x91e/0x1290 [ 443.521333][T24042] shmem_getpage_gfp+0x121e/0x2a90 [ 443.526447][T24042] shmem_write_begin+0xcb/0x1b0 [ 443.531279][T24042] generic_perform_write+0x25d/0x4e0 [ 443.536553][T24042] __generic_file_write_iter+0x235/0x500 [ 443.542185][T24042] generic_file_write_iter+0x48e/0x630 [ 443.547665][T24042] __vfs_write+0x5a1/0x740 [ 443.552137][T24042] vfs_write+0x275/0x590 [ 443.556396][T24042] __x64_sys_pwrite64+0x162/0x1d0 [ 443.561411][T24042] do_syscall_64+0xf7/0x1c0 [ 443.565923][T24042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.571792][T24042] RIP: 0033:0x414017 [ 443.575663][T24042] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 443.595262][T24042] RSP: 002b:00007f3eb565fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 443.603679][T24042] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000414017 [ 443.611648][T24042] RDX: 0000000000000048 RSI: 0000000020000240 RDI: 0000000000000004 [ 443.619611][T24042] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 443.627580][T24042] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 443.635786][T24042] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:20 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x25000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:20 executing program 2 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btr\\s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 444.061600][T24078] FAULT_INJECTION: forcing a failure. [ 444.061600][T24078] name failslab, interval 1, probability 0, space 0, times 0 [ 444.079111][T24078] CPU: 1 PID: 24078 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 444.087042][T24078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.097082][T24078] Call Trace: [ 444.100356][T24078] dump_stack+0x1fb/0x318 [ 444.104694][T24078] should_fail+0x555/0x770 [ 444.109127][T24078] __should_failslab+0x11a/0x160 [ 444.114062][T24078] ? __se_sys_memfd_create+0x10a/0x4b0 [ 444.119696][T24078] should_failslab+0x9/0x20 [ 444.124278][T24078] __kmalloc+0x7a/0x340 [ 444.128587][T24078] __se_sys_memfd_create+0x10a/0x4b0 [ 444.133868][T24078] ? do_syscall_64+0x1d/0x1c0 [ 444.138535][T24078] __x64_sys_memfd_create+0x5b/0x70 [ 444.143738][T24078] do_syscall_64+0xf7/0x1c0 [ 444.148223][T24078] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.154093][T24078] RIP: 0033:0x45a219 [ 444.157974][T24078] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 444.177564][T24078] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 444.185974][T24078] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 444.193923][T24078] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 444.201871][T24078] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 02:44:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf\\\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='b%rfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 444.209903][T24078] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9f02bda6d4 [ 444.217849][T24078] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 444.329988][T24090] FAULT_INJECTION: forcing a failure. [ 444.329988][T24090] name failslab, interval 1, probability 0, space 0, times 0 [ 444.342724][T24090] CPU: 1 PID: 24090 Comm: syz-executor.2 Not tainted 5.4.0-rc7 #0 [ 444.350526][T24090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.360583][T24090] Call Trace: [ 444.363882][T24090] dump_stack+0x1fb/0x318 [ 444.368229][T24090] should_fail+0x555/0x770 [ 444.372693][T24090] __should_failslab+0x11a/0x160 02:44:21 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 444.377653][T24090] ? xas_create+0x1197/0x1910 [ 444.382337][T24090] should_failslab+0x9/0x20 [ 444.386874][T24090] kmem_cache_alloc+0x56/0x2e0 [ 444.391642][T24090] xas_create+0x1197/0x1910 [ 444.396155][T24090] xas_create_range+0x142/0x700 [ 444.401015][T24090] shmem_add_to_page_cache+0x91e/0x1290 [ 444.406579][T24090] shmem_getpage_gfp+0x121e/0x2a90 [ 444.411724][T24090] shmem_write_begin+0xcb/0x1b0 [ 444.416582][T24090] generic_perform_write+0x25d/0x4e0 [ 444.421876][T24090] __generic_file_write_iter+0x235/0x500 [ 444.427518][T24090] generic_file_write_iter+0x48e/0x630 [ 444.432990][T24090] __vfs_write+0x5a1/0x740 [ 444.437400][T24090] vfs_write+0x275/0x590 [ 444.441651][T24090] __x64_sys_pwrite64+0x162/0x1d0 [ 444.446736][T24090] do_syscall_64+0xf7/0x1c0 [ 444.451258][T24090] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.457145][T24090] RIP: 0033:0x414017 [ 444.461016][T24090] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 444.480606][T24090] RSP: 002b:00007f3eb565fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 444.489010][T24090] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000414017 [ 444.496968][T24090] RDX: 0000000000000048 RSI: 0000000020000240 RDI: 0000000000000004 [ 444.505016][T24090] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 444.512965][T24090] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 444.520921][T24090] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 444.604441][T24106] FAULT_INJECTION: forcing a failure. [ 444.604441][T24106] name failslab, interval 1, probability 0, space 0, times 0 [ 444.665365][T24106] CPU: 1 PID: 24106 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 444.673205][T24106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.683275][T24106] Call Trace: [ 444.686575][T24106] dump_stack+0x1fb/0x318 [ 444.690917][T24106] should_fail+0x555/0x770 [ 444.695345][T24106] __should_failslab+0x11a/0x160 [ 444.700292][T24106] ? shmem_alloc_inode+0x1b/0x40 [ 444.705233][T24106] should_failslab+0x9/0x20 [ 444.709748][T24106] kmem_cache_alloc+0x56/0x2e0 02:44:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='b\\rfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 444.714511][T24106] ? shmem_match+0x180/0x180 [ 444.719095][T24106] shmem_alloc_inode+0x1b/0x40 [ 444.723854][T24106] ? shmem_match+0x180/0x180 [ 444.728444][T24106] new_inode_pseudo+0x68/0x240 [ 444.733354][T24106] new_inode+0x28/0x1c0 [ 444.737491][T24106] ? __kasan_check_read+0x11/0x20 [ 444.742573][T24106] shmem_get_inode+0x108/0x6e0 [ 444.747346][T24106] __shmem_file_setup+0x129/0x280 [ 444.752377][T24106] shmem_file_setup+0x2f/0x40 [ 444.757058][T24106] __se_sys_memfd_create+0x28e/0x4b0 [ 444.762331][T24106] ? do_syscall_64+0x1d/0x1c0 [ 444.766998][T24106] __x64_sys_memfd_create+0x5b/0x70 [ 444.772192][T24106] do_syscall_64+0xf7/0x1c0 [ 444.776673][T24106] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.782547][T24106] RIP: 0033:0x45a219 [ 444.786438][T24106] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 444.806308][T24106] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 444.814697][T24106] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 444.822653][T24106] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 444.830602][T24106] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 444.838551][T24106] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9f02bda6d4 [ 444.846496][T24106] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:21 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:21 executing program 2 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x3c0f0000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 445.051466][T24126] FAULT_INJECTION: forcing a failure. [ 445.051466][T24126] name failslab, interval 1, probability 0, space 0, times 0 [ 445.127200][T24136] FAULT_INJECTION: forcing a failure. [ 445.127200][T24136] name failslab, interval 1, probability 0, space 0, times 0 [ 445.129248][T24126] CPU: 1 PID: 24126 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 445.147632][T24126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.157790][T24126] Call Trace: [ 445.161075][T24126] dump_stack+0x1fb/0x318 [ 445.165402][T24126] should_fail+0x555/0x770 [ 445.169901][T24126] __should_failslab+0x11a/0x160 [ 445.174820][T24126] ? security_inode_alloc+0x36/0x1e0 [ 445.180081][T24126] should_failslab+0x9/0x20 [ 445.184563][T24126] kmem_cache_alloc+0x56/0x2e0 [ 445.189304][T24126] ? rcu_read_lock_sched_held+0x10b/0x170 [ 445.195011][T24126] security_inode_alloc+0x36/0x1e0 [ 445.200117][T24126] inode_init_always+0x3b5/0x920 [ 445.205036][T24126] ? shmem_match+0x180/0x180 [ 445.209608][T24126] new_inode_pseudo+0x7f/0x240 [ 445.214349][T24126] new_inode+0x28/0x1c0 [ 445.218487][T24126] ? __kasan_check_read+0x11/0x20 [ 445.223493][T24126] shmem_get_inode+0x108/0x6e0 [ 445.228239][T24126] __shmem_file_setup+0x129/0x280 [ 445.233256][T24126] shmem_file_setup+0x2f/0x40 [ 445.237926][T24126] __se_sys_memfd_create+0x28e/0x4b0 [ 445.243193][T24126] ? do_syscall_64+0x1d/0x1c0 [ 445.247861][T24126] __x64_sys_memfd_create+0x5b/0x70 [ 445.253040][T24126] do_syscall_64+0xf7/0x1c0 [ 445.257524][T24126] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.263395][T24126] RIP: 0033:0x45a219 [ 445.267268][T24126] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 445.286852][T24126] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 445.295238][T24126] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 445.303324][T24126] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 445.311299][T24126] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 445.319257][T24126] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9f02bda6d4 [ 445.327229][T24126] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 445.335210][T24136] CPU: 0 PID: 24136 Comm: syz-executor.2 Not tainted 5.4.0-rc7 #0 [ 445.343010][T24136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.353157][T24136] Call Trace: [ 445.356456][T24136] dump_stack+0x1fb/0x318 [ 445.360800][T24136] should_fail+0x555/0x770 [ 445.365240][T24136] __should_failslab+0x11a/0x160 [ 445.370188][T24136] ? xas_create+0x1197/0x1910 [ 445.374876][T24136] should_failslab+0x9/0x20 [ 445.379387][T24136] kmem_cache_alloc+0x56/0x2e0 [ 445.384165][T24136] xas_create+0x1197/0x1910 [ 445.388682][T24136] xas_create_range+0x142/0x700 [ 445.388707][T24136] shmem_add_to_page_cache+0x91e/0x1290 [ 445.388732][T24136] shmem_getpage_gfp+0x121e/0x2a90 [ 445.404260][T24136] shmem_write_begin+0xcb/0x1b0 [ 445.409116][T24136] generic_perform_write+0x25d/0x4e0 [ 445.414449][T24136] __generic_file_write_iter+0x235/0x500 [ 445.420096][T24136] generic_file_write_iter+0x48e/0x630 [ 445.425571][T24136] __vfs_write+0x5a1/0x740 [ 445.430009][T24136] vfs_write+0x275/0x590 [ 445.434259][T24136] __x64_sys_pwrite64+0x162/0x1d0 [ 445.439288][T24136] do_syscall_64+0xf7/0x1c0 [ 445.443804][T24136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.449699][T24136] RIP: 0033:0x414017 [ 445.453589][T24136] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 02:44:22 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 445.473189][T24136] RSP: 002b:00007f3eb565fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 445.473200][T24136] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000414017 [ 445.473210][T24136] RDX: 0000000000000048 RSI: 0000000020000240 RDI: 0000000000000004 [ 445.473216][T24136] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 445.473222][T24136] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 445.473227][T24136] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='bt\\fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 445.628848][T24151] FAULT_INJECTION: forcing a failure. [ 445.628848][T24151] name failslab, interval 1, probability 0, space 0, times 0 [ 445.641992][T24151] CPU: 0 PID: 24151 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 445.649804][T24151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.659863][T24151] Call Trace: [ 445.663161][T24151] dump_stack+0x1fb/0x318 [ 445.667691][T24151] should_fail+0x555/0x770 [ 445.672117][T24151] __should_failslab+0x11a/0x160 [ 445.677051][T24151] ? __d_alloc+0x2d/0x6e0 [ 445.681383][T24151] should_failslab+0x9/0x20 [ 445.685890][T24151] kmem_cache_alloc+0x56/0x2e0 [ 445.690659][T24151] __d_alloc+0x2d/0x6e0 [ 445.694831][T24151] ? lockdep_init_map+0x2a/0x680 [ 445.699764][T24151] d_alloc_pseudo+0x1d/0x70 [ 445.704271][T24151] alloc_file_pseudo+0xc3/0x260 [ 445.709120][T24151] __shmem_file_setup+0x1a2/0x280 [ 445.714139][T24151] shmem_file_setup+0x2f/0x40 [ 445.718804][T24151] __se_sys_memfd_create+0x28e/0x4b0 [ 445.724084][T24151] ? do_syscall_64+0x1d/0x1c0 [ 445.728758][T24151] __x64_sys_memfd_create+0x5b/0x70 [ 445.733962][T24151] do_syscall_64+0xf7/0x1c0 [ 445.738453][T24151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.744333][T24151] RIP: 0033:0x45a219 [ 445.748216][T24151] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 445.767810][T24151] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 02:44:22 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 445.776215][T24151] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 445.784195][T24151] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 445.792206][T24151] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 445.800180][T24151] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9f02bda6d4 [ 445.808164][T24151] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 445.997946][T24160] FAULT_INJECTION: forcing a failure. [ 445.997946][T24160] name failslab, interval 1, probability 0, space 0, times 0 [ 446.085288][T24160] CPU: 0 PID: 24160 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 446.093128][T24160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.103185][T24160] Call Trace: [ 446.106477][T24160] dump_stack+0x1fb/0x318 [ 446.106495][T24160] should_fail+0x555/0x770 [ 446.106512][T24160] __should_failslab+0x11a/0x160 [ 446.115229][T24160] ? __alloc_file+0x2c/0x390 [ 446.115242][T24160] should_failslab+0x9/0x20 [ 446.115258][T24160] kmem_cache_alloc+0x56/0x2e0 [ 446.124748][T24160] __alloc_file+0x2c/0x390 [ 446.124763][T24160] alloc_empty_file+0xac/0x1b0 [ 446.124776][T24160] alloc_file+0x60/0x4c0 [ 446.147408][T24160] alloc_file_pseudo+0x1d4/0x260 [ 446.152351][T24160] __shmem_file_setup+0x1a2/0x280 [ 446.157378][T24160] shmem_file_setup+0x2f/0x40 [ 446.157393][T24160] __se_sys_memfd_create+0x28e/0x4b0 [ 446.157407][T24160] ? do_syscall_64+0x1d/0x1c0 [ 446.172009][T24160] __x64_sys_memfd_create+0x5b/0x70 [ 446.177214][T24160] do_syscall_64+0xf7/0x1c0 02:44:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:23 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 446.181712][T24160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.181722][T24160] RIP: 0033:0x45a219 [ 446.181732][T24160] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 446.181736][T24160] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 446.181745][T24160] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 446.181750][T24160] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 446.181756][T24160] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 446.181762][T24160] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9f02bda6d4 [ 446.181767][T24160] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x3f000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 446.380732][T24182] FAULT_INJECTION: forcing a failure. [ 446.380732][T24182] name failslab, interval 1, probability 0, space 0, times 0 [ 446.399541][T24182] CPU: 0 PID: 24182 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 446.407385][T24182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.407390][T24182] Call Trace: [ 446.407411][T24182] dump_stack+0x1fb/0x318 [ 446.407428][T24182] should_fail+0x555/0x770 [ 446.407455][T24182] __should_failslab+0x11a/0x160 [ 446.434488][T24182] ? security_file_alloc+0x36/0x200 [ 446.439688][T24182] should_failslab+0x9/0x20 [ 446.439702][T24182] kmem_cache_alloc+0x56/0x2e0 [ 446.439717][T24182] security_file_alloc+0x36/0x200 [ 446.439730][T24182] __alloc_file+0xde/0x390 [ 446.439743][T24182] alloc_empty_file+0xac/0x1b0 [ 446.439752][T24182] alloc_file+0x60/0x4c0 [ 446.439764][T24182] alloc_file_pseudo+0x1d4/0x260 [ 446.439782][T24182] __shmem_file_setup+0x1a2/0x280 [ 446.439793][T24182] shmem_file_setup+0x2f/0x40 [ 446.439805][T24182] __se_sys_memfd_create+0x28e/0x4b0 [ 446.439819][T24182] ? do_syscall_64+0x1d/0x1c0 [ 446.449071][T24182] __x64_sys_memfd_create+0x5b/0x70 [ 446.449085][T24182] do_syscall_64+0xf7/0x1c0 [ 446.449101][T24182] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.449110][T24182] RIP: 0033:0x45a219 [ 446.449120][T24182] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:44:23 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 446.449125][T24182] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 446.449134][T24182] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a219 [ 446.449139][T24182] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 446.449144][T24182] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 446.449149][T24182] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9f02bda6d4 [ 446.449155][T24182] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btr%s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 446.688271][T24198] FAULT_INJECTION: forcing a failure. [ 446.688271][T24198] name failslab, interval 1, probability 0, space 0, times 0 [ 446.747485][T24198] CPU: 0 PID: 24198 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 446.755319][T24198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.765358][T24198] Call Trace: [ 446.768635][T24198] dump_stack+0x1fb/0x318 [ 446.772976][T24198] should_fail+0x555/0x770 [ 446.777382][T24198] __should_failslab+0x11a/0x160 [ 446.782302][T24198] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 446.787998][T24198] should_failslab+0x9/0x20 [ 446.792482][T24198] __kmalloc+0x7a/0x340 [ 446.796616][T24198] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 446.802315][T24198] tomoyo_realpath_from_path+0xdc/0x7c0 [ 446.807840][T24198] tomoyo_path_perm+0x192/0x850 [ 446.812700][T24198] tomoyo_path_truncate+0x1c/0x20 [ 446.817720][T24198] security_path_truncate+0xd5/0x150 [ 446.822997][T24198] do_sys_ftruncate+0x493/0x710 [ 446.827848][T24198] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 446.833567][T24198] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 446.839021][T24198] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 446.844752][T24198] ? do_syscall_64+0x1d/0x1c0 [ 446.849434][T24198] __x64_sys_ftruncate+0x60/0x70 [ 446.854363][T24198] do_syscall_64+0xf7/0x1c0 [ 446.858849][T24198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.864723][T24198] RIP: 0033:0x45a1e7 [ 446.868594][T24198] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 446.888179][T24198] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d 02:44:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='%trfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 446.896584][T24198] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a1e7 [ 446.904565][T24198] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000004 [ 446.912522][T24198] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 446.920479][T24198] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 446.928453][T24198] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 446.939047][T24198] ERROR: Out of memory at tomoyo_realpath_from_path. 02:44:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfh\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:24 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 447.220863][T24224] FAULT_INJECTION: forcing a failure. [ 447.220863][T24224] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 447.234111][T24224] CPU: 1 PID: 24224 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 447.241916][T24224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.251969][T24224] Call Trace: [ 447.255324][T24224] dump_stack+0x1fb/0x318 [ 447.259655][T24224] should_fail+0x555/0x770 [ 447.264076][T24224] should_fail_alloc_page+0x55/0x60 [ 447.264088][T24224] prepare_alloc_pages+0x283/0x460 [ 447.264105][T24224] __alloc_pages_nodemask+0xb2/0x5d0 [ 447.264124][T24224] kmem_getpages+0x4d/0xa00 [ 447.264136][T24224] cache_grow_begin+0x7e/0x2c0 [ 447.274436][T24224] cache_alloc_refill+0x311/0x3f0 [ 447.274449][T24224] ? check_preemption_disabled+0xb7/0x2a0 [ 447.274466][T24224] __kmalloc+0x318/0x340 [ 447.274477][T24224] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 447.274491][T24224] tomoyo_realpath_from_path+0xdc/0x7c0 [ 447.274514][T24224] tomoyo_path_perm+0x192/0x850 [ 447.320156][T24224] tomoyo_path_truncate+0x1c/0x20 [ 447.325164][T24224] security_path_truncate+0xd5/0x150 [ 447.330439][T24224] do_sys_ftruncate+0x493/0x710 [ 447.335283][T24224] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 447.340991][T24224] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 447.346439][T24224] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 447.352166][T24224] ? do_syscall_64+0x1d/0x1c0 [ 447.356827][T24224] __x64_sys_ftruncate+0x60/0x70 [ 447.361753][T24224] do_syscall_64+0xf7/0x1c0 [ 447.366269][T24224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 447.372154][T24224] RIP: 0033:0x45a1e7 [ 447.376045][T24224] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 447.396946][T24224] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 447.396958][T24224] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a1e7 [ 447.396964][T24224] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000004 [ 447.396970][T24224] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 447.396976][T24224] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 447.396982][T24224] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x40000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='\\trfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:24 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 447.986681][T24273] FAULT_INJECTION: forcing a failure. [ 447.986681][T24273] name failslab, interval 1, probability 0, space 0, times 0 [ 448.075963][T24273] CPU: 0 PID: 24273 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 448.083802][T24273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.093856][T24273] Call Trace: [ 448.097154][T24273] dump_stack+0x1fb/0x318 [ 448.101501][T24273] should_fail+0x555/0x770 [ 448.101521][T24273] __should_failslab+0x11a/0x160 [ 448.101534][T24273] ? tomoyo_encode2+0x273/0x5a0 [ 448.101546][T24273] should_failslab+0x9/0x20 [ 448.101558][T24273] __kmalloc+0x7a/0x340 02:44:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='b%rfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 448.101572][T24273] tomoyo_encode2+0x273/0x5a0 [ 448.101586][T24273] ? dynamic_dname+0xf0/0xf0 [ 448.101598][T24273] tomoyo_realpath_from_path+0x769/0x7c0 [ 448.101614][T24273] tomoyo_path_perm+0x192/0x850 [ 448.101649][T24273] tomoyo_path_truncate+0x1c/0x20 [ 448.111482][T24273] security_path_truncate+0xd5/0x150 [ 448.111504][T24273] do_sys_ftruncate+0x493/0x710 [ 448.111519][T24273] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 448.111532][T24273] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 448.111539][T24273] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 448.111551][T24273] ? do_syscall_64+0x1d/0x1c0 [ 448.120863][T24273] __x64_sys_ftruncate+0x60/0x70 [ 448.120875][T24273] do_syscall_64+0xf7/0x1c0 [ 448.120890][T24273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 448.120900][T24273] RIP: 0033:0x45a1e7 [ 448.120910][T24273] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 448.120916][T24273] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 448.120925][T24273] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000045a1e7 [ 448.120931][T24273] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000004 [ 448.120936][T24273] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 448.120941][T24273] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 448.120946][T24273] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 448.139784][T24273] ERROR: Out of memory at tomoyo_realpath_from_path. 02:44:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x42450500, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:25 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='b\\rfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 448.667122][T24316] FAULT_INJECTION: forcing a failure. [ 448.667122][T24316] name failslab, interval 1, probability 0, space 0, times 0 [ 448.679883][T24316] CPU: 0 PID: 24316 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 448.679891][T24316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.679894][T24316] Call Trace: [ 448.679913][T24316] dump_stack+0x1fb/0x318 [ 448.679929][T24316] should_fail+0x555/0x770 [ 448.679948][T24316] __should_failslab+0x11a/0x160 [ 448.679960][T24316] ? xas_create+0x1197/0x1910 [ 448.679973][T24316] should_failslab+0x9/0x20 [ 448.679984][T24316] kmem_cache_alloc+0x56/0x2e0 [ 448.679996][T24316] xas_create+0x1197/0x1910 [ 448.680016][T24316] xas_create_range+0x142/0x700 [ 448.680036][T24316] shmem_add_to_page_cache+0x91e/0x1290 [ 448.680060][T24316] shmem_getpage_gfp+0x121e/0x2a90 [ 448.680091][T24316] shmem_write_begin+0xcb/0x1b0 [ 448.698009][T24316] generic_perform_write+0x25d/0x4e0 [ 448.698035][T24316] __generic_file_write_iter+0x235/0x500 [ 448.698050][T24316] generic_file_write_iter+0x48e/0x630 [ 448.698070][T24316] __vfs_write+0x5a1/0x740 [ 448.698093][T24316] vfs_write+0x275/0x590 [ 448.698112][T24316] __x64_sys_pwrite64+0x162/0x1d0 [ 448.698129][T24316] do_syscall_64+0xf7/0x1c0 [ 448.698143][T24316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 448.698154][T24316] RIP: 0033:0x414017 [ 448.698165][T24316] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 448.698171][T24316] RSP: 002b:00007f9f02bd9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 448.698180][T24316] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000414017 [ 448.698186][T24316] RDX: 00000000000000be RSI: 0000000020000240 RDI: 0000000000000004 [ 448.698191][T24316] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 448.698196][T24316] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 448.698202][T24316] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x5f000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:25 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btr\\s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 449.098605][T24338] FAULT_INJECTION: forcing a failure. [ 449.098605][T24338] name failslab, interval 1, probability 0, space 0, times 0 [ 449.111231][T24338] CPU: 0 PID: 24338 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 449.111239][T24338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.111243][T24338] Call Trace: [ 449.111260][T24338] dump_stack+0x1fb/0x318 [ 449.111277][T24338] should_fail+0x555/0x770 [ 449.111293][T24338] __should_failslab+0x11a/0x160 [ 449.111304][T24338] ? xas_create+0x1197/0x1910 [ 449.111315][T24338] should_failslab+0x9/0x20 [ 449.111330][T24338] kmem_cache_alloc+0x56/0x2e0 [ 449.146248][T24338] xas_create+0x1197/0x1910 [ 449.146275][T24338] xas_create_range+0x142/0x700 [ 449.146299][T24338] shmem_add_to_page_cache+0x91e/0x1290 [ 449.146322][T24338] shmem_getpage_gfp+0x121e/0x2a90 [ 449.155483][T24338] shmem_write_begin+0xcb/0x1b0 [ 449.155499][T24338] generic_perform_write+0x25d/0x4e0 [ 449.155522][T24338] __generic_file_write_iter+0x235/0x500 [ 449.155537][T24338] generic_file_write_iter+0x48e/0x630 [ 449.175130][T24338] __vfs_write+0x5a1/0x740 [ 449.175156][T24338] vfs_write+0x275/0x590 [ 449.175173][T24338] __x64_sys_pwrite64+0x162/0x1d0 [ 449.175190][T24338] do_syscall_64+0xf7/0x1c0 [ 449.185117][T24338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.185127][T24338] RIP: 0033:0x414017 [ 449.185138][T24338] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 449.185144][T24338] RSP: 002b:00007f9f02bd9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 449.185154][T24338] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000414017 [ 449.185160][T24338] RDX: 00000000000000be RSI: 0000000020000240 RDI: 0000000000000004 [ 449.185166][T24338] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 449.185171][T24338] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 449.185180][T24338] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='bt\\fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:26 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x60000000, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrf/\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 449.879789][T24390] FAULT_INJECTION: forcing a failure. [ 449.879789][T24390] name failslab, interval 1, probability 0, space 0, times 0 [ 449.964402][T24390] CPU: 1 PID: 24390 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 449.972254][T24390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.982324][T24390] Call Trace: [ 449.985612][T24390] dump_stack+0x1fb/0x318 [ 449.989942][T24390] should_fail+0x555/0x770 [ 449.994369][T24390] __should_failslab+0x11a/0x160 [ 449.999314][T24390] ? getname_flags+0xba/0x640 [ 450.004015][T24390] should_failslab+0x9/0x20 [ 450.008510][T24390] kmem_cache_alloc+0x56/0x2e0 [ 450.008522][T24390] ? check_preemption_disabled+0xb7/0x2a0 [ 450.008533][T24390] getname_flags+0xba/0x640 [ 450.008546][T24390] getname+0x19/0x20 [ 450.018997][T24390] do_sys_open+0x261/0x560 [ 450.019019][T24390] __x64_sys_open+0x87/0x90 [ 450.019033][T24390] do_syscall_64+0xf7/0x1c0 [ 450.019047][T24390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 450.019055][T24390] RIP: 0033:0x413fb1 [ 450.019064][T24390] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 450.019069][T24390] RSP: 002b:00007f9f02bd9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 450.019078][T24390] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413fb1 [ 450.019084][T24390] RDX: 00007f9f02bd9b0a RSI: 0000000000000002 RDI: 00007f9f02bd9b00 [ 450.019092][T24390] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 450.027457][T24390] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 02:44:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btr%s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:27 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 450.027463][T24390] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 450.182499][T24404] FAULT_INJECTION: forcing a failure. [ 450.182499][T24404] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 450.195740][T24404] CPU: 0 PID: 24404 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 450.203543][T24404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 450.213603][T24404] Call Trace: [ 450.216986][T24404] dump_stack+0x1fb/0x318 [ 450.221324][T24404] should_fail+0x555/0x770 [ 450.225749][T24404] should_fail_alloc_page+0x55/0x60 [ 450.230959][T24404] prepare_alloc_pages+0x283/0x460 [ 450.236068][T24404] __alloc_pages_nodemask+0xb2/0x5d0 [ 450.241348][T24404] ? __kasan_check_write+0x14/0x20 [ 450.246913][T24404] kmem_getpages+0x4d/0xa00 [ 450.251412][T24404] cache_grow_begin+0x7e/0x2c0 [ 450.251427][T24404] cache_alloc_refill+0x311/0x3f0 [ 450.261177][T24404] ? check_preemption_disabled+0xb7/0x2a0 [ 450.261192][T24404] kmem_cache_alloc+0x2b9/0x2e0 [ 450.261199][T24404] ? getname_flags+0xba/0x640 [ 450.261209][T24404] getname_flags+0xba/0x640 [ 450.261220][T24404] getname+0x19/0x20 [ 450.261230][T24404] do_sys_open+0x261/0x560 [ 450.261244][T24404] __x64_sys_open+0x87/0x90 [ 450.261256][T24404] do_syscall_64+0xf7/0x1c0 [ 450.261270][T24404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 450.261279][T24404] RIP: 0033:0x413fb1 [ 450.261290][T24404] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 450.261296][T24404] RSP: 002b:00007f9f02bd9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 450.261304][T24404] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413fb1 [ 450.261310][T24404] RDX: 00007f9f02bd9b0a RSI: 0000000000000002 RDI: 00007f9f02bd9b00 [ 450.261315][T24404] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 450.261324][T24404] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 450.370199][T24404] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:27 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrft\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 450.738469][T24439] FAULT_INJECTION: forcing a failure. [ 450.738469][T24439] name failslab, interval 1, probability 0, space 0, times 0 [ 450.768884][T24439] CPU: 0 PID: 24439 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 450.776761][T24439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 02:44:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x9effffff, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 450.786818][T24439] Call Trace: [ 450.790110][T24439] dump_stack+0x1fb/0x318 [ 450.794450][T24439] should_fail+0x555/0x770 [ 450.798988][T24439] __should_failslab+0x11a/0x160 [ 450.804147][T24439] ? __alloc_file+0x2c/0x390 [ 450.808755][T24439] should_failslab+0x9/0x20 [ 450.813254][T24439] kmem_cache_alloc+0x56/0x2e0 [ 450.818022][T24439] __alloc_file+0x2c/0x390 [ 450.822454][T24439] alloc_empty_file+0xac/0x1b0 [ 450.827327][T24439] path_openat+0x9e/0x4420 [ 450.831751][T24439] ? __kasan_kmalloc+0x178/0x1b0 [ 450.836702][T24439] ? __lock_acquire+0xc75/0x1be0 [ 450.842233][T24439] ? rcu_read_lock_sched_held+0x10b/0x170 [ 450.848065][T24439] do_filp_open+0x192/0x3d0 [ 450.852577][T24439] ? _raw_spin_unlock+0x2c/0x50 [ 450.857440][T24439] do_sys_open+0x29f/0x560 [ 450.861863][T24439] __x64_sys_open+0x87/0x90 [ 450.866369][T24439] do_syscall_64+0xf7/0x1c0 [ 450.870871][T24439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 450.876757][T24439] RIP: 0033:0x413fb1 [ 450.880634][T24439] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 450.900748][T24439] RSP: 002b:00007f9f02bd9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 450.909163][T24439] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413fb1 [ 450.917143][T24439] RDX: 00007f9f02bd9b0a RSI: 0000000000000002 RDI: 00007f9f02bd9b00 [ 450.925107][T24439] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 02:44:27 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 450.933069][T24439] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 450.941052][T24439] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 451.133500][T24463] FAULT_INJECTION: forcing a failure. [ 451.133500][T24463] name failslab, interval 1, probability 0, space 0, times 0 [ 451.180120][T24463] CPU: 0 PID: 24463 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 451.188400][T24463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.188405][T24463] Call Trace: [ 451.188422][T24463] dump_stack+0x1fb/0x318 [ 451.188439][T24463] should_fail+0x555/0x770 [ 451.188458][T24463] __should_failslab+0x11a/0x160 [ 451.215736][T24463] ? security_file_alloc+0x36/0x200 [ 451.220943][T24463] should_failslab+0x9/0x20 [ 451.225441][T24463] kmem_cache_alloc+0x56/0x2e0 [ 451.225458][T24463] security_file_alloc+0x36/0x200 [ 451.225472][T24463] __alloc_file+0xde/0x390 [ 451.225486][T24463] alloc_empty_file+0xac/0x1b0 [ 451.235240][T24463] path_openat+0x9e/0x4420 [ 451.235253][T24463] ? __kasan_kmalloc+0x178/0x1b0 [ 451.235269][T24463] ? __lock_acquire+0xc75/0x1be0 [ 451.235281][T24463] ? rcu_read_lock_sched_held+0x10b/0x170 [ 451.235314][T24463] do_filp_open+0x192/0x3d0 [ 451.248941][T24463] ? _raw_spin_unlock+0x2c/0x50 [ 451.248971][T24463] do_sys_open+0x29f/0x560 02:44:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfL\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:28 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 451.248986][T24463] __x64_sys_open+0x87/0x90 [ 451.248998][T24463] do_syscall_64+0xf7/0x1c0 [ 451.249009][T24463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 451.249018][T24463] RIP: 0033:0x413fb1 [ 451.249028][T24463] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 451.249033][T24463] RSP: 002b:00007f9f02bd9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 451.249041][T24463] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413fb1 [ 451.249047][T24463] RDX: 00007f9f02bd9b0a RSI: 0000000000000002 RDI: 00007f9f02bd9b00 [ 451.249052][T24463] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 451.249058][T24463] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 451.249064][T24463] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 451.386796][T24471] FAULT_INJECTION: forcing a failure. [ 451.386796][T24471] name failslab, interval 1, probability 0, space 0, times 0 [ 451.407058][T24471] CPU: 1 PID: 24471 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 451.414899][T24471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.414906][T24471] Call Trace: [ 451.414922][T24471] dump_stack+0x1fb/0x318 [ 451.414940][T24471] should_fail+0x555/0x770 [ 451.414959][T24471] __should_failslab+0x11a/0x160 [ 451.414972][T24471] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 451.414990][T24471] should_failslab+0x9/0x20 [ 451.428315][T24471] __kmalloc+0x7a/0x340 [ 451.437190][T24471] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 451.437204][T24471] tomoyo_realpath_from_path+0xdc/0x7c0 [ 451.437225][T24471] tomoyo_check_open_permission+0x1ce/0x9d0 [ 451.437263][T24471] tomoyo_file_open+0x141/0x190 [ 451.437275][T24471] security_file_open+0x65/0x2f0 [ 451.447889][T24471] do_dentry_open+0x351/0x10c0 [ 451.447912][T24471] vfs_open+0x73/0x80 [ 451.447925][T24471] path_openat+0x1397/0x4420 [ 451.447975][T24471] do_filp_open+0x192/0x3d0 [ 451.456608][T24471] do_sys_open+0x29f/0x560 [ 451.456626][T24471] __x64_sys_open+0x87/0x90 [ 451.456640][T24471] do_syscall_64+0xf7/0x1c0 [ 451.456655][T24471] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 451.456668][T24471] RIP: 0033:0x413fb1 [ 451.467896][T24471] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 451.467902][T24471] RSP: 002b:00007f9f02bd9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 451.467913][T24471] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413fb1 [ 451.467919][T24471] RDX: 00007f9f02bd9b0a RSI: 0000000000000002 RDI: 00007f9f02bd9b00 [ 451.467925][T24471] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 451.467931][T24471] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 451.467938][T24471] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 451.473412][T24471] ERROR: Out of memory at tomoyo_realpath_from_path. 02:44:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:28 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 452.030497][T24513] FAULT_INJECTION: forcing a failure. [ 452.030497][T24513] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 452.043740][T24513] CPU: 1 PID: 24513 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 452.043748][T24513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.043753][T24513] Call Trace: [ 452.043769][T24513] dump_stack+0x1fb/0x318 [ 452.043786][T24513] should_fail+0x555/0x770 [ 452.064942][T24513] should_fail_alloc_page+0x55/0x60 [ 452.078852][T24513] prepare_alloc_pages+0x283/0x460 [ 452.078868][T24513] __alloc_pages_nodemask+0xb2/0x5d0 [ 452.078889][T24513] kmem_getpages+0x4d/0xa00 [ 452.078902][T24513] cache_grow_begin+0x7e/0x2c0 [ 452.078915][T24513] cache_alloc_refill+0x311/0x3f0 [ 452.078926][T24513] ? check_preemption_disabled+0xb7/0x2a0 [ 452.078941][T24513] __kmalloc+0x318/0x340 [ 452.078951][T24513] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 452.078964][T24513] tomoyo_realpath_from_path+0xdc/0x7c0 [ 452.089332][T24513] tomoyo_check_open_permission+0x1ce/0x9d0 [ 452.089371][T24513] tomoyo_file_open+0x141/0x190 [ 452.089385][T24513] security_file_open+0x65/0x2f0 [ 452.089400][T24513] do_dentry_open+0x351/0x10c0 [ 452.089420][T24513] vfs_open+0x73/0x80 [ 452.089433][T24513] path_openat+0x1397/0x4420 [ 452.098731][T24513] do_filp_open+0x192/0x3d0 [ 452.098763][T24513] do_sys_open+0x29f/0x560 [ 452.109460][T24513] __x64_sys_open+0x87/0x90 [ 452.109475][T24513] do_syscall_64+0xf7/0x1c0 [ 452.109489][T24513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 452.109499][T24513] RIP: 0033:0x413fb1 [ 452.109509][T24513] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 452.109515][T24513] RSP: 002b:00007f9f02bd9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 452.109524][T24513] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413fb1 [ 452.109530][T24513] RDX: 00007f9f02bd9b0a RSI: 0000000000000002 RDI: 00007f9f02bd9b00 [ 452.109535][T24513] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 452.109540][T24513] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 452.109546][T24513] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btr\\s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xcf6478ee, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrf\\\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:29 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 452.783276][T24560] FAULT_INJECTION: forcing a failure. [ 452.783276][T24560] name failslab, interval 1, probability 0, space 0, times 0 [ 452.805356][T24560] CPU: 0 PID: 24560 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 452.813210][T24560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.823268][T24560] Call Trace: [ 452.826641][T24560] dump_stack+0x1fb/0x318 02:44:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 452.830975][T24560] should_fail+0x555/0x770 [ 452.835402][T24560] __should_failslab+0x11a/0x160 [ 452.840347][T24560] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 452.846073][T24560] should_failslab+0x9/0x20 [ 452.850574][T24560] __kmalloc+0x7a/0x340 [ 452.854807][T24560] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 452.860544][T24560] tomoyo_realpath_from_path+0xdc/0x7c0 [ 452.866139][T24560] tomoyo_path_number_perm+0x166/0x640 [ 452.871603][T24560] ? smack_file_ioctl+0x226/0x2e0 [ 452.876607][T24560] ? __fget+0x411/0x510 [ 452.880762][T24560] tomoyo_file_ioctl+0x23/0x30 [ 452.885514][T24560] security_file_ioctl+0x6d/0xd0 [ 452.890434][T24560] __x64_sys_ioctl+0xa3/0x120 [ 452.895092][T24560] do_syscall_64+0xf7/0x1c0 [ 452.899577][T24560] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 452.905460][T24560] RIP: 0033:0x45a087 [ 452.909332][T24560] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 452.928923][T24560] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 452.937329][T24560] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 452.945386][T24560] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 452.953960][T24560] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 452.962068][T24560] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 452.970164][T24560] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 452.979438][T24560] ERROR: Out of memory at tomoyo_realpath_from_path. 02:44:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xee7864cf, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfz\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:30 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 453.584352][T24606] FAULT_INJECTION: forcing a failure. [ 453.584352][T24606] name failslab, interval 1, probability 0, space 0, times 0 02:44:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 453.631211][T24606] CPU: 0 PID: 24606 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 453.639066][T24606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.649131][T24606] Call Trace: [ 453.652472][T24606] dump_stack+0x1fb/0x318 [ 453.656926][T24606] should_fail+0x555/0x770 [ 453.661462][T24606] __should_failslab+0x11a/0x160 [ 453.666399][T24606] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 453.672119][T24606] should_failslab+0x9/0x20 [ 453.676624][T24606] __kmalloc+0x7a/0x340 [ 453.681121][T24606] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 453.686842][T24606] tomoyo_realpath_from_path+0xdc/0x7c0 [ 453.686861][T24606] tomoyo_path_number_perm+0x166/0x640 [ 453.697847][T24606] ? smack_file_ioctl+0x226/0x2e0 [ 453.702869][T24606] ? __fget+0x411/0x510 [ 453.702888][T24606] tomoyo_file_ioctl+0x23/0x30 [ 453.702898][T24606] security_file_ioctl+0x6d/0xd0 [ 453.702912][T24606] __x64_sys_ioctl+0xa3/0x120 [ 453.716735][T24606] do_syscall_64+0xf7/0x1c0 [ 453.716751][T24606] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 453.716763][T24606] RIP: 0033:0x45a087 [ 453.725903][T24606] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 453.725909][T24606] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 453.725919][T24606] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 453.725926][T24606] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 02:44:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xefffffff, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 453.725932][T24606] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 453.725937][T24606] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 453.725942][T24606] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 453.743393][T24606] ERROR: Out of memory at tomoyo_realpath_from_path. 02:44:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf\xff\xff', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:31 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf/\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 454.381878][T24649] FAULT_INJECTION: forcing a failure. [ 454.381878][T24649] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 454.395139][T24649] CPU: 0 PID: 24649 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 454.395147][T24649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.395151][T24649] Call Trace: [ 454.395168][T24649] dump_stack+0x1fb/0x318 [ 454.395183][T24649] should_fail+0x555/0x770 [ 454.395200][T24649] should_fail_alloc_page+0x55/0x60 [ 454.430231][T24649] prepare_alloc_pages+0x283/0x460 [ 454.435351][T24649] __alloc_pages_nodemask+0xb2/0x5d0 [ 454.441017][T24649] ? stack_trace_save+0x150/0x150 [ 454.446136][T24649] kmem_getpages+0x4d/0xa00 [ 454.450636][T24649] cache_grow_begin+0x7e/0x2c0 [ 454.450652][T24649] cache_alloc_refill+0x311/0x3f0 [ 454.450664][T24649] ? check_preemption_disabled+0xb7/0x2a0 [ 454.450679][T24649] __kmalloc+0x318/0x340 [ 454.450688][T24649] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 454.450700][T24649] tomoyo_realpath_from_path+0xdc/0x7c0 [ 454.450717][T24649] tomoyo_path_number_perm+0x166/0x640 [ 454.450747][T24649] ? smack_file_ioctl+0x226/0x2e0 [ 454.492040][T24649] ? __fget+0x411/0x510 [ 454.496188][T24649] tomoyo_file_ioctl+0x23/0x30 [ 454.501197][T24649] security_file_ioctl+0x6d/0xd0 [ 454.506115][T24649] __x64_sys_ioctl+0xa3/0x120 [ 454.510908][T24649] do_syscall_64+0xf7/0x1c0 [ 454.515410][T24649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 454.521288][T24649] RIP: 0033:0x45a087 [ 454.525165][T24649] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 454.544867][T24649] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 454.553267][T24649] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 454.561222][T24649] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 454.569183][T24649] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 454.577138][T24649] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 454.585089][T24649] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xf0ffffff, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfh\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x02', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:32 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 455.298163][T24710] FAULT_INJECTION: forcing a failure. [ 455.298163][T24710] name failslab, interval 1, probability 0, space 0, times 0 [ 455.319258][T24710] CPU: 1 PID: 24710 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 455.327091][T24710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.327097][T24710] Call Trace: [ 455.327112][T24710] dump_stack+0x1fb/0x318 [ 455.327130][T24710] should_fail+0x555/0x770 [ 455.349174][T24710] __should_failslab+0x11a/0x160 [ 455.354112][T24710] ? __kernfs_new_node+0x97/0x6b0 [ 455.359137][T24710] should_failslab+0x9/0x20 [ 455.359148][T24710] kmem_cache_alloc+0x56/0x2e0 [ 455.359161][T24710] __kernfs_new_node+0x97/0x6b0 [ 455.359174][T24710] ? __kasan_check_write+0x14/0x20 [ 455.359184][T24710] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 455.359197][T24710] kernfs_new_node+0x97/0x170 [ 455.359211][T24710] __kernfs_create_file+0x4a/0x2f0 [ 455.368441][T24710] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 455.378437][T24710] internal_create_group+0x4be/0xd80 [ 455.388709][T24710] sysfs_create_group+0x1f/0x30 [ 455.399227][T24710] loop_set_fd+0xf54/0x1470 [ 455.399248][T24710] lo_ioctl+0xd5/0x2200 [ 455.399260][T24710] ? __kasan_slab_free+0x12a/0x1e0 [ 455.409331][T24710] ? kasan_slab_free+0xe/0x10 [ 455.409340][T24710] ? kfree+0x115/0x200 [ 455.409350][T24710] ? tomoyo_path_number_perm+0x4e1/0x640 [ 455.409361][T24710] ? tomoyo_file_ioctl+0x23/0x30 [ 455.417954][T24710] ? security_file_ioctl+0x6d/0xd0 [ 455.417966][T24710] ? __x64_sys_ioctl+0xa3/0x120 [ 455.427685][T24710] ? do_syscall_64+0xf7/0x1c0 [ 455.427699][T24710] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 455.437356][T24710] ? debug_check_no_obj_freed+0x505/0x5b0 [ 455.447356][T24710] ? rcu_lock_release+0x9/0x30 [ 455.457358][T24710] ? rcu_lock_release+0x9/0x30 [ 455.469092][T24710] ? lo_release+0x1f0/0x1f0 [ 455.469102][T24710] blkdev_ioctl+0x807/0x2980 [ 455.469120][T24710] ? tomoyo_path_number_perm+0x53e/0x640 [ 455.478612][T24710] block_ioctl+0xbd/0x100 [ 455.487648][T24710] ? blkdev_iopoll+0x100/0x100 [ 455.497598][T24710] do_vfs_ioctl+0x744/0x1730 [ 455.506887][T24710] ? __fget+0x411/0x510 [ 455.506903][T24710] ? tomoyo_file_ioctl+0x23/0x30 [ 455.515951][T24710] ? security_file_ioctl+0xa1/0xd0 [ 455.521049][T24710] __x64_sys_ioctl+0xe3/0x120 [ 455.521063][T24710] do_syscall_64+0xf7/0x1c0 [ 455.521075][T24710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 455.521086][T24710] RIP: 0033:0x45a087 02:44:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 455.530221][T24710] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 455.530227][T24710] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 455.530236][T24710] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 455.530242][T24710] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 455.530250][T24710] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 02:44:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xfeffffff, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 455.539979][T24710] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 455.539986][T24710] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfL\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x03', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:33 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xffffff7f, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 456.473132][T24767] FAULT_INJECTION: forcing a failure. [ 456.473132][T24767] name failslab, interval 1, probability 0, space 0, times 0 [ 456.486022][T24767] CPU: 0 PID: 24767 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 456.493845][T24767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.503888][T24767] Call Trace: [ 456.507175][T24767] dump_stack+0x1fb/0x318 [ 456.511508][T24767] should_fail+0x555/0x770 [ 456.515914][T24767] __should_failslab+0x11a/0x160 [ 456.520848][T24767] ? __kernfs_new_node+0x97/0x6b0 [ 456.525871][T24767] should_failslab+0x9/0x20 [ 456.530376][T24767] kmem_cache_alloc+0x56/0x2e0 [ 456.535122][T24767] __kernfs_new_node+0x97/0x6b0 [ 456.539953][T24767] ? mutex_unlock+0xd/0x10 [ 456.544347][T24767] ? kernfs_activate+0x4c7/0x4e0 [ 456.549282][T24767] kernfs_new_node+0x97/0x170 [ 456.553951][T24767] __kernfs_create_file+0x4a/0x2f0 [ 456.559044][T24767] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 456.564399][T24767] internal_create_group+0x4be/0xd80 [ 456.569666][T24767] sysfs_create_group+0x1f/0x30 [ 456.574493][T24767] loop_set_fd+0xf54/0x1470 [ 456.578994][T24767] lo_ioctl+0xd5/0x2200 [ 456.583232][T24767] ? __kasan_slab_free+0x12a/0x1e0 [ 456.588318][T24767] ? kasan_slab_free+0xe/0x10 [ 456.592977][T24767] ? kfree+0x115/0x200 [ 456.597028][T24767] ? tomoyo_path_number_perm+0x4e1/0x640 [ 456.602645][T24767] ? tomoyo_file_ioctl+0x23/0x30 [ 456.607561][T24767] ? security_file_ioctl+0x6d/0xd0 [ 456.612661][T24767] ? __x64_sys_ioctl+0xa3/0x120 [ 456.617489][T24767] ? do_syscall_64+0xf7/0x1c0 [ 456.622365][T24767] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.628523][T24767] ? debug_check_no_obj_freed+0x505/0x5b0 [ 456.634242][T24767] ? rcu_lock_release+0x9/0x30 [ 456.639009][T24767] ? rcu_lock_release+0x9/0x30 [ 456.643883][T24767] ? lo_release+0x1f0/0x1f0 [ 456.648628][T24767] blkdev_ioctl+0x807/0x2980 [ 456.653203][T24767] ? tomoyo_path_number_perm+0x53e/0x640 [ 456.658876][T24767] block_ioctl+0xbd/0x100 [ 456.663186][T24767] ? blkdev_iopoll+0x100/0x100 [ 456.667927][T24767] do_vfs_ioctl+0x744/0x1730 [ 456.672507][T24767] ? __fget+0x411/0x510 [ 456.676654][T24767] ? tomoyo_file_ioctl+0x23/0x30 [ 456.681609][T24767] ? security_file_ioctl+0xa1/0xd0 [ 456.686708][T24767] __x64_sys_ioctl+0xe3/0x120 [ 456.691379][T24767] do_syscall_64+0xf7/0x1c0 [ 456.695894][T24767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.701762][T24767] RIP: 0033:0x45a087 [ 456.705632][T24767] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 456.725228][T24767] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 456.733620][T24767] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 456.741668][T24767] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 456.749736][T24767] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 456.758788][T24767] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 456.766758][T24767] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:33 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf\\\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 457.194688][T24806] FAULT_INJECTION: forcing a failure. [ 457.194688][T24806] name failslab, interval 1, probability 0, space 0, times 0 02:44:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xffffff9e, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 457.246755][T24806] CPU: 0 PID: 24806 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 457.255248][T24806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.265408][T24806] Call Trace: [ 457.268720][T24806] dump_stack+0x1fb/0x318 [ 457.273061][T24806] should_fail+0x555/0x770 [ 457.277492][T24806] __should_failslab+0x11a/0x160 [ 457.282469][T24806] ? __kernfs_new_node+0x97/0x6b0 [ 457.287499][T24806] should_failslab+0x9/0x20 [ 457.292001][T24806] kmem_cache_alloc+0x56/0x2e0 [ 457.296779][T24806] __kernfs_new_node+0x97/0x6b0 [ 457.301653][T24806] ? __schedule+0x876/0xc30 [ 457.306140][T24806] ? bd_set_size+0x97/0xb0 [ 457.310542][T24806] kernfs_create_dir_ns+0x9b/0x230 [ 457.315630][T24806] internal_create_group+0x207/0xd80 [ 457.320898][T24806] sysfs_create_group+0x1f/0x30 [ 457.325726][T24806] loop_set_fd+0xf54/0x1470 [ 457.330212][T24806] lo_ioctl+0xd5/0x2200 [ 457.334368][T24806] ? __kasan_slab_free+0x12a/0x1e0 [ 457.339456][T24806] ? kasan_slab_free+0xe/0x10 [ 457.344118][T24806] ? kfree+0x115/0x200 [ 457.348284][T24806] ? tomoyo_path_number_perm+0x4e1/0x640 [ 457.353906][T24806] ? tomoyo_file_ioctl+0x23/0x30 [ 457.358822][T24806] ? security_file_ioctl+0x6d/0xd0 [ 457.363919][T24806] ? __x64_sys_ioctl+0xa3/0x120 [ 457.368751][T24806] ? do_syscall_64+0xf7/0x1c0 [ 457.373414][T24806] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 457.379472][T24806] ? debug_check_no_obj_freed+0x505/0x5b0 [ 457.385174][T24806] ? rcu_lock_release+0x9/0x30 [ 457.389915][T24806] ? rcu_lock_release+0x9/0x30 [ 457.395444][T24806] ? lo_release+0x1f0/0x1f0 [ 457.400059][T24806] blkdev_ioctl+0x807/0x2980 [ 457.404629][T24806] ? tomoyo_path_number_perm+0x53e/0x640 [ 457.410255][T24806] block_ioctl+0xbd/0x100 [ 457.414580][T24806] ? blkdev_iopoll+0x100/0x100 [ 457.419498][T24806] do_vfs_ioctl+0x744/0x1730 [ 457.424069][T24806] ? __fget+0x411/0x510 [ 457.428307][T24806] ? tomoyo_file_ioctl+0x23/0x30 [ 457.433236][T24806] ? security_file_ioctl+0xa1/0xd0 [ 457.438336][T24806] __x64_sys_ioctl+0xe3/0x120 [ 457.443007][T24806] do_syscall_64+0xf7/0x1c0 [ 457.447495][T24806] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 457.453364][T24806] RIP: 0033:0x45a087 [ 457.457248][T24806] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 457.477276][T24806] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 457.485668][T24806] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 457.493636][T24806] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 457.501589][T24806] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 457.509538][T24806] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 457.517484][T24806] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrf/\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:34 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xffffffef, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 458.110327][T24846] FAULT_INJECTION: forcing a failure. [ 458.110327][T24846] name failslab, interval 1, probability 0, space 0, times 0 [ 458.123234][T24846] CPU: 1 PID: 24846 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 458.131037][T24846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.141090][T24846] Call Trace: [ 458.144378][T24846] dump_stack+0x1fb/0x318 [ 458.148699][T24846] should_fail+0x555/0x770 [ 458.153122][T24846] __should_failslab+0x11a/0x160 [ 458.158044][T24846] ? __kernfs_new_node+0x97/0x6b0 [ 458.163057][T24846] should_failslab+0x9/0x20 [ 458.167545][T24846] kmem_cache_alloc+0x56/0x2e0 [ 458.172466][T24846] __kernfs_new_node+0x97/0x6b0 [ 458.177300][T24846] ? mutex_unlock+0xd/0x10 [ 458.181781][T24846] ? kernfs_activate+0x4c7/0x4e0 [ 458.186700][T24846] kernfs_new_node+0x97/0x170 [ 458.191361][T24846] __kernfs_create_file+0x4a/0x2f0 [ 458.196455][T24846] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 458.201814][T24846] internal_create_group+0x4be/0xd80 [ 458.207694][T24846] sysfs_create_group+0x1f/0x30 [ 458.221293][T24846] loop_set_fd+0xf54/0x1470 [ 458.225804][T24846] lo_ioctl+0xd5/0x2200 [ 458.229949][T24846] ? __kasan_slab_free+0x12a/0x1e0 [ 458.235044][T24846] ? kasan_slab_free+0xe/0x10 [ 458.239705][T24846] ? kfree+0x115/0x200 [ 458.243756][T24846] ? tomoyo_path_number_perm+0x4e1/0x640 [ 458.249370][T24846] ? tomoyo_file_ioctl+0x23/0x30 [ 458.254305][T24846] ? security_file_ioctl+0x6d/0xd0 [ 458.259403][T24846] ? __x64_sys_ioctl+0xa3/0x120 [ 458.264234][T24846] ? do_syscall_64+0xf7/0x1c0 [ 458.269034][T24846] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 458.275093][T24846] ? debug_check_no_obj_freed+0x505/0x5b0 [ 458.280834][T24846] ? rcu_lock_release+0x9/0x30 [ 458.285594][T24846] ? rcu_lock_release+0x9/0x30 [ 458.290340][T24846] ? lo_release+0x1f0/0x1f0 [ 458.294822][T24846] blkdev_ioctl+0x807/0x2980 [ 458.299394][T24846] ? tomoyo_path_number_perm+0x53e/0x640 [ 458.305154][T24846] block_ioctl+0xbd/0x100 [ 458.309487][T24846] ? blkdev_iopoll+0x100/0x100 [ 458.314255][T24846] do_vfs_ioctl+0x744/0x1730 [ 458.318829][T24846] ? __fget+0x411/0x510 [ 458.323942][T24846] ? tomoyo_file_ioctl+0x23/0x30 [ 458.328873][T24846] ? security_file_ioctl+0xa1/0xd0 [ 458.334012][T24846] __x64_sys_ioctl+0xe3/0x120 [ 458.338772][T24846] do_syscall_64+0xf7/0x1c0 [ 458.343258][T24846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 458.349136][T24846] RIP: 0033:0x45a087 [ 458.353015][T24846] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 458.373574][T24846] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 458.381970][T24846] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 458.389932][T24846] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 458.397894][T24846] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 458.405943][T24846] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 02:44:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 458.413896][T24846] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x05', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:35 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 458.884368][T24886] FAULT_INJECTION: forcing a failure. [ 458.884368][T24886] name failslab, interval 1, probability 0, space 0, times 0 [ 458.903271][T24886] CPU: 1 PID: 24886 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 458.911107][T24886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.911112][T24886] Call Trace: [ 458.911129][T24886] dump_stack+0x1fb/0x318 [ 458.911145][T24886] should_fail+0x555/0x770 [ 458.911165][T24886] __should_failslab+0x11a/0x160 [ 458.911178][T24886] ? __kernfs_new_node+0x97/0x6b0 [ 458.911190][T24886] should_failslab+0x9/0x20 [ 458.911200][T24886] kmem_cache_alloc+0x56/0x2e0 [ 458.911214][T24886] __kernfs_new_node+0x97/0x6b0 [ 458.911229][T24886] ? mutex_unlock+0xd/0x10 [ 458.911238][T24886] ? kernfs_activate+0x4c7/0x4e0 [ 458.911253][T24886] kernfs_new_node+0x97/0x170 [ 458.911269][T24886] __kernfs_create_file+0x4a/0x2f0 [ 458.911284][T24886] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 458.911300][T24886] internal_create_group+0x4be/0xd80 [ 458.911321][T24886] sysfs_create_group+0x1f/0x30 [ 458.911331][T24886] loop_set_fd+0xf54/0x1470 [ 458.911353][T24886] lo_ioctl+0xd5/0x2200 [ 458.911362][T24886] ? __kasan_slab_free+0x12a/0x1e0 [ 458.911369][T24886] ? kasan_slab_free+0xe/0x10 [ 458.911378][T24886] ? kfree+0x115/0x200 [ 458.911386][T24886] ? tomoyo_path_number_perm+0x4e1/0x640 [ 458.911394][T24886] ? tomoyo_file_ioctl+0x23/0x30 [ 458.911402][T24886] ? security_file_ioctl+0x6d/0xd0 [ 458.911421][T24886] ? __x64_sys_ioctl+0xa3/0x120 [ 459.036332][T24886] ? do_syscall_64+0xf7/0x1c0 [ 459.040995][T24886] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 459.047039][T24886] ? debug_check_no_obj_freed+0x505/0x5b0 [ 459.052741][T24886] ? rcu_lock_release+0x9/0x30 [ 459.057489][T24886] ? rcu_lock_release+0x9/0x30 [ 459.062226][T24886] ? lo_release+0x1f0/0x1f0 [ 459.066709][T24886] blkdev_ioctl+0x807/0x2980 [ 459.071377][T24886] ? tomoyo_path_number_perm+0x53e/0x640 [ 459.077004][T24886] block_ioctl+0xbd/0x100 [ 459.081315][T24886] ? blkdev_iopoll+0x100/0x100 [ 459.086053][T24886] do_vfs_ioctl+0x744/0x1730 [ 459.090617][T24886] ? __fget+0x411/0x510 [ 459.094763][T24886] ? tomoyo_file_ioctl+0x23/0x30 [ 459.099685][T24886] ? security_file_ioctl+0xa1/0xd0 [ 459.104794][T24886] __x64_sys_ioctl+0xe3/0x120 [ 459.109457][T24886] do_syscall_64+0xf7/0x1c0 [ 459.113948][T24886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 459.119824][T24886] RIP: 0033:0x45a087 [ 459.123702][T24886] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 459.143461][T24886] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 459.151853][T24886] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 459.159948][T24886] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 459.167897][T24886] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 459.175851][T24886] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 459.183811][T24886] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfL\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrft\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:36 executing program 1 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x06', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xfffffff0, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfh\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 459.555216][T24918] FAULT_INJECTION: forcing a failure. [ 459.555216][T24918] name failslab, interval 1, probability 0, space 0, times 0 [ 459.573533][T24918] CPU: 1 PID: 24918 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 459.581373][T24918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.581379][T24918] Call Trace: [ 459.581396][T24918] dump_stack+0x1fb/0x318 [ 459.581413][T24918] should_fail+0x555/0x770 [ 459.581431][T24918] __should_failslab+0x11a/0x160 [ 459.581452][T24918] ? __kernfs_new_node+0x97/0x6b0 [ 459.608442][T24918] should_failslab+0x9/0x20 [ 459.608455][T24918] kmem_cache_alloc+0x56/0x2e0 [ 459.608470][T24918] __kernfs_new_node+0x97/0x6b0 [ 459.617960][T24918] ? mutex_unlock+0xd/0x10 [ 459.617972][T24918] ? kernfs_activate+0x4c7/0x4e0 [ 459.617989][T24918] kernfs_new_node+0x97/0x170 [ 459.618002][T24918] __kernfs_create_file+0x4a/0x2f0 [ 459.618016][T24918] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 459.627604][T24918] internal_create_group+0x4be/0xd80 [ 459.627629][T24918] sysfs_create_group+0x1f/0x30 [ 459.627639][T24918] loop_set_fd+0xf54/0x1470 [ 459.627660][T24918] lo_ioctl+0xd5/0x2200 [ 459.636966][T24918] ? __kasan_slab_free+0x12a/0x1e0 [ 459.636976][T24918] ? kasan_slab_free+0xe/0x10 [ 459.636986][T24918] ? kfree+0x115/0x200 [ 459.636996][T24918] ? tomoyo_path_number_perm+0x4e1/0x640 [ 459.637005][T24918] ? tomoyo_file_ioctl+0x23/0x30 [ 459.637018][T24918] ? security_file_ioctl+0x6d/0xd0 [ 459.646755][T24918] ? __x64_sys_ioctl+0xa3/0x120 [ 459.646766][T24918] ? do_syscall_64+0xf7/0x1c0 [ 459.646777][T24918] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 459.646793][T24918] ? debug_check_no_obj_freed+0x505/0x5b0 [ 459.646817][T24918] ? rcu_lock_release+0x9/0x30 [ 459.657422][T24918] ? rcu_lock_release+0x9/0x30 [ 459.657435][T24918] ? lo_release+0x1f0/0x1f0 [ 459.657445][T24918] blkdev_ioctl+0x807/0x2980 [ 459.657458][T24918] ? tomoyo_path_number_perm+0x53e/0x640 [ 459.657485][T24918] block_ioctl+0xbd/0x100 [ 459.666780][T24918] ? blkdev_iopoll+0x100/0x100 [ 459.666795][T24918] do_vfs_ioctl+0x744/0x1730 [ 459.666805][T24918] ? __fget+0x411/0x510 [ 459.666822][T24918] ? tomoyo_file_ioctl+0x23/0x30 [ 459.666836][T24918] ? security_file_ioctl+0xa1/0xd0 [ 459.676070][T24918] __x64_sys_ioctl+0xe3/0x120 [ 459.676086][T24918] do_syscall_64+0xf7/0x1c0 [ 459.676101][T24918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 459.676111][T24918] RIP: 0033:0x45a087 [ 459.676124][T24918] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 459.684811][T24918] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 459.684822][T24918] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 459.684828][T24918] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 459.684834][T24918] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 459.684840][T24918] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 459.684846][T24918] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\a', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:37 executing program 1 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrf\\\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0xfffffffe, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 460.569820][T24986] FAULT_INJECTION: forcing a failure. [ 460.569820][T24986] name failslab, interval 1, probability 0, space 0, times 0 [ 460.592564][T24986] CPU: 1 PID: 24986 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 460.600490][T24986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 460.610543][T24986] Call Trace: [ 460.613838][T24986] dump_stack+0x1fb/0x318 [ 460.618163][T24986] should_fail+0x555/0x770 [ 460.618181][T24986] __should_failslab+0x11a/0x160 [ 460.618195][T24986] ? __kernfs_new_node+0x97/0x6b0 [ 460.627507][T24986] should_failslab+0x9/0x20 [ 460.627520][T24986] kmem_cache_alloc+0x56/0x2e0 [ 460.627540][T24986] __kernfs_new_node+0x97/0x6b0 [ 460.637021][T24986] ? mutex_unlock+0xd/0x10 [ 460.637032][T24986] ? kernfs_activate+0x4c7/0x4e0 [ 460.637049][T24986] kernfs_new_node+0x97/0x170 [ 460.649937][T24986] __kernfs_create_file+0x4a/0x2f0 [ 460.649958][T24986] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 460.649980][T24986] internal_create_group+0x4be/0xd80 [ 460.659319][T24986] sysfs_create_group+0x1f/0x30 [ 460.659330][T24986] loop_set_fd+0xf54/0x1470 [ 460.659351][T24986] lo_ioctl+0xd5/0x2200 [ 460.669091][T24986] ? __kasan_slab_free+0x12a/0x1e0 [ 460.669098][T24986] ? kasan_slab_free+0xe/0x10 [ 460.669107][T24986] ? kfree+0x115/0x200 [ 460.669120][T24986] ? tomoyo_path_number_perm+0x4e1/0x640 [ 460.669129][T24986] ? tomoyo_file_ioctl+0x23/0x30 [ 460.669138][T24986] ? security_file_ioctl+0x6d/0xd0 [ 460.669148][T24986] ? __x64_sys_ioctl+0xa3/0x120 [ 460.669157][T24986] ? do_syscall_64+0xf7/0x1c0 [ 460.669170][T24986] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 460.679787][T24986] ? debug_check_no_obj_freed+0x505/0x5b0 [ 460.679814][T24986] ? rcu_lock_release+0x9/0x30 [ 460.679831][T24986] ? rcu_lock_release+0x9/0x30 [ 460.679841][T24986] ? lo_release+0x1f0/0x1f0 [ 460.679852][T24986] blkdev_ioctl+0x807/0x2980 [ 460.689173][T24986] ? tomoyo_path_number_perm+0x53e/0x640 [ 460.689206][T24986] block_ioctl+0xbd/0x100 [ 460.689215][T24986] ? blkdev_iopoll+0x100/0x100 [ 460.689231][T24986] do_vfs_ioctl+0x744/0x1730 [ 460.689243][T24986] ? __fget+0x411/0x510 [ 460.698458][T24986] ? tomoyo_file_ioctl+0x23/0x30 [ 460.698470][T24986] ? security_file_ioctl+0xa1/0xd0 [ 460.698483][T24986] __x64_sys_ioctl+0xe3/0x120 [ 460.698501][T24986] do_syscall_64+0xf7/0x1c0 [ 460.707197][T24986] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 460.707207][T24986] RIP: 0033:0x45a087 02:44:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\b', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 460.707217][T24986] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 460.707223][T24986] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 460.707241][T24986] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 460.717761][T24986] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 460.717767][T24986] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 460.717772][T24986] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 460.717779][T24986] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:38 executing program 1 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 461.340216][T25024] FAULT_INJECTION: forcing a failure. [ 461.340216][T25024] name failslab, interval 1, probability 0, space 0, times 0 [ 461.362067][T25024] CPU: 1 PID: 25024 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 461.369944][T25024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.379991][T25024] Call Trace: [ 461.380009][T25024] dump_stack+0x1fb/0x318 [ 461.380027][T25024] should_fail+0x555/0x770 [ 461.380046][T25024] __should_failslab+0x11a/0x160 [ 461.380060][T25024] ? __kernfs_new_node+0x97/0x6b0 [ 461.380072][T25024] should_failslab+0x9/0x20 [ 461.380081][T25024] kmem_cache_alloc+0x56/0x2e0 [ 461.380094][T25024] __kernfs_new_node+0x97/0x6b0 [ 461.380109][T25024] ? mutex_unlock+0xd/0x10 [ 461.387693][T25024] ? kernfs_activate+0x4c7/0x4e0 [ 461.387711][T25024] kernfs_new_node+0x97/0x170 [ 461.387728][T25024] __kernfs_create_file+0x4a/0x2f0 02:44:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfz\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 461.387743][T25024] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 461.387762][T25024] internal_create_group+0x4be/0xd80 [ 461.387782][T25024] sysfs_create_group+0x1f/0x30 [ 461.397095][T25024] loop_set_fd+0xf54/0x1470 [ 461.397121][T25024] lo_ioctl+0xd5/0x2200 [ 461.397132][T25024] ? __kasan_slab_free+0x12a/0x1e0 [ 461.397139][T25024] ? kasan_slab_free+0xe/0x10 [ 461.397149][T25024] ? kfree+0x115/0x200 [ 461.397159][T25024] ? tomoyo_path_number_perm+0x4e1/0x640 [ 461.397169][T25024] ? tomoyo_file_ioctl+0x23/0x30 [ 461.397184][T25024] ? security_file_ioctl+0x6d/0xd0 [ 461.397197][T25024] ? __x64_sys_ioctl+0xa3/0x120 [ 461.416264][T25024] ? do_syscall_64+0xf7/0x1c0 [ 461.416278][T25024] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 461.416294][T25024] ? debug_check_no_obj_freed+0x505/0x5b0 [ 461.416322][T25024] ? rcu_lock_release+0x9/0x30 [ 461.416340][T25024] ? rcu_lock_release+0x9/0x30 [ 461.416355][T25024] ? lo_release+0x1f0/0x1f0 [ 461.425673][T25024] blkdev_ioctl+0x807/0x2980 [ 461.425689][T25024] ? tomoyo_path_number_perm+0x53e/0x640 [ 461.425723][T25024] block_ioctl+0xbd/0x100 [ 461.425733][T25024] ? blkdev_iopoll+0x100/0x100 [ 461.425745][T25024] do_vfs_ioctl+0x744/0x1730 [ 461.425755][T25024] ? __fget+0x411/0x510 [ 461.425770][T25024] ? tomoyo_file_ioctl+0x23/0x30 [ 461.435526][T25024] ? security_file_ioctl+0xa1/0xd0 [ 461.435543][T25024] __x64_sys_ioctl+0xe3/0x120 [ 461.435559][T25024] do_syscall_64+0xf7/0x1c0 [ 461.435575][T25024] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 461.435584][T25024] RIP: 0033:0x45a087 [ 461.435594][T25024] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 461.435599][T25024] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 461.446213][T25024] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 461.446220][T25024] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 461.446226][T25024] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 02:44:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 461.446232][T25024] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 461.446238][T25024] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:38 executing program 1 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x02', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfh\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 462.227710][T25067] FAULT_INJECTION: forcing a failure. [ 462.227710][T25067] name failslab, interval 1, probability 0, space 0, times 0 [ 462.247301][T25067] CPU: 1 PID: 25067 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 462.255130][T25067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.255197][T25067] Call Trace: [ 462.255214][T25067] dump_stack+0x1fb/0x318 [ 462.255231][T25067] should_fail+0x555/0x770 [ 462.255248][T25067] __should_failslab+0x11a/0x160 [ 462.255262][T25067] should_failslab+0x9/0x20 [ 462.255273][T25067] kmem_cache_alloc_node+0x65/0x280 [ 462.255284][T25067] ? __alloc_skb+0x9f/0x500 [ 462.255299][T25067] __alloc_skb+0x9f/0x500 [ 462.255317][T25067] alloc_uevent_skb+0x7f/0x230 [ 462.255331][T25067] kobject_uevent_env+0xcbc/0x1260 [ 462.255358][T25067] kobject_uevent+0x1f/0x30 [ 462.268700][T25067] loop_set_fd+0xfc3/0x1470 [ 462.268724][T25067] lo_ioctl+0xd5/0x2200 [ 462.268734][T25067] ? __kasan_slab_free+0x12a/0x1e0 [ 462.268742][T25067] ? kasan_slab_free+0xe/0x10 [ 462.268750][T25067] ? kfree+0x115/0x200 [ 462.268764][T25067] ? tomoyo_path_number_perm+0x4e1/0x640 [ 462.277496][T25067] ? tomoyo_file_ioctl+0x23/0x30 [ 462.277506][T25067] ? security_file_ioctl+0x6d/0xd0 [ 462.277517][T25067] ? __x64_sys_ioctl+0xa3/0x120 [ 462.277528][T25067] ? do_syscall_64+0xf7/0x1c0 [ 462.277539][T25067] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.277554][T25067] ? debug_check_no_obj_freed+0x505/0x5b0 [ 462.374593][T25067] ? rcu_lock_release+0x9/0x30 [ 462.379370][T25067] ? rcu_lock_release+0x9/0x30 [ 462.384144][T25067] ? lo_release+0x1f0/0x1f0 [ 462.388635][T25067] blkdev_ioctl+0x807/0x2980 [ 462.393212][T25067] ? tomoyo_path_number_perm+0x53e/0x640 [ 462.398843][T25067] block_ioctl+0xbd/0x100 [ 462.403165][T25067] ? blkdev_iopoll+0x100/0x100 [ 462.407922][T25067] do_vfs_ioctl+0x744/0x1730 [ 462.412654][T25067] ? __fget+0x411/0x510 [ 462.416801][T25067] ? tomoyo_file_ioctl+0x23/0x30 [ 462.421727][T25067] ? security_file_ioctl+0xa1/0xd0 [ 462.426820][T25067] __x64_sys_ioctl+0xe3/0x120 [ 462.431481][T25067] do_syscall_64+0xf7/0x1c0 [ 462.435975][T25067] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.441863][T25067] RIP: 0033:0x45a087 [ 462.445776][T25067] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 462.465369][T25067] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 462.473775][T25067] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 462.481727][T25067] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 462.489744][T25067] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 462.497711][T25067] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 462.505700][T25067] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x3}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\n', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x4}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:39 executing program 1 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x03', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 463.184631][T25123] FAULT_INJECTION: forcing a failure. [ 463.184631][T25123] name failslab, interval 1, probability 0, space 0, times 0 [ 463.197802][T25123] CPU: 1 PID: 25123 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 463.205611][T25123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.205617][T25123] Call Trace: [ 463.205633][T25123] dump_stack+0x1fb/0x318 [ 463.205650][T25123] should_fail+0x555/0x770 [ 463.205672][T25123] __should_failslab+0x11a/0x160 [ 463.205686][T25123] should_failslab+0x9/0x20 [ 463.205696][T25123] kmem_cache_alloc_trace+0x5d/0x2f0 [ 463.205706][T25123] ? kobject_uevent_env+0x2cd/0x1260 [ 463.205717][T25123] ? dev_uevent_filter+0xb0/0xb0 [ 463.205729][T25123] kobject_uevent_env+0x2cd/0x1260 [ 463.205749][T25123] kobject_uevent+0x1f/0x30 [ 463.205760][T25123] loop_set_fd+0xfc3/0x1470 [ 463.205783][T25123] lo_ioctl+0xd5/0x2200 [ 463.205792][T25123] ? __kasan_slab_free+0x12a/0x1e0 [ 463.205800][T25123] ? kasan_slab_free+0xe/0x10 [ 463.205809][T25123] ? kfree+0x115/0x200 [ 463.205818][T25123] ? tomoyo_path_number_perm+0x4e1/0x640 [ 463.205826][T25123] ? tomoyo_file_ioctl+0x23/0x30 [ 463.205834][T25123] ? security_file_ioctl+0x6d/0xd0 [ 463.205847][T25123] ? __x64_sys_ioctl+0xa3/0x120 [ 463.223566][T25123] ? do_syscall_64+0xf7/0x1c0 [ 463.223579][T25123] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.223595][T25123] ? debug_check_no_obj_freed+0x505/0x5b0 [ 463.223646][T25123] ? rcu_lock_release+0x9/0x30 [ 463.232929][T25123] ? rcu_lock_release+0x9/0x30 [ 463.232940][T25123] ? lo_release+0x1f0/0x1f0 [ 463.232949][T25123] blkdev_ioctl+0x807/0x2980 [ 463.232961][T25123] ? tomoyo_path_number_perm+0x53e/0x640 [ 463.232993][T25123] block_ioctl+0xbd/0x100 [ 463.233001][T25123] ? blkdev_iopoll+0x100/0x100 [ 463.233014][T25123] do_vfs_ioctl+0x744/0x1730 [ 463.242773][T25123] ? __fget+0x411/0x510 [ 463.242793][T25123] ? tomoyo_file_ioctl+0x23/0x30 [ 463.242803][T25123] ? security_file_ioctl+0xa1/0xd0 [ 463.242817][T25123] __x64_sys_ioctl+0xe3/0x120 [ 463.253003][T25123] do_syscall_64+0xf7/0x1c0 [ 463.253021][T25123] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.253030][T25123] RIP: 0033:0x45a087 [ 463.253043][T25123] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 463.262639][T25123] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 463.262650][T25123] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 02:44:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x6}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 463.262655][T25123] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 463.262660][T25123] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 463.262665][T25123] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 463.262670][T25123] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\v', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:40 executing program 1 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrft\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x7}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 463.862624][T25165] FAULT_INJECTION: forcing a failure. [ 463.862624][T25165] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 463.875851][T25165] CPU: 0 PID: 25165 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 463.883665][T25165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.883671][T25165] Call Trace: [ 463.883689][T25165] dump_stack+0x1fb/0x318 [ 463.883707][T25165] should_fail+0x555/0x770 [ 463.883731][T25165] should_fail_alloc_page+0x55/0x60 [ 463.910944][T25165] prepare_alloc_pages+0x283/0x460 [ 463.910960][T25165] __alloc_pages_nodemask+0xb2/0x5d0 [ 463.910981][T25165] kmem_getpages+0x4d/0xa00 [ 463.910993][T25165] cache_grow_begin+0x7e/0x2c0 [ 463.911005][T25165] cache_alloc_refill+0x311/0x3f0 [ 463.911015][T25165] ? check_preemption_disabled+0xb7/0x2a0 [ 463.911031][T25165] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 463.911041][T25165] ? kobject_uevent_env+0x2cd/0x1260 [ 463.911051][T25165] ? dev_uevent_filter+0xb0/0xb0 [ 463.911062][T25165] kobject_uevent_env+0x2cd/0x1260 02:44:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 463.911082][T25165] kobject_uevent+0x1f/0x30 [ 463.921444][T25165] loop_set_fd+0xfc3/0x1470 [ 463.921467][T25165] lo_ioctl+0xd5/0x2200 [ 463.921476][T25165] ? __kasan_slab_free+0x12a/0x1e0 [ 463.921484][T25165] ? kasan_slab_free+0xe/0x10 [ 463.921493][T25165] ? kfree+0x115/0x200 [ 463.921507][T25165] ? tomoyo_path_number_perm+0x4e1/0x640 [ 463.921516][T25165] ? tomoyo_file_ioctl+0x23/0x30 [ 463.921525][T25165] ? security_file_ioctl+0x6d/0xd0 [ 463.921534][T25165] ? __x64_sys_ioctl+0xa3/0x120 [ 463.921544][T25165] ? do_syscall_64+0xf7/0x1c0 [ 463.921554][T25165] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.921569][T25165] ? debug_check_no_obj_freed+0x505/0x5b0 [ 463.935835][T25165] ? rcu_lock_release+0x9/0x30 [ 463.935854][T25165] ? rcu_lock_release+0x9/0x30 [ 463.935866][T25165] ? lo_release+0x1f0/0x1f0 [ 463.946919][T25165] blkdev_ioctl+0x807/0x2980 [ 463.946934][T25165] ? tomoyo_path_number_perm+0x53e/0x640 [ 463.946967][T25165] block_ioctl+0xbd/0x100 [ 463.946978][T25165] ? blkdev_iopoll+0x100/0x100 [ 463.980485][T25165] do_vfs_ioctl+0x744/0x1730 [ 463.980496][T25165] ? __fget+0x411/0x510 [ 463.980513][T25165] ? tomoyo_file_ioctl+0x23/0x30 [ 463.980524][T25165] ? security_file_ioctl+0xa1/0xd0 [ 463.980538][T25165] __x64_sys_ioctl+0xe3/0x120 [ 463.980555][T25165] do_syscall_64+0xf7/0x1c0 [ 463.980570][T25165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.980579][T25165] RIP: 0033:0x45a087 [ 463.980592][T25165] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 463.980598][T25165] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 463.980607][T25165] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 463.980613][T25165] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 463.980619][T25165] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 463.980625][T25165] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 463.980631][T25165] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x8}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:41 executing program 1 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\f', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 464.447658][T25204] FAULT_INJECTION: forcing a failure. [ 464.447658][T25204] name failslab, interval 1, probability 0, space 0, times 0 [ 464.471706][T25204] CPU: 0 PID: 25204 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 464.479547][T25204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.489604][T25204] Call Trace: [ 464.492899][T25204] dump_stack+0x1fb/0x318 [ 464.497236][T25204] should_fail+0x555/0x770 [ 464.501657][T25204] __should_failslab+0x11a/0x160 [ 464.506723][T25204] should_failslab+0x9/0x20 [ 464.511213][T25204] kmem_cache_alloc_node+0x65/0x280 [ 464.516392][T25204] ? __alloc_skb+0x9f/0x500 [ 464.520889][T25204] __alloc_skb+0x9f/0x500 [ 464.525223][T25204] alloc_uevent_skb+0x7f/0x230 [ 464.529978][T25204] kobject_uevent_env+0xcbc/0x1260 [ 464.535079][T25204] kobject_uevent+0x1f/0x30 [ 464.539566][T25204] loop_set_fd+0xfc3/0x1470 [ 464.544101][T25204] lo_ioctl+0xd5/0x2200 [ 464.548239][T25204] ? __kasan_slab_free+0x12a/0x1e0 [ 464.553351][T25204] ? kasan_slab_free+0xe/0x10 [ 464.558012][T25204] ? kfree+0x115/0x200 [ 464.562086][T25204] ? tomoyo_path_number_perm+0x4e1/0x640 [ 464.567704][T25204] ? tomoyo_file_ioctl+0x23/0x30 [ 464.572628][T25204] ? security_file_ioctl+0x6d/0xd0 [ 464.577725][T25204] ? __x64_sys_ioctl+0xa3/0x120 [ 464.582561][T25204] ? do_syscall_64+0xf7/0x1c0 [ 464.587246][T25204] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 464.593294][T25204] ? debug_check_no_obj_freed+0x505/0x5b0 [ 464.599012][T25204] ? rcu_lock_release+0x9/0x30 [ 464.603780][T25204] ? rcu_lock_release+0x9/0x30 [ 464.608533][T25204] ? lo_release+0x1f0/0x1f0 [ 464.613017][T25204] blkdev_ioctl+0x807/0x2980 [ 464.617589][T25204] ? tomoyo_path_number_perm+0x53e/0x640 [ 464.623234][T25204] block_ioctl+0xbd/0x100 [ 464.627551][T25204] ? blkdev_iopoll+0x100/0x100 [ 464.632317][T25204] do_vfs_ioctl+0x744/0x1730 [ 464.636896][T25204] ? __fget+0x411/0x510 [ 464.641050][T25204] ? tomoyo_file_ioctl+0x23/0x30 [ 464.645975][T25204] ? security_file_ioctl+0xa1/0xd0 [ 464.651065][T25204] __x64_sys_ioctl+0xe3/0x120 [ 464.655721][T25204] do_syscall_64+0xf7/0x1c0 [ 464.660212][T25204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 464.666087][T25204] RIP: 0033:0x45a087 [ 464.669976][T25204] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 464.689658][T25204] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 464.698070][T25204] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 464.706048][T25204] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 464.714091][T25204] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 464.722069][T25204] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 464.730038][T25204] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x9}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x05', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0xa}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:42 executing program 1 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 465.181175][T25239] FAULT_INJECTION: forcing a failure. [ 465.181175][T25239] name failslab, interval 1, probability 0, space 0, times 0 [ 465.194279][T25239] CPU: 1 PID: 25239 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 465.202098][T25239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.212155][T25239] Call Trace: [ 465.215457][T25239] dump_stack+0x1fb/0x318 [ 465.219821][T25239] should_fail+0x555/0x770 [ 465.224247][T25239] __should_failslab+0x11a/0x160 [ 465.229189][T25239] should_failslab+0x9/0x20 [ 465.233697][T25239] kmem_cache_alloc_node+0x65/0x280 [ 465.238895][T25239] ? __alloc_skb+0x9f/0x500 [ 465.243410][T25239] __alloc_skb+0x9f/0x500 [ 465.248798][T25239] alloc_uevent_skb+0x7f/0x230 [ 465.253566][T25239] kobject_uevent_env+0xcbc/0x1260 [ 465.258721][T25239] kobject_uevent+0x1f/0x30 [ 465.263252][T25239] loop_set_fd+0xfc3/0x1470 [ 465.267771][T25239] lo_ioctl+0xd5/0x2200 [ 465.271930][T25239] ? __kasan_slab_free+0x12a/0x1e0 [ 465.277037][T25239] ? kasan_slab_free+0xe/0x10 02:44:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\r', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 465.281719][T25239] ? kfree+0x115/0x200 [ 465.285791][T25239] ? tomoyo_path_number_perm+0x4e1/0x640 [ 465.291427][T25239] ? tomoyo_file_ioctl+0x23/0x30 [ 465.296363][T25239] ? security_file_ioctl+0x6d/0xd0 [ 465.296376][T25239] ? __x64_sys_ioctl+0xa3/0x120 [ 465.296391][T25239] ? do_syscall_64+0xf7/0x1c0 [ 465.296403][T25239] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.296417][T25239] ? debug_check_no_obj_freed+0x505/0x5b0 [ 465.296464][T25239] ? rcu_lock_release+0x9/0x30 [ 465.296480][T25239] ? rcu_lock_release+0x9/0x30 [ 465.306515][T25239] ? lo_release+0x1f0/0x1f0 [ 465.306525][T25239] blkdev_ioctl+0x807/0x2980 [ 465.306539][T25239] ? tomoyo_path_number_perm+0x53e/0x640 [ 465.306571][T25239] block_ioctl+0xbd/0x100 [ 465.306580][T25239] ? blkdev_iopoll+0x100/0x100 [ 465.306594][T25239] do_vfs_ioctl+0x744/0x1730 [ 465.306604][T25239] ? __fget+0x411/0x510 [ 465.306619][T25239] ? tomoyo_file_ioctl+0x23/0x30 [ 465.306632][T25239] ? security_file_ioctl+0xa1/0xd0 [ 465.317456][T25239] __x64_sys_ioctl+0xe3/0x120 [ 465.317472][T25239] do_syscall_64+0xf7/0x1c0 [ 465.317487][T25239] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.317498][T25239] RIP: 0033:0x45a087 [ 465.317508][T25239] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 465.317513][T25239] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 465.317523][T25239] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 000000000045a087 [ 465.317529][T25239] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 465.317534][T25239] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 465.317543][T25239] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 465.453954][T25239] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x06', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0xb}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:42 executing program 1 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0xc}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x0e', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 465.996161][T25283] FAULT_INJECTION: forcing a failure. [ 465.996161][T25283] name failslab, interval 1, probability 0, space 0, times 0 [ 466.035789][T25283] CPU: 1 PID: 25283 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 466.043813][T25283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.053889][T25283] Call Trace: [ 466.053906][T25283] dump_stack+0x1fb/0x318 [ 466.053923][T25283] should_fail+0x555/0x770 [ 466.053940][T25283] __should_failslab+0x11a/0x160 [ 466.053950][T25283] ? getname_flags+0xba/0x640 [ 466.053966][T25283] should_failslab+0x9/0x20 [ 466.061588][T25283] kmem_cache_alloc+0x56/0x2e0 [ 466.061599][T25283] ? __kasan_check_write+0x14/0x20 [ 466.061610][T25283] getname_flags+0xba/0x640 [ 466.061623][T25283] do_mkdirat+0x3c/0x320 [ 466.061631][T25283] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 466.061644][T25283] ? do_syscall_64+0x1d/0x1c0 [ 466.071263][T25283] __x64_sys_mkdir+0x60/0x70 [ 466.071278][T25283] do_syscall_64+0xf7/0x1c0 [ 466.071292][T25283] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 466.071301][T25283] RIP: 0033:0x459637 [ 466.071311][T25283] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 466.071321][T25283] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 466.081278][T25283] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 466.081285][T25283] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 466.081290][T25283] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 466.081296][T25283] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 02:44:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfz\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 466.081302][T25283] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\a', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:43 executing program 1 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0xd}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 466.455711][T25320] FAULT_INJECTION: forcing a failure. [ 466.455711][T25320] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 466.469060][T25320] CPU: 0 PID: 25320 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 466.476860][T25320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.486928][T25320] Call Trace: [ 466.490299][T25320] dump_stack+0x1fb/0x318 [ 466.494960][T25320] should_fail+0x555/0x770 [ 466.499384][T25320] should_fail_alloc_page+0x55/0x60 [ 466.504579][T25320] prepare_alloc_pages+0x283/0x460 [ 466.509683][T25320] __alloc_pages_nodemask+0xb2/0x5d0 [ 466.514967][T25320] ? lo_release+0x1f0/0x1f0 [ 466.519485][T25320] ? blkdev_ioctl+0x807/0x2980 [ 466.524245][T25320] kmem_getpages+0x4d/0xa00 [ 466.528744][T25320] cache_grow_begin+0x7e/0x2c0 [ 466.533492][T25320] cache_alloc_refill+0x311/0x3f0 [ 466.539373][T25320] ? check_preemption_disabled+0xb7/0x2a0 [ 466.545087][T25320] kmem_cache_alloc+0x2b9/0x2e0 [ 466.550368][T25320] ? getname_flags+0xba/0x640 [ 466.555204][T25320] getname_flags+0xba/0x640 [ 466.559692][T25320] do_mkdirat+0x3c/0x320 [ 466.563917][T25320] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 466.569625][T25320] ? do_syscall_64+0x1d/0x1c0 [ 466.574282][T25320] __x64_sys_mkdir+0x60/0x70 [ 466.578852][T25320] do_syscall_64+0xf7/0x1c0 [ 466.583344][T25320] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 466.589216][T25320] RIP: 0033:0x459637 [ 466.593090][T25320] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 466.612680][T25320] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 466.621080][T25320] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 466.629037][T25320] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 466.637000][T25320] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 466.644952][T25320] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 466.652914][T25320] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrft\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x0f', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0xe}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:43 executing program 1 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x02', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\b', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 467.197539][T25353] FAULT_INJECTION: forcing a failure. [ 467.197539][T25353] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 467.211146][T25353] CPU: 1 PID: 25353 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 467.218956][T25353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.229006][T25353] Call Trace: [ 467.232300][T25353] dump_stack+0x1fb/0x318 [ 467.236630][T25353] should_fail+0x555/0x770 [ 467.241044][T25353] should_fail_alloc_page+0x55/0x60 [ 467.241071][T25353] prepare_alloc_pages+0x283/0x460 [ 467.241084][T25353] __alloc_pages_nodemask+0xb2/0x5d0 [ 467.241104][T25353] kmem_getpages+0x4d/0xa00 [ 467.241116][T25353] cache_grow_begin+0x7e/0x2c0 [ 467.251394][T25353] cache_alloc_refill+0x311/0x3f0 [ 467.251406][T25353] ? check_preemption_disabled+0xb7/0x2a0 [ 467.251424][T25353] __kmalloc+0x318/0x340 [ 467.251434][T25353] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 467.251446][T25353] tomoyo_realpath_from_path+0xdc/0x7c0 [ 467.251463][T25353] tomoyo_path_number_perm+0x166/0x640 [ 467.251494][T25353] ? rcu_read_lock_sched_held+0x10b/0x170 [ 467.261236][T25353] ? trace_kmem_cache_free+0xb2/0x110 [ 467.261253][T25353] tomoyo_path_mkdir+0x9c/0xc0 [ 467.261268][T25353] security_path_mkdir+0xed/0x170 [ 467.261282][T25353] do_mkdirat+0x15c/0x320 [ 467.261296][T25353] __x64_sys_mkdir+0x60/0x70 [ 467.261308][T25353] do_syscall_64+0xf7/0x1c0 [ 467.261322][T25353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 467.261333][T25353] RIP: 0033:0x459637 [ 467.271075][T25353] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 467.271081][T25353] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 467.271091][T25353] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 467.271098][T25353] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 467.271104][T25353] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 467.271110][T25353] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 467.271116][T25353] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x10}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x10', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:44 executing program 1 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x03', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x11}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 467.874349][T25400] FAULT_INJECTION: forcing a failure. [ 467.874349][T25400] name failslab, interval 1, probability 0, space 0, times 0 [ 468.053148][T25400] CPU: 1 PID: 25400 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 468.060994][T25400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.071056][T25400] Call Trace: [ 468.074347][T25400] dump_stack+0x1fb/0x318 [ 468.078685][T25400] should_fail+0x555/0x770 [ 468.083105][T25400] __should_failslab+0x11a/0x160 [ 468.088063][T25400] ? getname_flags+0xba/0x640 [ 468.088076][T25400] should_failslab+0x9/0x20 [ 468.088089][T25400] kmem_cache_alloc+0x56/0x2e0 02:44:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x11', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 468.088098][T25400] ? __kasan_check_write+0x14/0x20 [ 468.088110][T25400] getname_flags+0xba/0x640 [ 468.088124][T25400] do_mkdirat+0x3c/0x320 [ 468.088132][T25400] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 468.088145][T25400] ? do_syscall_64+0x1d/0x1c0 [ 468.097304][T25400] __x64_sys_mkdir+0x60/0x70 [ 468.097319][T25400] do_syscall_64+0xf7/0x1c0 [ 468.097333][T25400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 468.097342][T25400] RIP: 0033:0x459637 [ 468.097353][T25400] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 468.097358][T25400] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 468.097371][T25400] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 468.107196][T25400] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 468.107201][T25400] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 468.107206][T25400] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 468.107211][T25400] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x12}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:45 executing program 1 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\n', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfz\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 468.558799][T25445] FAULT_INJECTION: forcing a failure. [ 468.558799][T25445] name failslab, interval 1, probability 0, space 0, times 0 [ 468.574133][T25445] CPU: 1 PID: 25445 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 468.581969][T25445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.581990][T25445] Call Trace: [ 468.582009][T25445] dump_stack+0x1fb/0x318 [ 468.599686][T25445] should_fail+0x555/0x770 [ 468.604099][T25445] __should_failslab+0x11a/0x160 [ 468.604109][T25445] ? __d_alloc+0x2d/0x6e0 [ 468.604124][T25445] should_failslab+0x9/0x20 [ 468.613350][T25445] kmem_cache_alloc+0x56/0x2e0 [ 468.613362][T25445] __d_alloc+0x2d/0x6e0 [ 468.613375][T25445] d_alloc+0x4e/0x1d0 [ 468.622605][T25445] __lookup_hash+0xe5/0x290 [ 468.622618][T25445] filename_create+0x14f/0x670 [ 468.622629][T25445] ? getname_flags+0x214/0x640 [ 468.622643][T25445] do_mkdirat+0x5a/0x320 [ 468.622657][T25445] __x64_sys_mkdir+0x60/0x70 [ 468.622676][T25445] do_syscall_64+0xf7/0x1c0 [ 468.630767][T25445] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 468.630777][T25445] RIP: 0033:0x459637 [ 468.630787][T25445] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 468.630793][T25445] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 468.630802][T25445] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 02:44:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x13}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 468.630807][T25445] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 468.630816][T25445] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 468.640025][T25445] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 468.640032][T25445] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:45 executing program 1 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x12', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x14}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 469.079478][T25477] FAULT_INJECTION: forcing a failure. [ 469.079478][T25477] name failslab, interval 1, probability 0, space 0, times 0 02:44:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x02', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 469.130004][T25477] CPU: 0 PID: 25477 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 469.137879][T25477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.147935][T25477] Call Trace: [ 469.151413][T25477] dump_stack+0x1fb/0x318 [ 469.155752][T25477] should_fail+0x555/0x770 [ 469.160201][T25477] __should_failslab+0x11a/0x160 [ 469.165139][T25477] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 469.170860][T25477] should_failslab+0x9/0x20 [ 469.175363][T25477] __kmalloc+0x7a/0x340 02:44:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\v', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 469.179519][T25477] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 469.185245][T25477] tomoyo_realpath_from_path+0xdc/0x7c0 [ 469.190800][T25477] tomoyo_path_number_perm+0x166/0x640 [ 469.196270][T25477] ? rcu_read_lock_sched_held+0x10b/0x170 [ 469.201986][T25477] ? trace_kmem_cache_free+0xb2/0x110 [ 469.207631][T25477] tomoyo_path_mkdir+0x9c/0xc0 [ 469.212407][T25477] security_path_mkdir+0xed/0x170 [ 469.217524][T25477] do_mkdirat+0x15c/0x320 [ 469.221863][T25477] __x64_sys_mkdir+0x60/0x70 02:44:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 469.227775][T25477] do_syscall_64+0xf7/0x1c0 [ 469.232276][T25477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 469.238267][T25477] RIP: 0033:0x459637 [ 469.242175][T25477] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 469.262433][T25477] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 469.270999][T25477] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 469.278981][T25477] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 469.286947][T25477] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 469.294919][T25477] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 469.302972][T25477] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 469.311968][T25477] ERROR: Out of memory at tomoyo_realpath_from_path. 02:44:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x05', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:46 executing program 1 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x13', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x06', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x03', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 469.796774][T25533] FAULT_INJECTION: forcing a failure. [ 469.796774][T25533] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 469.810092][T25533] CPU: 0 PID: 25533 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 469.817899][T25533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.828226][T25533] Call Trace: [ 469.831526][T25533] dump_stack+0x1fb/0x318 [ 469.835872][T25533] should_fail+0x555/0x770 [ 469.840392][T25533] should_fail_alloc_page+0x55/0x60 [ 469.845611][T25533] prepare_alloc_pages+0x283/0x460 [ 469.851091][T25533] __alloc_pages_nodemask+0xb2/0x5d0 [ 469.856571][T25533] kmem_getpages+0x4d/0xa00 [ 469.861174][T25533] cache_grow_begin+0x7e/0x2c0 [ 469.865974][T25533] cache_alloc_refill+0x311/0x3f0 [ 469.871381][T25533] ? check_preemption_disabled+0xb7/0x2a0 [ 469.877116][T25533] __kmalloc+0x318/0x340 [ 469.881369][T25533] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 469.887102][T25533] tomoyo_realpath_from_path+0xdc/0x7c0 [ 469.892736][T25533] tomoyo_path_number_perm+0x166/0x640 [ 469.898467][T25533] ? rcu_read_lock_sched_held+0x10b/0x170 [ 469.904183][T25533] ? trace_kmem_cache_free+0xb2/0x110 [ 469.909536][T25533] tomoyo_path_mkdir+0x9c/0xc0 [ 469.914285][T25533] security_path_mkdir+0xed/0x170 [ 469.919402][T25533] do_mkdirat+0x15c/0x320 [ 469.923802][T25533] __x64_sys_mkdir+0x60/0x70 [ 469.928385][T25533] do_syscall_64+0xf7/0x1c0 [ 469.932877][T25533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 469.938762][T25533] RIP: 0033:0x459637 [ 469.943431][T25533] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 469.963374][T25533] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 469.971801][T25533] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 469.979928][T25533] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 469.988228][T25533] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 02:44:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\f', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 469.996182][T25533] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 470.004140][T25533] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\a', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:47 executing program 1 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x2}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 470.362202][T25557] FAULT_INJECTION: forcing a failure. [ 470.362202][T25557] name failslab, interval 1, probability 0, space 0, times 0 [ 470.397698][T25557] CPU: 0 PID: 25557 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 470.405635][T25557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.415677][T25557] Call Trace: [ 470.419064][T25557] dump_stack+0x1fb/0x318 [ 470.423481][T25557] should_fail+0x555/0x770 [ 470.427900][T25557] __should_failslab+0x11a/0x160 [ 470.432827][T25557] ? security_inode_alloc+0x36/0x1e0 [ 470.438095][T25557] should_failslab+0x9/0x20 [ 470.442671][T25557] kmem_cache_alloc+0x56/0x2e0 [ 470.447499][T25557] security_inode_alloc+0x36/0x1e0 [ 470.452607][T25557] inode_init_always+0x3b5/0x920 [ 470.457529][T25557] ? set_qf_name+0x3c0/0x3c0 [ 470.462099][T25557] new_inode_pseudo+0x7f/0x240 [ 470.467454][T25557] new_inode+0x28/0x1c0 [ 470.472118][T25557] ? trace_ext4_request_inode+0x28b/0x2d0 [ 470.478100][T25557] __ext4_new_inode+0x43d/0x5650 [ 470.483037][T25557] ? memset+0x31/0x40 [ 470.487021][T25557] ? smk_curacc+0xa3/0xe0 [ 470.491455][T25557] ext4_mkdir+0x3f5/0x1450 [ 470.495856][T25557] ? security_inode_permission+0xdd/0x120 [ 470.501571][T25557] vfs_mkdir+0x43f/0x610 [ 470.506233][T25557] do_mkdirat+0x1d7/0x320 [ 470.510546][T25557] __x64_sys_mkdir+0x60/0x70 [ 470.515130][T25557] do_syscall_64+0xf7/0x1c0 [ 470.519622][T25557] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.525491][T25557] RIP: 0033:0x459637 [ 470.529383][T25557] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 470.549243][T25557] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 02:44:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\r', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 470.557680][T25557] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 470.566895][T25557] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 470.574859][T25557] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 470.582836][T25557] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 470.590801][T25557] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x14', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:47 executing program 1 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) [ 470.811537][T25589] FAULT_INJECTION: forcing a failure. [ 470.811537][T25589] name failslab, interval 1, probability 0, space 0, times 0 [ 470.824793][T25589] CPU: 1 PID: 25589 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 470.832614][T25589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.842694][T25589] Call Trace: [ 470.846004][T25589] dump_stack+0x1fb/0x318 [ 470.850354][T25589] should_fail+0x555/0x770 [ 470.854779][T25589] __should_failslab+0x11a/0x160 [ 470.859711][T25589] ? security_inode_alloc+0x36/0x1e0 [ 470.864991][T25589] should_failslab+0x9/0x20 [ 470.869485][T25589] kmem_cache_alloc+0x56/0x2e0 [ 470.874939][T25589] security_inode_alloc+0x36/0x1e0 [ 470.880067][T25589] inode_init_always+0x3b5/0x920 [ 470.884994][T25589] ? set_qf_name+0x3c0/0x3c0 [ 470.889572][T25589] new_inode_pseudo+0x7f/0x240 [ 470.894314][T25589] new_inode+0x28/0x1c0 [ 470.898448][T25589] ? trace_ext4_request_inode+0x28b/0x2d0 [ 470.904152][T25589] __ext4_new_inode+0x43d/0x5650 [ 470.909080][T25589] ? memset+0x31/0x40 [ 470.913157][T25589] ? smk_curacc+0xa3/0xe0 [ 470.917479][T25589] ext4_mkdir+0x3f5/0x1450 [ 470.922019][T25589] ? security_inode_permission+0xdd/0x120 [ 470.927728][T25589] vfs_mkdir+0x43f/0x610 [ 470.931955][T25589] do_mkdirat+0x1d7/0x320 [ 470.936440][T25589] __x64_sys_mkdir+0x60/0x70 [ 470.941101][T25589] do_syscall_64+0xf7/0x1c0 [ 470.945583][T25589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.951539][T25589] RIP: 0033:0x459637 [ 470.955413][T25589] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 470.974995][T25589] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 470.983383][T25589] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 470.991332][T25589] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 470.999290][T25589] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 471.007238][T25589] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 471.015200][T25589] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x0e', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:48 executing program 1 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x3}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\b', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 471.259776][T25598] FAULT_INJECTION: forcing a failure. [ 471.259776][T25598] name failslab, interval 1, probability 0, space 0, times 0 02:44:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x05', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 471.354493][T25598] CPU: 1 PID: 25598 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 471.362340][T25598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.372456][T25598] Call Trace: [ 471.375847][T25598] dump_stack+0x1fb/0x318 [ 471.380283][T25598] should_fail+0x555/0x770 [ 471.384729][T25598] __should_failslab+0x11a/0x160 [ 471.389693][T25598] ? kcalloc+0x2f/0x50 [ 471.389706][T25598] should_failslab+0x9/0x20 [ 471.389716][T25598] __kmalloc+0x7a/0x340 [ 471.389728][T25598] kcalloc+0x2f/0x50 [ 471.389738][T25598] ext4_find_extent+0x216/0xaa0 [ 471.389749][T25598] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 471.389763][T25598] ext4_ext_map_blocks+0x170/0x7170 [ 471.398319][T25598] ? __kasan_check_write+0x14/0x20 [ 471.398329][T25598] ? __down_read+0x14b/0x360 [ 471.398346][T25598] ext4_map_blocks+0x424/0x1e30 [ 471.406356][T25598] ? __kasan_check_write+0x14/0x20 [ 471.406372][T25598] ext4_getblk+0xae/0x460 [ 471.406390][T25598] ext4_bread+0x4a/0x340 [ 471.406403][T25598] ext4_append+0x175/0x310 [ 471.406417][T25598] ext4_mkdir+0x7ad/0x1450 [ 471.418016][T25598] vfs_mkdir+0x43f/0x610 [ 471.418033][T25598] do_mkdirat+0x1d7/0x320 [ 471.418051][T25598] __x64_sys_mkdir+0x60/0x70 [ 471.428340][T25598] do_syscall_64+0xf7/0x1c0 [ 471.428356][T25598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 471.428366][T25598] RIP: 0033:0x459637 02:44:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x15', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 471.428374][T25598] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 471.428382][T25598] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 471.438730][T25598] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 471.438736][T25598] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 471.438741][T25598] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 471.438746][T25598] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 471.438752][T25598] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:48 executing program 1 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x10', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x06', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 471.967735][T25649] FAULT_INJECTION: forcing a failure. [ 471.967735][T25649] name failslab, interval 1, probability 0, space 0, times 0 [ 472.102710][T25649] CPU: 0 PID: 25649 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 472.110555][T25649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.120617][T25649] Call Trace: [ 472.120637][T25649] dump_stack+0x1fb/0x318 [ 472.120654][T25649] should_fail+0x555/0x770 [ 472.120671][T25649] __should_failslab+0x11a/0x160 [ 472.120684][T25649] ? smack_inode_init_security+0x3cf/0x490 [ 472.120695][T25649] should_failslab+0x9/0x20 02:44:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x16', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x4}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 472.120706][T25649] __kmalloc_track_caller+0x79/0x340 [ 472.120720][T25649] kstrdup+0x34/0x70 [ 472.120731][T25649] smack_inode_init_security+0x3cf/0x490 [ 472.120747][T25649] security_inode_init_security+0xfe/0x310 [ 472.120756][T25649] ? ext4_init_security+0x40/0x40 [ 472.120778][T25649] ext4_init_security+0x34/0x40 [ 472.120791][T25649] __ext4_new_inode+0x446c/0x5650 [ 472.120816][T25649] ? smk_curacc+0xa3/0xe0 [ 472.187940][T25649] ext4_mkdir+0x3f5/0x1450 [ 472.192376][T25649] ? security_inode_permission+0xdd/0x120 [ 472.198126][T25649] vfs_mkdir+0x43f/0x610 [ 472.202388][T25649] do_mkdirat+0x1d7/0x320 [ 472.206894][T25649] __x64_sys_mkdir+0x60/0x70 [ 472.211487][T25649] do_syscall_64+0xf7/0x1c0 [ 472.215990][T25649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.216001][T25649] RIP: 0033:0x459637 [ 472.216012][T25649] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.216018][T25649] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 472.216027][T25649] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 472.216038][T25649] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 472.225880][T25649] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 472.225887][T25649] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 472.225893][T25649] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:49 executing program 1 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x11', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\n', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\a', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 472.895949][T25700] FAULT_INJECTION: forcing a failure. [ 472.895949][T25700] name failslab, interval 1, probability 0, space 0, times 0 02:44:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x5}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x17', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 473.019271][T25700] CPU: 0 PID: 25700 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 473.027115][T25700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.037280][T25700] Call Trace: [ 473.040700][T25700] dump_stack+0x1fb/0x318 [ 473.045814][T25700] should_fail+0x555/0x770 [ 473.050243][T25700] __should_failslab+0x11a/0x160 [ 473.055182][T25700] ? kcalloc+0x2f/0x50 [ 473.059237][T25700] should_failslab+0x9/0x20 [ 473.063791][T25700] __kmalloc+0x7a/0x340 [ 473.067929][T25700] kcalloc+0x2f/0x50 [ 473.071819][T25700] ext4_find_extent+0x216/0xaa0 [ 473.076691][T25700] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 473.083009][T25700] ext4_ext_map_blocks+0x170/0x7170 [ 473.088210][T25700] ? __kasan_check_write+0x14/0x20 [ 473.093312][T25700] ? __down_read+0x14b/0x360 [ 473.098050][T25700] ext4_map_blocks+0x424/0x1e30 [ 473.102901][T25700] ? __kasan_check_write+0x14/0x20 [ 473.108009][T25700] ext4_getblk+0xae/0x460 [ 473.112351][T25700] ext4_bread+0x4a/0x340 [ 473.116592][T25700] ext4_append+0x175/0x310 [ 473.120994][T25700] ext4_mkdir+0x7ad/0x1450 [ 473.125721][T25700] vfs_mkdir+0x43f/0x610 [ 473.129973][T25700] do_mkdirat+0x1d7/0x320 [ 473.134309][T25700] __x64_sys_mkdir+0x60/0x70 [ 473.138894][T25700] do_syscall_64+0xf7/0x1c0 [ 473.143387][T25700] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.150143][T25700] RIP: 0033:0x459637 [ 473.154034][T25700] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 473.173678][T25700] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 473.182109][T25700] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 473.190083][T25700] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 473.198048][T25700] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 473.206024][T25700] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 473.215733][T25700] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x12', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\b', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\v', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:50 executing program 1 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x18', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs%', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 473.831046][T25759] FAULT_INJECTION: forcing a failure. [ 473.831046][T25759] name failslab, interval 1, probability 0, space 0, times 0 [ 473.844218][T25759] CPU: 1 PID: 25759 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 473.852046][T25759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.862099][T25759] Call Trace: [ 473.862183][T25759] dump_stack+0x1fb/0x318 [ 473.869780][T25759] should_fail+0x555/0x770 [ 473.874206][T25759] __should_failslab+0x11a/0x160 [ 473.879146][T25759] ? __es_insert_extent+0x7ba/0x17c0 [ 473.884433][T25759] should_failslab+0x9/0x20 [ 473.888939][T25759] kmem_cache_alloc+0x56/0x2e0 [ 473.893715][T25759] __es_insert_extent+0x7ba/0x17c0 [ 473.898833][T25759] ? __kasan_check_write+0x14/0x20 [ 473.903944][T25759] ? do_raw_write_lock+0xf3/0x460 [ 473.908984][T25759] ext4_es_insert_extent+0x250/0x2ea0 [ 473.914366][T25759] ext4_ext_map_blocks+0x1806/0x7170 [ 473.919673][T25759] ? __down_read+0x14b/0x360 [ 473.924259][T25759] ext4_map_blocks+0x424/0x1e30 [ 473.929104][T25759] ? __kasan_check_write+0x14/0x20 [ 473.934220][T25759] ext4_getblk+0xae/0x460 [ 473.938559][T25759] ext4_bread+0x4a/0x340 [ 473.942802][T25759] ext4_append+0x175/0x310 [ 473.947211][T25759] ext4_mkdir+0x7ad/0x1450 [ 473.947237][T25759] vfs_mkdir+0x43f/0x610 [ 473.955882][T25759] do_mkdirat+0x1d7/0x320 [ 473.955900][T25759] __x64_sys_mkdir+0x60/0x70 [ 473.955914][T25759] do_syscall_64+0xf7/0x1c0 [ 473.955928][T25759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.955936][T25759] RIP: 0033:0x459637 02:44:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x6}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 473.955954][T25759] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 473.979076][T25759] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 473.979087][T25759] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 473.979093][T25759] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 473.979099][T25759] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 473.979105][T25759] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 473.979111][T25759] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\f', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x19', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:51 executing program 1 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\\', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\r', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\n', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 474.742284][T25821] FAULT_INJECTION: forcing a failure. [ 474.742284][T25821] name failslab, interval 1, probability 0, space 0, times 0 [ 474.755236][T25821] CPU: 0 PID: 25821 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 474.763045][T25821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.773188][T25821] Call Trace: [ 474.776474][T25821] dump_stack+0x1fb/0x318 [ 474.780794][T25821] should_fail+0x555/0x770 [ 474.785198][T25821] __should_failslab+0x11a/0x160 [ 474.790125][T25821] ? kcalloc+0x2f/0x50 [ 474.794182][T25821] should_failslab+0x9/0x20 [ 474.798662][T25821] __kmalloc+0x7a/0x340 [ 474.802826][T25821] kcalloc+0x2f/0x50 [ 474.806725][T25821] ext4_find_extent+0x216/0xaa0 [ 474.811566][T25821] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 474.817883][T25821] ext4_ext_map_blocks+0x170/0x7170 [ 474.823119][T25821] ? trace_lock_acquire+0x159/0x1d0 [ 474.828317][T25821] ? __kasan_check_write+0x14/0x20 [ 474.833413][T25821] ext4_map_blocks+0x8f4/0x1e30 [ 474.838267][T25821] ? __kasan_check_write+0x14/0x20 [ 474.843501][T25821] ext4_getblk+0xae/0x460 [ 474.847830][T25821] ext4_bread+0x4a/0x340 [ 474.852082][T25821] ext4_append+0x175/0x310 [ 474.856492][T25821] ext4_mkdir+0x7ad/0x1450 [ 474.860901][T25821] vfs_mkdir+0x43f/0x610 [ 474.865126][T25821] do_mkdirat+0x1d7/0x320 [ 474.869447][T25821] __x64_sys_mkdir+0x60/0x70 [ 474.874027][T25821] do_syscall_64+0xf7/0x1c0 [ 474.878509][T25821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.884378][T25821] RIP: 0033:0x459637 [ 474.888273][T25821] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 474.909007][T25821] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 474.917413][T25821] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 474.925370][T25821] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 474.933327][T25821] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 474.941374][T25821] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 474.949335][T25821] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x7}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x1a', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:52 executing program 1 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\v', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 475.544503][T25862] FAULT_INJECTION: forcing a failure. [ 475.544503][T25862] name failslab, interval 1, probability 0, space 0, times 0 02:44:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x0e', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x1b', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 475.642218][T25862] CPU: 0 PID: 25862 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 475.650174][T25862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.660237][T25862] Call Trace: [ 475.663539][T25862] dump_stack+0x1fb/0x318 [ 475.668144][T25862] should_fail+0x555/0x770 [ 475.672575][T25862] __should_failslab+0x11a/0x160 [ 475.677522][T25862] ? ext4_mb_new_blocks+0x2ac/0x2cc0 [ 475.682822][T25862] should_failslab+0x9/0x20 [ 475.687340][T25862] kmem_cache_alloc+0x56/0x2e0 [ 475.692103][T25862] ext4_mb_new_blocks+0x2ac/0x2cc0 [ 475.697203][T25862] ? trace_kmalloc+0xcd/0x130 [ 475.701861][T25862] ? kcalloc+0x2f/0x50 [ 475.705911][T25862] ? __kmalloc+0x26c/0x340 [ 475.710315][T25862] ? kcalloc+0x2f/0x50 [ 475.714389][T25862] ? ext4_ext_search_right+0x4cb/0x940 [ 475.719855][T25862] ? ext4_find_extent+0x8e0/0xaa0 [ 475.724870][T25862] ? ext4_inode_to_goal_block+0x27b/0x3b0 [ 475.730569][T25862] ext4_ext_map_blocks+0x4b8c/0x7170 [ 475.735917][T25862] ext4_map_blocks+0x8f4/0x1e30 [ 475.740758][T25862] ? __kasan_check_write+0x14/0x20 [ 475.745856][T25862] ext4_getblk+0xae/0x460 [ 475.750169][T25862] ext4_bread+0x4a/0x340 [ 475.754391][T25862] ext4_append+0x175/0x310 [ 475.758792][T25862] ext4_mkdir+0x7ad/0x1450 [ 475.763213][T25862] vfs_mkdir+0x43f/0x610 [ 475.767436][T25862] do_mkdirat+0x1d7/0x320 [ 475.771771][T25862] __x64_sys_mkdir+0x60/0x70 [ 475.776341][T25862] do_syscall_64+0xf7/0x1c0 [ 475.780838][T25862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.786716][T25862] RIP: 0033:0x459637 [ 475.790602][T25862] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 475.810211][T25862] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 475.818611][T25862] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 475.826575][T25862] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 475.834528][T25862] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 475.842482][T25862] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 475.850435][T25862] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:52 executing program 1 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x8}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 476.156413][T25894] FAULT_INJECTION: forcing a failure. [ 476.156413][T25894] name failslab, interval 1, probability 0, space 0, times 0 [ 476.169825][T25894] CPU: 1 PID: 25894 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 476.178232][T25894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.188275][T25894] Call Trace: [ 476.191613][T25894] dump_stack+0x1fb/0x318 [ 476.195941][T25894] should_fail+0x555/0x770 [ 476.195960][T25894] __should_failslab+0x11a/0x160 [ 476.195975][T25894] should_failslab+0x9/0x20 [ 476.195991][T25894] kmem_cache_alloc_trace+0x5d/0x2f0 [ 476.209796][T25894] ? smack_d_instantiate+0x962/0xd70 [ 476.209810][T25894] smack_d_instantiate+0x962/0xd70 [ 476.209828][T25894] ? lockdep_init_map+0x2a/0x680 [ 476.209843][T25894] security_d_instantiate+0xa5/0x100 [ 476.209855][T25894] d_instantiate_new+0x65/0x120 [ 476.209868][T25894] ext4_mkdir+0xfa9/0x1450 [ 476.209892][T25894] vfs_mkdir+0x43f/0x610 [ 476.209908][T25894] do_mkdirat+0x1d7/0x320 [ 476.220446][T25894] __x64_sys_mkdir+0x60/0x70 [ 476.220461][T25894] do_syscall_64+0xf7/0x1c0 [ 476.220477][T25894] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.220485][T25894] RIP: 0033:0x459637 [ 476.220495][T25894] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.220500][T25894] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 476.220510][T25894] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 476.220519][T25894] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 476.316465][T25894] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 476.324422][T25894] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 476.332376][T25894] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\f', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:53 executing program 1 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x10', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x02', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x1c', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\r', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 476.826489][T25937] FAULT_INJECTION: forcing a failure. [ 476.826489][T25937] name failslab, interval 1, probability 0, space 0, times 0 02:44:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x11', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 476.888070][T25937] CPU: 0 PID: 25937 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 476.895915][T25937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.895921][T25937] Call Trace: [ 476.895938][T25937] dump_stack+0x1fb/0x318 [ 476.895956][T25937] should_fail+0x555/0x770 [ 476.895972][T25937] __should_failslab+0x11a/0x160 [ 476.923030][T25937] ? kzalloc+0x1f/0x40 [ 476.923043][T25937] should_failslab+0x9/0x20 [ 476.923056][T25937] __kmalloc+0x7a/0x340 [ 476.923070][T25937] kzalloc+0x1f/0x40 [ 476.923078][T25937] smk_parse_smack+0x197/0x230 [ 476.923090][T25937] smk_import_entry+0x27/0x590 [ 476.931630][T25937] smack_d_instantiate+0x78f/0xd70 [ 476.931649][T25937] ? lockdep_init_map+0x2a/0x680 [ 476.931663][T25937] security_d_instantiate+0xa5/0x100 [ 476.931676][T25937] d_instantiate_new+0x65/0x120 [ 476.931693][T25937] ext4_mkdir+0xfa9/0x1450 [ 476.931717][T25937] vfs_mkdir+0x43f/0x610 [ 476.931732][T25937] do_mkdirat+0x1d7/0x320 [ 476.931746][T25937] __x64_sys_mkdir+0x60/0x70 [ 476.931757][T25937] do_syscall_64+0xf7/0x1c0 [ 476.931771][T25937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.931779][T25937] RIP: 0033:0x459637 [ 476.931788][T25937] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.931794][T25937] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 476.931804][T25937] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 476.931810][T25937] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 476.931815][T25937] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 476.931820][T25937] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 476.931824][T25937] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x9}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x1d', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:54 executing program 1 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x06', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 477.498632][T25971] FAULT_INJECTION: forcing a failure. [ 477.498632][T25971] name failslab, interval 1, probability 0, space 0, times 0 [ 477.529216][T25971] CPU: 0 PID: 25971 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 477.537066][T25971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.547115][T25971] Call Trace: [ 477.547136][T25971] dump_stack+0x1fb/0x318 [ 477.547153][T25971] should_fail+0x555/0x770 [ 477.547168][T25971] __should_failslab+0x11a/0x160 [ 477.547177][T25971] ? ksys_mount+0x38/0x100 [ 477.547188][T25971] should_failslab+0x9/0x20 [ 477.547200][T25971] __kmalloc_track_caller+0x79/0x340 [ 477.547212][T25971] strndup_user+0x76/0x130 [ 477.547227][T25971] ksys_mount+0x38/0x100 [ 477.547239][T25971] __x64_sys_mount+0xbf/0xd0 [ 477.547255][T25971] do_syscall_64+0xf7/0x1c0 [ 477.547269][T25971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.602026][T25971] RIP: 0033:0x45cc6a [ 477.606271][T25971] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 477.625896][T25971] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 477.625907][T25971] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a 02:44:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x0e', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 477.625914][T25971] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 477.625920][T25971] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 477.625926][T25971] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 477.625931][T25971] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x12', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:54 executing program 1 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x1e', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 478.153972][T26013] FAULT_INJECTION: forcing a failure. [ 478.153972][T26013] name failslab, interval 1, probability 0, space 0, times 0 [ 478.179105][T26013] CPU: 0 PID: 26013 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 478.186959][T26013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.197027][T26013] Call Trace: [ 478.200333][T26013] dump_stack+0x1fb/0x318 [ 478.204681][T26013] should_fail+0x555/0x770 [ 478.209113][T26013] __should_failslab+0x11a/0x160 [ 478.214065][T26013] should_failslab+0x9/0x20 [ 478.218573][T26013] kmem_cache_alloc_trace+0x5d/0x2f0 [ 478.223851][T26013] ? smack_d_instantiate+0x962/0xd70 [ 478.229146][T26013] smack_d_instantiate+0x962/0xd70 [ 478.234244][T26013] ? lockdep_init_map+0x2a/0x680 [ 478.239368][T26013] security_d_instantiate+0xa5/0x100 [ 478.244655][T26013] d_instantiate_new+0x65/0x120 [ 478.249495][T26013] ext4_mkdir+0xfa9/0x1450 [ 478.253904][T26013] vfs_mkdir+0x43f/0x610 [ 478.258264][T26013] do_mkdirat+0x1d7/0x320 [ 478.262596][T26013] __x64_sys_mkdir+0x60/0x70 [ 478.267186][T26013] do_syscall_64+0xf7/0x1c0 [ 478.271692][T26013] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.277578][T26013] RIP: 0033:0x459637 [ 478.281460][T26013] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:44:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0xa}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 478.301107][T26013] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 478.309513][T26013] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 478.317487][T26013] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 478.325453][T26013] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 478.333501][T26013] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 478.341471][T26013] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs%', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x10', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:55 executing program 1 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs!', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 478.835976][T26055] FAULT_INJECTION: forcing a failure. [ 478.835976][T26055] name failslab, interval 1, probability 0, space 0, times 0 [ 478.869186][T26055] CPU: 0 PID: 26055 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 478.877021][T26055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.887075][T26055] Call Trace: [ 478.887095][T26055] dump_stack+0x1fb/0x318 [ 478.887112][T26055] should_fail+0x555/0x770 [ 478.887127][T26055] __should_failslab+0x11a/0x160 [ 478.887138][T26055] ? kzalloc+0x1f/0x40 [ 478.887148][T26055] should_failslab+0x9/0x20 [ 478.887158][T26055] __kmalloc+0x7a/0x340 [ 478.887171][T26055] kzalloc+0x1f/0x40 [ 478.887179][T26055] smk_parse_smack+0x197/0x230 [ 478.887191][T26055] smk_import_entry+0x27/0x590 [ 478.930301][T26055] smack_d_instantiate+0x78f/0xd70 [ 478.935432][T26055] ? lockdep_init_map+0x2a/0x680 [ 478.940392][T26055] security_d_instantiate+0xa5/0x100 [ 478.945692][T26055] d_instantiate_new+0x65/0x120 [ 478.950559][T26055] ext4_mkdir+0xfa9/0x1450 [ 478.955004][T26055] vfs_mkdir+0x43f/0x610 [ 478.959261][T26055] do_mkdirat+0x1d7/0x320 [ 478.963603][T26055] __x64_sys_mkdir+0x60/0x70 [ 478.968198][T26055] do_syscall_64+0xf7/0x1c0 [ 478.972707][T26055] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.978598][T26055] RIP: 0033:0x459637 [ 478.982490][T26055] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 479.002097][T26055] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 479.002107][T26055] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459637 [ 479.002113][T26055] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 479.002119][T26055] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 02:44:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0xb}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 479.002125][T26055] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 479.002131][T26055] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsH', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x11', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:56 executing program 1 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\"', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsL', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 479.526193][T26099] FAULT_INJECTION: forcing a failure. [ 479.526193][T26099] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 479.539423][T26099] CPU: 1 PID: 26099 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 479.539431][T26099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.539435][T26099] Call Trace: [ 479.539451][T26099] dump_stack+0x1fb/0x318 [ 479.539468][T26099] should_fail+0x555/0x770 [ 479.539484][T26099] should_fail_alloc_page+0x55/0x60 [ 479.539493][T26099] prepare_alloc_pages+0x283/0x460 [ 479.539505][T26099] __alloc_pages_nodemask+0xb2/0x5d0 [ 479.539524][T26099] kmem_getpages+0x4d/0xa00 [ 479.589319][T26099] cache_grow_begin+0x7e/0x2c0 [ 479.594168][T26099] cache_alloc_refill+0x311/0x3f0 [ 479.599173][T26099] ? check_preemption_disabled+0xb7/0x2a0 [ 479.604873][T26099] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 479.610221][T26099] ? copy_mount_options+0x5f/0x3c0 [ 479.615312][T26099] copy_mount_options+0x5f/0x3c0 [ 479.620226][T26099] ksys_mount+0xa0/0x100 [ 479.624458][T26099] __x64_sys_mount+0xbf/0xd0 [ 479.629042][T26099] do_syscall_64+0xf7/0x1c0 [ 479.633525][T26099] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.639394][T26099] RIP: 0033:0x45cc6a [ 479.643267][T26099] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 479.663454][T26099] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 479.671840][T26099] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 479.679790][T26099] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 479.687739][T26099] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 479.695699][T26099] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 479.704016][T26099] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0xc}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x12', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs#', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:57 executing program 1 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\\', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 480.319391][T26143] FAULT_INJECTION: forcing a failure. [ 480.319391][T26143] name failslab, interval 1, probability 0, space 0, times 0 [ 480.359138][T26143] CPU: 1 PID: 26143 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 480.366990][T26143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.377045][T26143] Call Trace: [ 480.377063][T26143] dump_stack+0x1fb/0x318 [ 480.377079][T26143] should_fail+0x555/0x770 [ 480.389096][T26143] __should_failslab+0x11a/0x160 [ 480.394042][T26143] ? ksys_mount+0x38/0x100 [ 480.398469][T26143] should_failslab+0x9/0x20 [ 480.402973][T26143] __kmalloc_track_caller+0x79/0x340 [ 480.408349][T26143] strndup_user+0x76/0x130 [ 480.412767][T26143] ksys_mount+0x38/0x100 02:44:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs%', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 480.417008][T26143] __x64_sys_mount+0xbf/0xd0 [ 480.421588][T26143] do_syscall_64+0xf7/0x1c0 [ 480.426073][T26143] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.431949][T26143] RIP: 0033:0x45cc6a [ 480.435839][T26143] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 480.455436][T26143] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 480.455447][T26143] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 480.455453][T26143] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 480.455459][T26143] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 480.455465][T26143] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 480.455471][T26143] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0xd}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:57 executing program 1 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs$', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsh', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 480.966953][T26182] FAULT_INJECTION: forcing a failure. [ 480.966953][T26182] name failslab, interval 1, probability 0, space 0, times 0 [ 480.980547][T26182] CPU: 0 PID: 26182 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 480.988364][T26182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.998422][T26182] Call Trace: [ 481.001715][T26182] dump_stack+0x1fb/0x318 [ 481.006053][T26182] should_fail+0x555/0x770 [ 481.006074][T26182] __should_failslab+0x11a/0x160 [ 481.006087][T26182] ? tomoyo_encode2+0x273/0x5a0 [ 481.006103][T26182] should_failslab+0x9/0x20 [ 481.015436][T26182] __kmalloc+0x7a/0x340 [ 481.015453][T26182] tomoyo_encode2+0x273/0x5a0 [ 481.015469][T26182] tomoyo_encode+0x29/0x40 [ 481.015479][T26182] tomoyo_mount_permission+0x216/0xa30 [ 481.015494][T26182] ? filename_lookup+0x4b0/0x690 [ 481.015511][T26182] ? kmem_cache_free+0xd8/0xf0 [ 481.015537][T26182] tomoyo_sb_mount+0x35/0x40 [ 481.058009][T26182] security_sb_mount+0x84/0xe0 [ 481.062770][T26182] do_mount+0x10a/0x2510 [ 481.067009][T26182] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 481.072559][T26182] ? copy_mount_options+0x5f/0x3c0 [ 481.077680][T26182] ? copy_mount_options+0x308/0x3c0 [ 481.082877][T26182] ksys_mount+0xcc/0x100 [ 481.087133][T26182] __x64_sys_mount+0xbf/0xd0 [ 481.091744][T26182] do_syscall_64+0xf7/0x1c0 [ 481.096258][T26182] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.102171][T26182] RIP: 0033:0x45cc6a [ 481.106202][T26182] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 481.125894][T26182] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 481.134298][T26182] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 481.142274][T26182] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 481.150241][T26182] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 481.158195][T26182] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 481.166160][T26182] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsH', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs%', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:58 executing program 1 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0xe}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:44:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsl', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 481.657029][T26230] FAULT_INJECTION: forcing a failure. [ 481.657029][T26230] name failslab, interval 1, probability 0, space 0, times 0 [ 481.719351][T26230] CPU: 0 PID: 26230 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 481.727209][T26230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.737267][T26230] Call Trace: [ 481.740564][T26230] dump_stack+0x1fb/0x318 [ 481.744897][T26230] should_fail+0x555/0x770 [ 481.749324][T26230] __should_failslab+0x11a/0x160 [ 481.754260][T26230] ? tomoyo_encode2+0x273/0x5a0 [ 481.759109][T26230] should_failslab+0x9/0x20 [ 481.763638][T26230] __kmalloc+0x7a/0x340 [ 481.767788][T26230] tomoyo_encode2+0x273/0x5a0 [ 481.772459][T26230] tomoyo_encode+0x29/0x40 [ 481.776876][T26230] tomoyo_mount_permission+0x216/0xa30 [ 481.782328][T26230] ? filename_lookup+0x4b0/0x690 [ 481.787259][T26230] ? kmem_cache_free+0xd8/0xf0 [ 481.792138][T26230] tomoyo_sb_mount+0x35/0x40 [ 481.796718][T26230] security_sb_mount+0x84/0xe0 [ 481.801472][T26230] do_mount+0x10a/0x2510 [ 481.805815][T26230] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 481.811432][T26230] ? copy_mount_options+0x5f/0x3c0 [ 481.816597][T26230] ? copy_mount_options+0x308/0x3c0 [ 481.821783][T26230] ksys_mount+0xcc/0x100 [ 481.826056][T26230] __x64_sys_mount+0xbf/0xd0 [ 481.830635][T26230] do_syscall_64+0xf7/0x1c0 [ 481.835131][T26230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.841009][T26230] RIP: 0033:0x45cc6a [ 481.844884][T26230] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 02:44:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsL', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 481.864469][T26230] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 481.872873][T26230] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 481.880854][T26230] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 481.888822][T26230] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 481.896810][T26230] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 481.904768][T26230] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfst', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:59 executing program 1 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\\', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:44:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs&', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0xf}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 482.426830][T26272] FAULT_INJECTION: forcing a failure. [ 482.426830][T26272] name failslab, interval 1, probability 0, space 0, times 0 [ 482.489141][T26272] CPU: 0 PID: 26272 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 482.496995][T26272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.507079][T26272] Call Trace: [ 482.510377][T26272] dump_stack+0x1fb/0x318 [ 482.514723][T26272] should_fail+0x555/0x770 [ 482.519152][T26272] __should_failslab+0x11a/0x160 [ 482.524099][T26272] ? getname_flags+0xba/0x640 [ 482.528870][T26272] should_failslab+0x9/0x20 [ 482.533382][T26272] kmem_cache_alloc+0x56/0x2e0 [ 482.538158][T26272] getname_flags+0xba/0x640 [ 482.542675][T26272] user_path_at_empty+0x2d/0x50 [ 482.547536][T26272] do_mount+0xd7/0x2510 [ 482.551705][T26272] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 482.557250][T26272] ? copy_mount_options+0x5f/0x3c0 [ 482.562367][T26272] ? __kasan_check_read+0x11/0x20 [ 482.567392][T26272] ? copy_mount_options+0x308/0x3c0 [ 482.572598][T26272] ksys_mount+0xcc/0x100 [ 482.576880][T26272] __x64_sys_mount+0xbf/0xd0 [ 482.581484][T26272] do_syscall_64+0xf7/0x1c0 [ 482.586005][T26272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.591904][T26272] RIP: 0033:0x45cc6a [ 482.595802][T26272] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 482.615533][T26272] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 482.615545][T26272] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 482.615549][T26272] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 482.615554][T26272] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 482.615559][T26272] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 482.615563][T26272] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:44:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsh', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:44:59 executing program 1 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:44:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\'', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:44:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsz', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 483.114975][T26318] FAULT_INJECTION: forcing a failure. [ 483.114975][T26318] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 483.128215][T26318] CPU: 0 PID: 26318 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 483.136133][T26318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.146183][T26318] Call Trace: [ 483.146201][T26318] dump_stack+0x1fb/0x318 [ 483.146219][T26318] should_fail+0x555/0x770 [ 483.146238][T26318] should_fail_alloc_page+0x55/0x60 [ 483.146247][T26318] prepare_alloc_pages+0x283/0x460 [ 483.146261][T26318] __alloc_pages_nodemask+0xb2/0x5d0 [ 483.153864][T26318] kmem_getpages+0x4d/0xa00 [ 483.153879][T26318] cache_grow_begin+0x7e/0x2c0 [ 483.153894][T26318] cache_alloc_refill+0x311/0x3f0 [ 483.153905][T26318] ? check_preemption_disabled+0xb7/0x2a0 [ 483.153921][T26318] __kmalloc+0x318/0x340 [ 483.168614][T26318] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 483.168629][T26318] tomoyo_realpath_from_path+0xdc/0x7c0 [ 483.168649][T26318] tomoyo_mount_permission+0x294/0xa30 [ 483.168664][T26318] ? filename_lookup+0x4b0/0x690 [ 483.168682][T26318] ? kmem_cache_free+0xd8/0xf0 [ 483.168706][T26318] tomoyo_sb_mount+0x35/0x40 [ 483.190849][T26318] security_sb_mount+0x84/0xe0 [ 483.190866][T26318] do_mount+0x10a/0x2510 [ 483.190878][T26318] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 483.190887][T26318] ? copy_mount_options+0x5f/0x3c0 [ 483.190900][T26318] ? copy_mount_options+0x308/0x3c0 [ 483.190912][T26318] ksys_mount+0xcc/0x100 [ 483.190921][T26318] __x64_sys_mount+0xbf/0xd0 [ 483.190935][T26318] do_syscall_64+0xf7/0x1c0 [ 483.190948][T26318] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.190957][T26318] RIP: 0033:0x45cc6a [ 483.190966][T26318] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 483.190971][T26318] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 02:45:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsl', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:45:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:45:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x10}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 483.200907][T26318] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 483.200914][T26318] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 483.200921][T26318] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 483.200927][T26318] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 483.200933][T26318] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:00 executing program 1 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs(', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 483.781762][T26360] FAULT_INJECTION: forcing a failure. [ 483.781762][T26360] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 483.795005][T26360] CPU: 1 PID: 26360 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 483.803509][T26360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.813554][T26360] Call Trace: [ 483.816834][T26360] dump_stack+0x1fb/0x318 [ 483.821149][T26360] should_fail+0x555/0x770 [ 483.825551][T26360] should_fail_alloc_page+0x55/0x60 [ 483.830730][T26360] prepare_alloc_pages+0x283/0x460 [ 483.835822][T26360] __alloc_pages_nodemask+0xb2/0x5d0 [ 483.841089][T26360] kmem_getpages+0x4d/0xa00 [ 483.845571][T26360] cache_grow_begin+0x7e/0x2c0 [ 483.850332][T26360] cache_alloc_refill+0x311/0x3f0 [ 483.855424][T26360] ? check_preemption_disabled+0xb7/0x2a0 [ 483.861122][T26360] kmem_cache_alloc+0x2b9/0x2e0 [ 483.865948][T26360] ? getname_flags+0xba/0x640 [ 483.870605][T26360] getname_flags+0xba/0x640 [ 483.875101][T26360] user_path_at_empty+0x2d/0x50 [ 483.879943][T26360] do_mount+0xd7/0x2510 [ 483.884074][T26360] ? copy_mount_options+0x278/0x3c0 [ 483.889248][T26360] ? copy_mount_options+0x25e/0x3c0 [ 483.894424][T26360] ? copy_mount_options+0x264/0x3c0 [ 483.899611][T26360] ? copy_mount_options+0x308/0x3c0 [ 483.904789][T26360] ksys_mount+0xcc/0x100 [ 483.909009][T26360] __x64_sys_mount+0xbf/0xd0 [ 483.913579][T26360] do_syscall_64+0xf7/0x1c0 [ 483.918061][T26360] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.923931][T26360] RIP: 0033:0x45cc6a [ 483.927890][T26360] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 483.947511][T26360] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 483.955988][T26360] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 483.963939][T26360] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 483.971908][T26360] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 483.979871][T26360] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 483.987833][T26360] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:45:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:01 executing program 1 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfst', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:45:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x11}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 484.331945][T26392] FAULT_INJECTION: forcing a failure. [ 484.331945][T26392] name failslab, interval 1, probability 0, space 0, times 0 [ 484.347077][T26392] CPU: 1 PID: 26392 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 484.354936][T26392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.365073][T26392] Call Trace: [ 484.368388][T26392] dump_stack+0x1fb/0x318 [ 484.372750][T26392] should_fail+0x555/0x770 [ 484.377173][T26392] __should_failslab+0x11a/0x160 [ 484.382117][T26392] ? tomoyo_encode2+0x273/0x5a0 [ 484.386954][T26392] should_failslab+0x9/0x20 [ 484.391440][T26392] __kmalloc+0x7a/0x340 [ 484.395640][T26392] tomoyo_encode2+0x273/0x5a0 [ 484.400478][T26392] tomoyo_realpath_from_path+0x769/0x7c0 [ 484.406303][T26392] tomoyo_mount_permission+0x923/0xa30 [ 484.411754][T26392] ? kmem_cache_free+0xd8/0xf0 [ 484.416515][T26392] tomoyo_sb_mount+0x35/0x40 [ 484.421121][T26392] security_sb_mount+0x84/0xe0 [ 484.425868][T26392] do_mount+0x10a/0x2510 [ 484.430094][T26392] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 484.435822][T26392] ? copy_mount_options+0x5f/0x3c0 [ 484.440914][T26392] ? copy_mount_options+0x308/0x3c0 [ 484.446092][T26392] ksys_mount+0xcc/0x100 [ 484.450328][T26392] __x64_sys_mount+0xbf/0xd0 [ 484.454902][T26392] do_syscall_64+0xf7/0x1c0 [ 484.459487][T26392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.465358][T26392] RIP: 0033:0x45cc6a [ 484.469230][T26392] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 484.489889][T26392] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 484.498384][T26392] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 484.506356][T26392] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 484.514314][T26392] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 484.522267][T26392] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 484.530228][T26392] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 484.540001][T26392] ERROR: Out of memory at tomoyo_realpath_from_path. 02:45:01 executing program 1 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsH', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:45:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x02', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 484.924241][T26416] FAULT_INJECTION: forcing a failure. [ 484.924241][T26416] name failslab, interval 1, probability 0, space 0, times 0 [ 484.953780][T26416] CPU: 0 PID: 26416 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 484.961710][T26416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.961715][T26416] Call Trace: [ 484.961733][T26416] dump_stack+0x1fb/0x318 [ 484.961749][T26416] should_fail+0x555/0x770 [ 484.961766][T26416] __should_failslab+0x11a/0x160 [ 484.961776][T26416] ? getname_kernel+0x59/0x2f0 [ 484.961787][T26416] should_failslab+0x9/0x20 [ 484.961798][T26416] kmem_cache_alloc+0x56/0x2e0 [ 484.961810][T26416] getname_kernel+0x59/0x2f0 [ 484.979565][T26416] kern_path+0x1f/0x40 [ 484.979578][T26416] tomoyo_mount_permission+0x7f1/0xa30 [ 484.979602][T26416] ? kmem_cache_free+0xd8/0xf0 [ 484.979629][T26416] tomoyo_sb_mount+0x35/0x40 [ 484.979641][T26416] security_sb_mount+0x84/0xe0 [ 484.979654][T26416] do_mount+0x10a/0x2510 [ 484.979664][T26416] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 484.979671][T26416] ? copy_mount_options+0x5f/0x3c0 [ 484.979684][T26416] ? copy_mount_options+0x308/0x3c0 [ 484.979696][T26416] ksys_mount+0xcc/0x100 [ 484.979708][T26416] __x64_sys_mount+0xbf/0xd0 [ 484.979723][T26416] do_syscall_64+0xf7/0x1c0 [ 484.979738][T26416] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.979746][T26416] RIP: 0033:0x45cc6a [ 484.979765][T26416] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 485.057112][T26416] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 485.057124][T26416] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 485.057131][T26416] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 485.057137][T26416] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 485.057143][T26416] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 485.057149][T26416] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsz', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:45:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x06', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x12}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:45:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\b', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:45:02 executing program 1 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsL', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 485.636112][T26468] FAULT_INJECTION: forcing a failure. [ 485.636112][T26468] name failslab, interval 1, probability 0, space 0, times 0 [ 485.656557][T26468] CPU: 0 PID: 26468 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 485.664409][T26468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.664415][T26468] Call Trace: [ 485.664433][T26468] dump_stack+0x1fb/0x318 [ 485.664452][T26468] should_fail+0x555/0x770 [ 485.664468][T26468] __should_failslab+0x11a/0x160 [ 485.664481][T26468] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 485.664490][T26468] should_failslab+0x9/0x20 [ 485.664500][T26468] __kmalloc+0x7a/0x340 [ 485.664509][T26468] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 485.664523][T26468] tomoyo_realpath_from_path+0xdc/0x7c0 [ 485.664540][T26468] tomoyo_mount_permission+0x294/0xa30 [ 485.664556][T26468] ? filename_lookup+0x4b0/0x690 [ 485.682214][T26468] ? kmem_cache_free+0xd8/0xf0 [ 485.682247][T26468] tomoyo_sb_mount+0x35/0x40 [ 485.682266][T26468] security_sb_mount+0x84/0xe0 [ 485.682280][T26468] do_mount+0x10a/0x2510 [ 485.691595][T26468] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 485.691604][T26468] ? copy_mount_options+0x5f/0x3c0 [ 485.691618][T26468] ? copy_mount_options+0x308/0x3c0 [ 485.691631][T26468] ksys_mount+0xcc/0x100 [ 485.691643][T26468] __x64_sys_mount+0xbf/0xd0 [ 485.691658][T26468] do_syscall_64+0xf7/0x1c0 [ 485.691671][T26468] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.691680][T26468] RIP: 0033:0x45cc6a [ 485.691690][T26468] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 485.691695][T26468] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 485.691703][T26468] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 485.691709][T26468] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 485.691715][T26468] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 485.691721][T26468] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 485.691726][T26468] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 485.701318][T26468] ERROR: Out of memory at tomoyo_realpath_from_path. 02:45:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:45:03 executing program 1 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs ', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 486.209705][T26497] FAULT_INJECTION: forcing a failure. [ 486.209705][T26497] name failslab, interval 1, probability 0, space 0, times 0 [ 486.222578][T26497] CPU: 1 PID: 26497 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 486.230402][T26497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.230408][T26497] Call Trace: [ 486.230426][T26497] dump_stack+0x1fb/0x318 [ 486.230442][T26497] should_fail+0x555/0x770 [ 486.230459][T26497] __should_failslab+0x11a/0x160 02:45:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\\', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 486.230470][T26497] ? vfs_parse_fs_string+0xed/0x1a0 [ 486.230480][T26497] should_failslab+0x9/0x20 [ 486.230492][T26497] __kmalloc_track_caller+0x79/0x340 [ 486.230506][T26497] kmemdup_nul+0x2a/0xa0 [ 486.230516][T26497] vfs_parse_fs_string+0xed/0x1a0 [ 486.230532][T26497] do_mount+0x11b8/0x2510 [ 486.230548][T26497] ? copy_mount_options+0x308/0x3c0 [ 486.230560][T26497] ksys_mount+0xcc/0x100 [ 486.230571][T26497] __x64_sys_mount+0xbf/0xd0 [ 486.230584][T26497] do_syscall_64+0xf7/0x1c0 [ 486.230597][T26497] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.230605][T26497] RIP: 0033:0x45cc6a [ 486.230618][T26497] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 486.272653][T26497] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 486.272664][T26497] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 486.272671][T26497] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 02:45:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x25}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 486.272677][T26497] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 486.272682][T26497] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 486.272688][T26497] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:03 executing program 1 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 486.743914][T26531] FAULT_INJECTION: forcing a failure. [ 486.743914][T26531] name failslab, interval 1, probability 0, space 0, times 0 [ 486.757116][T26531] CPU: 0 PID: 26531 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 486.765203][T26531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.775247][T26531] Call Trace: [ 486.778523][T26531] dump_stack+0x1fb/0x318 [ 486.782839][T26531] should_fail+0x555/0x770 [ 486.787249][T26531] __should_failslab+0x11a/0x160 [ 486.792195][T26531] ? btrfs_mount+0x83/0x18e0 [ 486.796788][T26531] should_failslab+0x9/0x20 [ 486.801296][T26531] __kmalloc_track_caller+0x79/0x340 [ 486.806580][T26531] ? __fs_reclaim_release+0x4/0x20 [ 486.811693][T26531] kstrdup+0x34/0x70 [ 486.815589][T26531] btrfs_mount+0x83/0x18e0 [ 486.820015][T26531] ? check_preemption_disabled+0x47/0x2a0 [ 486.825739][T26531] ? vfs_parse_fs_string+0x13b/0x1a0 [ 486.831029][T26531] ? cap_capable+0x250/0x290 [ 486.835633][T26531] ? safesetid_security_capable+0x89/0xf0 [ 486.841531][T26531] legacy_get_tree+0xf9/0x1a0 [ 486.846209][T26531] ? btrfs_resize_thread_pool+0x290/0x290 [ 486.851930][T26531] vfs_get_tree+0x8b/0x2a0 [ 486.856353][T26531] do_mount+0x16c0/0x2510 [ 486.860692][T26531] ? copy_mount_options+0x308/0x3c0 [ 486.865902][T26531] ksys_mount+0xcc/0x100 [ 486.870153][T26531] __x64_sys_mount+0xbf/0xd0 [ 486.874748][T26531] do_syscall_64+0xf7/0x1c0 [ 486.879260][T26531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.885177][T26531] RIP: 0033:0x45cc6a 02:45:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 486.889078][T26531] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 486.908685][T26531] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 486.917350][T26531] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 486.925320][T26531] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 486.933299][T26531] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 486.941275][T26531] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 486.949357][T26531] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:04 executing program 1 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsh', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x5f}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:45:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x02', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 487.266593][T26555] FAULT_INJECTION: forcing a failure. [ 487.266593][T26555] name failslab, interval 1, probability 0, space 0, times 0 [ 487.384308][T26555] CPU: 0 PID: 26555 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 487.392152][T26555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.392158][T26555] Call Trace: [ 487.392174][T26555] dump_stack+0x1fb/0x318 [ 487.392191][T26555] should_fail+0x555/0x770 [ 487.392207][T26555] __should_failslab+0x11a/0x160 [ 487.392219][T26555] ? tomoyo_encode2+0x273/0x5a0 [ 487.392230][T26555] should_failslab+0x9/0x20 [ 487.392240][T26555] __kmalloc+0x7a/0x340 [ 487.392252][T26555] tomoyo_encode2+0x273/0x5a0 [ 487.392267][T26555] tomoyo_realpath_from_path+0x769/0x7c0 [ 487.392284][T26555] tomoyo_mount_permission+0x923/0xa30 [ 487.392306][T26555] ? kmem_cache_free+0xd8/0xf0 [ 487.392330][T26555] tomoyo_sb_mount+0x35/0x40 [ 487.419310][T26555] security_sb_mount+0x84/0xe0 [ 487.419327][T26555] do_mount+0x10a/0x2510 [ 487.419336][T26555] ? copy_mount_options+0x278/0x3c0 [ 487.419344][T26555] ? copy_mount_options+0x25e/0x3c0 [ 487.419353][T26555] ? copy_mount_options+0x264/0x3c0 [ 487.419362][T26555] ? copy_mount_options+0x308/0x3c0 [ 487.419372][T26555] ksys_mount+0xcc/0x100 [ 487.419384][T26555] __x64_sys_mount+0xbf/0xd0 [ 487.419398][T26555] do_syscall_64+0xf7/0x1c0 [ 487.419412][T26555] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.457918][T26555] RIP: 0033:0x45cc6a [ 487.457930][T26555] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 487.457935][T26555] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 487.457945][T26555] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 487.457954][T26555] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 487.487723][T26555] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 487.501033][T26555] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 487.501039][T26555] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 487.517602][T26555] ERROR: Out of memory at tomoyo_realpath_from_path. 02:45:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:04 executing program 1 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:45:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsl', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x06', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:45:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x60}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 487.978622][T26598] FAULT_INJECTION: forcing a failure. [ 487.978622][T26598] name failslab, interval 1, probability 0, space 0, times 0 [ 488.019252][T26598] CPU: 0 PID: 26598 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 488.027122][T26598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.037340][T26598] Call Trace: [ 488.040643][T26598] dump_stack+0x1fb/0x318 [ 488.044981][T26598] should_fail+0x555/0x770 [ 488.049397][T26598] __should_failslab+0x11a/0x160 [ 488.054382][T26598] should_failslab+0x9/0x20 [ 488.059255][T26598] kmem_cache_alloc_trace+0x5d/0x2f0 [ 488.064635][T26598] ? legacy_init_fs_context+0x51/0xc0 [ 488.070015][T26598] legacy_init_fs_context+0x51/0xc0 [ 488.075210][T26598] alloc_fs_context+0x53a/0x640 [ 488.080059][T26598] fs_context_for_mount+0x24/0x30 [ 488.085074][T26598] do_mount+0x10a7/0x2510 [ 488.089401][T26598] ? copy_mount_options+0x308/0x3c0 [ 488.094588][T26598] ksys_mount+0xcc/0x100 [ 488.098822][T26598] __x64_sys_mount+0xbf/0xd0 [ 488.103410][T26598] do_syscall_64+0xf7/0x1c0 [ 488.107901][T26598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.113866][T26598] RIP: 0033:0x45cc6a [ 488.117739][T26598] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 488.137431][T26598] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 488.145826][T26598] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 488.153787][T26598] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 488.162011][T26598] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 488.169968][T26598] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 488.177931][T26598] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:05 executing program 1 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 488.465760][T26624] FAULT_INJECTION: forcing a failure. [ 488.465760][T26624] name failslab, interval 1, probability 0, space 0, times 0 [ 488.505566][T26624] CPU: 0 PID: 26624 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 488.513415][T26624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.523472][T26624] Call Trace: [ 488.526769][T26624] dump_stack+0x1fb/0x318 [ 488.531103][T26624] should_fail+0x555/0x770 [ 488.535524][T26624] __should_failslab+0x11a/0x160 [ 488.540462][T26624] should_failslab+0x9/0x20 [ 488.544967][T26624] kmem_cache_alloc_trace+0x5d/0x2f0 [ 488.550247][T26624] ? legacy_init_fs_context+0x51/0xc0 [ 488.555623][T26624] legacy_init_fs_context+0x51/0xc0 [ 488.560827][T26624] alloc_fs_context+0x53a/0x640 02:45:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 488.565671][T26624] fs_context_for_mount+0x24/0x30 [ 488.570684][T26624] do_mount+0x10a7/0x2510 [ 488.575016][T26624] ? copy_mount_options+0x308/0x3c0 [ 488.580303][T26624] ksys_mount+0xcc/0x100 [ 488.584537][T26624] __x64_sys_mount+0xbf/0xd0 [ 488.589128][T26624] do_syscall_64+0xf7/0x1c0 [ 488.593611][T26624] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.599493][T26624] RIP: 0033:0x45cc6a [ 488.603391][T26624] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 488.622988][T26624] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 488.631409][T26624] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 488.639366][T26624] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 488.647334][T26624] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 488.655292][T26624] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 488.663247][T26624] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfst', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:05 executing program 1 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsj', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:45:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 488.975631][T26645] FAULT_INJECTION: forcing a failure. [ 488.975631][T26645] name failslab, interval 1, probability 0, space 0, times 0 [ 488.990817][T26645] CPU: 1 PID: 26645 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 488.998672][T26645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.008729][T26645] Call Trace: [ 489.012026][T26645] dump_stack+0x1fb/0x318 [ 489.016377][T26645] should_fail+0x555/0x770 [ 489.020817][T26645] __should_failslab+0x11a/0x160 [ 489.025755][T26645] ? btrfs_mount+0x83/0x18e0 [ 489.030344][T26645] should_failslab+0x9/0x20 [ 489.030359][T26645] __kmalloc_track_caller+0x79/0x340 [ 489.030370][T26645] ? __fs_reclaim_release+0x4/0x20 [ 489.030382][T26645] kstrdup+0x34/0x70 [ 489.030393][T26645] btrfs_mount+0x83/0x18e0 [ 489.030410][T26645] ? check_preemption_disabled+0x47/0x2a0 [ 489.030428][T26645] ? vfs_parse_fs_string+0x13b/0x1a0 [ 489.040180][T26645] ? cap_capable+0x250/0x290 [ 489.040192][T26645] ? safesetid_security_capable+0x89/0xf0 [ 489.040208][T26645] legacy_get_tree+0xf9/0x1a0 [ 489.040218][T26645] ? btrfs_resize_thread_pool+0x290/0x290 [ 489.040231][T26645] vfs_get_tree+0x8b/0x2a0 [ 489.040240][T26645] do_mount+0x16c0/0x2510 [ 489.040255][T26645] ? copy_mount_options+0x308/0x3c0 [ 489.040271][T26645] ksys_mount+0xcc/0x100 [ 489.065305][T26645] __x64_sys_mount+0xbf/0xd0 [ 489.085948][T26645] do_syscall_64+0xf7/0x1c0 [ 489.085964][T26645] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.085972][T26645] RIP: 0033:0x45cc6a [ 489.085988][T26645] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 489.122925][T26645] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 489.122937][T26645] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 489.122943][T26645] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 489.122948][T26645] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 489.122954][T26645] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 489.122959][T26645] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:06 executing program 1 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsz', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 489.489932][T26672] FAULT_INJECTION: forcing a failure. [ 489.489932][T26672] name failslab, interval 1, probability 0, space 0, times 0 02:45:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x10', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 489.617644][T26672] CPU: 1 PID: 26672 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 489.626192][T26672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.636251][T26672] Call Trace: [ 489.639664][T26672] dump_stack+0x1fb/0x318 [ 489.644004][T26672] should_fail+0x555/0x770 [ 489.648432][T26672] __should_failslab+0x11a/0x160 [ 489.653378][T26672] should_failslab+0x9/0x20 [ 489.657892][T26672] kmem_cache_alloc_trace+0x5d/0x2f0 [ 489.663179][T26672] ? alloc_fs_context+0x65/0x640 02:45:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x0, 0x2}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 489.668121][T26672] alloc_fs_context+0x65/0x640 [ 489.672893][T26672] ? kfree+0x194/0x200 [ 489.676970][T26672] fs_context_for_mount+0x24/0x30 [ 489.682005][T26672] vfs_kern_mount+0x2c/0x160 [ 489.686608][T26672] btrfs_mount+0x34f/0x18e0 [ 489.691119][T26672] ? check_preemption_disabled+0x47/0x2a0 [ 489.691138][T26672] ? vfs_parse_fs_string+0x13b/0x1a0 [ 489.691149][T26672] ? cap_capable+0x250/0x290 [ 489.691162][T26672] ? safesetid_security_capable+0x89/0xf0 [ 489.706728][T26672] legacy_get_tree+0xf9/0x1a0 [ 489.706741][T26672] ? btrfs_resize_thread_pool+0x290/0x290 [ 489.706755][T26672] vfs_get_tree+0x8b/0x2a0 [ 489.706765][T26672] do_mount+0x16c0/0x2510 [ 489.706779][T26672] ? copy_mount_options+0x308/0x3c0 [ 489.736772][T26672] ksys_mount+0xcc/0x100 [ 489.741043][T26672] __x64_sys_mount+0xbf/0xd0 [ 489.741064][T26672] do_syscall_64+0xf7/0x1c0 [ 489.741078][T26672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.741087][T26672] RIP: 0033:0x45cc6a [ 489.741099][T26672] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 489.759924][T26672] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 489.759935][T26672] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 489.759942][T26672] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 489.759947][T26672] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 489.759952][T26672] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 489.759958][T26672] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:06 executing program 1 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:45:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 490.180212][T26724] FAULT_INJECTION: forcing a failure. [ 490.180212][T26724] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 490.193468][T26724] CPU: 0 PID: 26724 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 490.193476][T26724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.193481][T26724] Call Trace: [ 490.193499][T26724] dump_stack+0x1fb/0x318 [ 490.193517][T26724] should_fail+0x555/0x770 [ 490.193539][T26724] should_fail_alloc_page+0x55/0x60 [ 490.228622][T26724] prepare_alloc_pages+0x283/0x460 [ 490.233735][T26724] __alloc_pages_nodemask+0xb2/0x5d0 [ 490.233757][T26724] kmem_getpages+0x4d/0xa00 [ 490.233768][T26724] cache_grow_begin+0x7e/0x2c0 [ 490.233780][T26724] cache_alloc_refill+0x311/0x3f0 [ 490.253483][T26724] ? check_preemption_disabled+0xb7/0x2a0 [ 490.259208][T26724] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 490.264570][T26724] ? btrfs_mount_root+0x12c/0x1040 [ 490.264585][T26724] btrfs_mount_root+0x12c/0x1040 [ 490.264602][T26724] ? vfs_parse_fs_string+0x13b/0x1a0 02:45:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 490.264610][T26724] ? rcu_read_lock_sched_held+0x10b/0x170 [ 490.264620][T26724] ? trace_kfree+0xb2/0x110 [ 490.290554][T26724] legacy_get_tree+0xf9/0x1a0 [ 490.295262][T26724] ? btrfs_control_open+0x40/0x40 [ 490.300311][T26724] vfs_get_tree+0x8b/0x2a0 [ 490.304736][T26724] vfs_kern_mount+0xc2/0x160 [ 490.309322][T26724] btrfs_mount+0x34f/0x18e0 [ 490.309345][T26724] ? check_preemption_disabled+0x47/0x2a0 [ 490.309362][T26724] ? vfs_parse_fs_string+0x13b/0x1a0 [ 490.309373][T26724] ? cap_capable+0x250/0x290 [ 490.309384][T26724] ? safesetid_security_capable+0x89/0xf0 [ 490.309396][T26724] legacy_get_tree+0xf9/0x1a0 [ 490.309404][T26724] ? btrfs_resize_thread_pool+0x290/0x290 [ 490.309416][T26724] vfs_get_tree+0x8b/0x2a0 [ 490.309427][T26724] do_mount+0x16c0/0x2510 [ 490.309442][T26724] ? copy_mount_options+0x308/0x3c0 [ 490.309453][T26724] ksys_mount+0xcc/0x100 [ 490.309464][T26724] __x64_sys_mount+0xbf/0xd0 [ 490.309482][T26724] do_syscall_64+0xf7/0x1c0 [ 490.309496][T26724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 490.309504][T26724] RIP: 0033:0x45cc6a [ 490.309516][T26724] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 490.319696][T26724] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 490.319707][T26724] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 490.319714][T26724] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 490.319721][T26724] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 490.319727][T26724] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 490.319733][T26724] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:45:07 executing program 1 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x0, 0x3}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 490.757369][T26753] FAULT_INJECTION: forcing a failure. [ 490.757369][T26753] name failslab, interval 1, probability 0, space 0, times 0 [ 490.785869][T26753] CPU: 0 PID: 26753 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 490.793718][T26753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.803774][T26753] Call Trace: [ 490.807060][T26753] dump_stack+0x1fb/0x318 [ 490.811382][T26753] should_fail+0x555/0x770 [ 490.815808][T26753] __should_failslab+0x11a/0x160 [ 490.820746][T26753] ? btrfs_mount+0x83/0x18e0 [ 490.825315][T26753] should_failslab+0x9/0x20 [ 490.829799][T26753] __kmalloc_track_caller+0x79/0x340 [ 490.835062][T26753] ? __fs_reclaim_release+0x4/0x20 [ 490.840242][T26753] kstrdup+0x34/0x70 [ 490.844129][T26753] btrfs_mount+0x83/0x18e0 [ 490.848529][T26753] ? check_preemption_disabled+0x47/0x2a0 [ 490.854229][T26753] ? vfs_parse_fs_string+0x13b/0x1a0 [ 490.859491][T26753] ? cap_capable+0x250/0x290 [ 490.864061][T26753] ? safesetid_security_capable+0x89/0xf0 [ 490.869761][T26753] legacy_get_tree+0xf9/0x1a0 [ 490.874515][T26753] ? btrfs_resize_thread_pool+0x290/0x290 [ 490.880216][T26753] vfs_get_tree+0x8b/0x2a0 [ 490.884609][T26753] do_mount+0x16c0/0x2510 [ 490.888942][T26753] ? copy_mount_options+0x308/0x3c0 [ 490.894121][T26753] ksys_mount+0xcc/0x100 [ 490.898344][T26753] __x64_sys_mount+0xbf/0xd0 [ 490.903439][T26753] do_syscall_64+0xf7/0x1c0 [ 490.907922][T26753] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 490.913793][T26753] RIP: 0033:0x45cc6a [ 490.917663][T26753] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 490.937246][T26753] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 490.945635][T26753] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a 02:45:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 490.953586][T26753] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 490.961536][T26753] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 490.969488][T26753] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 490.977436][T26753] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:08 executing program 1 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:45:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 491.321046][T26781] FAULT_INJECTION: forcing a failure. [ 491.321046][T26781] name failslab, interval 1, probability 0, space 0, times 0 [ 491.371668][T26781] CPU: 0 PID: 26781 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 491.379539][T26781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.389878][T26781] Call Trace: [ 491.393205][T26781] dump_stack+0x1fb/0x318 [ 491.397521][T26781] should_fail+0x555/0x770 [ 491.401924][T26781] __should_failslab+0x11a/0x160 [ 491.406850][T26781] should_failslab+0x9/0x20 [ 491.411401][T26781] kmem_cache_alloc_trace+0x5d/0x2f0 [ 491.416680][T26781] ? btrfs_mount_root+0x1b2/0x1040 [ 491.421777][T26781] btrfs_mount_root+0x1b2/0x1040 [ 491.426694][T26781] ? vfs_parse_fs_string+0x13b/0x1a0 [ 491.431957][T26781] ? rcu_read_lock_sched_held+0x10b/0x170 [ 491.437652][T26781] ? trace_kfree+0xb2/0x110 [ 491.442135][T26781] legacy_get_tree+0xf9/0x1a0 [ 491.446795][T26781] ? btrfs_control_open+0x40/0x40 [ 491.451812][T26781] vfs_get_tree+0x8b/0x2a0 [ 491.456209][T26781] vfs_kern_mount+0xc2/0x160 [ 491.460778][T26781] btrfs_mount+0x34f/0x18e0 [ 491.465267][T26781] ? check_preemption_disabled+0x47/0x2a0 [ 491.470965][T26781] ? vfs_parse_fs_string+0x13b/0x1a0 [ 491.476230][T26781] ? cap_capable+0x250/0x290 [ 491.480806][T26781] ? safesetid_security_capable+0x89/0xf0 [ 491.486545][T26781] legacy_get_tree+0xf9/0x1a0 [ 491.491199][T26781] ? btrfs_resize_thread_pool+0x290/0x290 [ 491.496910][T26781] vfs_get_tree+0x8b/0x2a0 [ 491.501321][T26781] do_mount+0x16c0/0x2510 [ 491.505634][T26781] ? copy_mount_options+0x308/0x3c0 [ 491.510815][T26781] ksys_mount+0xcc/0x100 [ 491.515047][T26781] __x64_sys_mount+0xbf/0xd0 [ 491.519621][T26781] do_syscall_64+0xf7/0x1c0 [ 491.524107][T26781] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.529985][T26781] RIP: 0033:0x45cc6a [ 491.533868][T26781] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 491.553540][T26781] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 491.562009][T26781] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 491.569974][T26781] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 491.577931][T26781] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 491.585886][T26781] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 491.593884][T26781] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x0, 0x4}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:45:08 executing program 1 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x02', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 491.977869][T26808] FAULT_INJECTION: forcing a failure. [ 491.977869][T26808] name failslab, interval 1, probability 0, space 0, times 0 [ 491.991306][T26808] CPU: 0 PID: 26808 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 491.999121][T26808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.999126][T26808] Call Trace: [ 491.999144][T26808] dump_stack+0x1fb/0x318 [ 491.999161][T26808] should_fail+0x555/0x770 [ 491.999178][T26808] __should_failslab+0x11a/0x160 [ 491.999190][T26808] ? vfs_parse_fs_string+0xed/0x1a0 [ 491.999201][T26808] should_failslab+0x9/0x20 [ 491.999214][T26808] __kmalloc_track_caller+0x79/0x340 [ 491.999226][T26808] kmemdup_nul+0x2a/0xa0 [ 491.999235][T26808] vfs_parse_fs_string+0xed/0x1a0 [ 491.999251][T26808] do_mount+0x11b8/0x2510 [ 491.999265][T26808] ? copy_mount_options+0x308/0x3c0 [ 491.999276][T26808] ksys_mount+0xcc/0x100 [ 491.999287][T26808] __x64_sys_mount+0xbf/0xd0 [ 491.999300][T26808] do_syscall_64+0xf7/0x1c0 [ 491.999312][T26808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.999320][T26808] RIP: 0033:0x45cc6a [ 491.999331][T26808] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 491.999337][T26808] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 491.999347][T26808] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 491.999353][T26808] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 02:45:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 491.999360][T26808] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 491.999366][T26808] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 491.999372][T26808] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:09 executing program 1 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:45:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x0, 0x5}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:45:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x06', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 492.488035][T26836] FAULT_INJECTION: forcing a failure. [ 492.488035][T26836] name failslab, interval 1, probability 0, space 0, times 0 [ 492.516315][T26836] CPU: 0 PID: 26836 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 492.524159][T26836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.534210][T26836] Call Trace: [ 492.534232][T26836] dump_stack+0x1fb/0x318 [ 492.541825][T26836] should_fail+0x555/0x770 [ 492.541843][T26836] __should_failslab+0x11a/0x160 [ 492.541856][T26836] should_failslab+0x9/0x20 [ 492.541866][T26836] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 492.541875][T26836] ? __kmalloc_node+0x3c/0x60 [ 492.541884][T26836] ? smack_sb_eat_lsm_opts+0x867/0xa20 [ 492.541896][T26836] __kmalloc_node+0x3c/0x60 [ 492.541906][T26836] kvmalloc_node+0xcc/0x130 [ 492.541917][T26836] btrfs_mount_root+0xe3/0x1040 [ 492.541933][T26836] ? vfs_parse_fs_string+0x13b/0x1a0 [ 492.585438][T26836] ? rcu_read_lock_sched_held+0x10b/0x170 [ 492.585451][T26836] ? trace_kfree+0xb2/0x110 [ 492.585465][T26836] legacy_get_tree+0xf9/0x1a0 [ 492.585480][T26836] ? btrfs_control_open+0x40/0x40 [ 492.610612][T26836] vfs_get_tree+0x8b/0x2a0 [ 492.615042][T26836] vfs_kern_mount+0xc2/0x160 [ 492.619640][T26836] btrfs_mount+0x34f/0x18e0 [ 492.619661][T26836] ? check_preemption_disabled+0x47/0x2a0 [ 492.619678][T26836] ? vfs_parse_fs_string+0x13b/0x1a0 [ 492.619688][T26836] ? cap_capable+0x250/0x290 [ 492.619698][T26836] ? safesetid_security_capable+0x89/0xf0 [ 492.619710][T26836] legacy_get_tree+0xf9/0x1a0 [ 492.619718][T26836] ? btrfs_resize_thread_pool+0x290/0x290 [ 492.619729][T26836] vfs_get_tree+0x8b/0x2a0 [ 492.619740][T26836] do_mount+0x16c0/0x2510 [ 492.619754][T26836] ? copy_mount_options+0x308/0x3c0 [ 492.619764][T26836] ksys_mount+0xcc/0x100 [ 492.619780][T26836] __x64_sys_mount+0xbf/0xd0 [ 492.619795][T26836] do_syscall_64+0xf7/0x1c0 [ 492.635446][T26836] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.635458][T26836] RIP: 0033:0x45cc6a [ 492.635468][T26836] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 492.635473][T26836] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 492.678849][T26836] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 492.678856][T26836] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 02:45:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 492.678863][T26836] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 492.678869][T26836] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 492.678875][T26836] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:45:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:45:10 executing program 1 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x0, 0x6}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 493.321264][T26890] FAULT_INJECTION: forcing a failure. [ 493.321264][T26890] name failslab, interval 1, probability 0, space 0, times 0 [ 493.346875][T26890] CPU: 0 PID: 26890 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 493.354759][T26890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.364828][T26890] Call Trace: [ 493.368134][T26890] dump_stack+0x1fb/0x318 [ 493.372493][T26890] should_fail+0x555/0x770 [ 493.376930][T26890] __should_failslab+0x11a/0x160 [ 493.381883][T26890] should_failslab+0x9/0x20 [ 493.386390][T26890] kmem_cache_alloc_trace+0x5d/0x2f0 [ 493.391659][T26890] ? btrfs_mount_root+0x12c/0x1040 [ 493.396890][T26890] btrfs_mount_root+0x12c/0x1040 [ 493.401837][T26890] ? vfs_parse_fs_string+0x13b/0x1a0 [ 493.407146][T26890] ? rcu_read_lock_sched_held+0x10b/0x170 [ 493.412981][T26890] ? trace_kfree+0xb2/0x110 [ 493.417489][T26890] legacy_get_tree+0xf9/0x1a0 [ 493.422162][T26890] ? btrfs_control_open+0x40/0x40 [ 493.427190][T26890] vfs_get_tree+0x8b/0x2a0 [ 493.431613][T26890] vfs_kern_mount+0xc2/0x160 [ 493.436307][T26890] btrfs_mount+0x34f/0x18e0 [ 493.440805][T26890] ? check_preemption_disabled+0x47/0x2a0 [ 493.446511][T26890] ? vfs_parse_fs_string+0x13b/0x1a0 [ 493.451862][T26890] ? cap_capable+0x250/0x290 [ 493.456454][T26890] ? safesetid_security_capable+0x89/0xf0 [ 493.462170][T26890] legacy_get_tree+0xf9/0x1a0 [ 493.466824][T26890] ? btrfs_resize_thread_pool+0x290/0x290 [ 493.472523][T26890] vfs_get_tree+0x8b/0x2a0 [ 493.476917][T26890] do_mount+0x16c0/0x2510 [ 493.481235][T26890] ? copy_mount_options+0x308/0x3c0 [ 493.486414][T26890] ksys_mount+0xcc/0x100 [ 493.490658][T26890] __x64_sys_mount+0xbf/0xd0 [ 493.495230][T26890] do_syscall_64+0xf7/0x1c0 [ 493.499743][T26890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.505637][T26890] RIP: 0033:0x45cc6a [ 493.509509][T26890] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 493.529111][T26890] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 493.537518][T26890] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 493.545516][T26890] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 493.553481][T26890] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 493.561445][T26890] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 493.569412][T26890] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs<', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:10 executing program 1 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xc0', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 493.896736][T26910] FAULT_INJECTION: forcing a failure. [ 493.896736][T26910] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 493.910060][T26910] CPU: 0 PID: 26910 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 493.917861][T26910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.927918][T26910] Call Trace: [ 493.931219][T26910] dump_stack+0x1fb/0x318 [ 493.935561][T26910] should_fail+0x555/0x770 [ 493.939988][T26910] should_fail_alloc_page+0x55/0x60 [ 493.945191][T26910] prepare_alloc_pages+0x283/0x460 [ 493.950309][T26910] __alloc_pages_nodemask+0xb2/0x5d0 [ 493.955618][T26910] kmem_getpages+0x4d/0xa00 [ 493.960130][T26910] cache_grow_begin+0x7e/0x2c0 [ 493.964896][T26910] cache_alloc_refill+0x311/0x3f0 [ 493.969926][T26910] ? check_preemption_disabled+0xb7/0x2a0 [ 493.975653][T26910] kmem_cache_alloc_node_trace+0x2a3/0x2d0 [ 493.981456][T26910] ? __kmalloc_node+0x3c/0x60 [ 493.986132][T26910] ? smack_sb_eat_lsm_opts+0x867/0xa20 [ 493.991596][T26910] __kmalloc_node+0x3c/0x60 [ 493.996100][T26910] kvmalloc_node+0xcc/0x130 [ 494.000606][T26910] btrfs_mount_root+0xe3/0x1040 [ 494.005461][T26910] ? vfs_parse_fs_string+0x13b/0x1a0 [ 494.010745][T26910] ? rcu_read_lock_sched_held+0x10b/0x170 [ 494.016467][T26910] ? trace_kfree+0xb2/0x110 [ 494.020980][T26910] legacy_get_tree+0xf9/0x1a0 [ 494.025659][T26910] ? btrfs_control_open+0x40/0x40 [ 494.030682][T26910] vfs_get_tree+0x8b/0x2a0 [ 494.035103][T26910] vfs_kern_mount+0xc2/0x160 [ 494.039694][T26910] btrfs_mount+0x34f/0x18e0 [ 494.044220][T26910] ? check_preemption_disabled+0x47/0x2a0 [ 494.049945][T26910] ? vfs_parse_fs_string+0x13b/0x1a0 [ 494.057314][T26910] ? cap_capable+0x250/0x290 [ 494.061904][T26910] ? safesetid_security_capable+0x89/0xf0 [ 494.067678][T26910] legacy_get_tree+0xf9/0x1a0 [ 494.072360][T26910] ? btrfs_resize_thread_pool+0x290/0x290 [ 494.078079][T26910] vfs_get_tree+0x8b/0x2a0 [ 494.082587][T26910] do_mount+0x16c0/0x2510 [ 494.086928][T26910] ? copy_mount_options+0x308/0x3c0 [ 494.092129][T26910] ksys_mount+0xcc/0x100 02:45:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 494.096373][T26910] __x64_sys_mount+0xbf/0xd0 [ 494.100969][T26910] do_syscall_64+0xf7/0x1c0 [ 494.105472][T26910] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.111362][T26910] RIP: 0033:0x45cc6a [ 494.115262][T26910] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 494.134866][T26910] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 02:45:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x0, 0x7}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 494.134876][T26910] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 494.134881][T26910] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 494.134887][T26910] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 494.134893][T26910] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 494.134899][T26910] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs ', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:11 executing program 1 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x0f', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 494.596129][T26956] FAULT_INJECTION: forcing a failure. [ 494.596129][T26956] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 494.609372][T26956] CPU: 0 PID: 26956 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 494.617225][T26956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.628182][T26956] Call Trace: [ 494.631466][T26956] dump_stack+0x1fb/0x318 [ 494.635804][T26956] should_fail+0x555/0x770 [ 494.640234][T26956] should_fail_alloc_page+0x55/0x60 [ 494.645439][T26956] prepare_alloc_pages+0x283/0x460 [ 494.650562][T26956] __alloc_pages_nodemask+0xb2/0x5d0 [ 494.655879][T26956] kmem_getpages+0x4d/0xa00 [ 494.660397][T26956] cache_grow_begin+0x7e/0x2c0 [ 494.665159][T26956] cache_alloc_refill+0x311/0x3f0 [ 494.670183][T26956] ? check_preemption_disabled+0xb7/0x2a0 [ 494.675912][T26956] kmem_cache_alloc_node_trace+0x2a3/0x2d0 [ 494.681720][T26956] ? __kmalloc_node+0x3c/0x60 [ 494.686387][T26956] ? smack_sb_eat_lsm_opts+0x867/0xa20 [ 494.691836][T26956] __kmalloc_node+0x3c/0x60 [ 494.696329][T26956] kvmalloc_node+0xcc/0x130 [ 494.700836][T26956] btrfs_mount_root+0xe3/0x1040 [ 494.705691][T26956] ? vfs_parse_fs_string+0x13b/0x1a0 [ 494.710974][T26956] ? rcu_read_lock_sched_held+0x10b/0x170 [ 494.716676][T26956] ? trace_kfree+0xb2/0x110 [ 494.721166][T26956] legacy_get_tree+0xf9/0x1a0 [ 494.725913][T26956] ? btrfs_control_open+0x40/0x40 [ 494.730919][T26956] vfs_get_tree+0x8b/0x2a0 [ 494.735312][T26956] vfs_kern_mount+0xc2/0x160 [ 494.739881][T26956] btrfs_mount+0x34f/0x18e0 [ 494.744366][T26956] ? check_preemption_disabled+0x47/0x2a0 [ 494.750065][T26956] ? vfs_parse_fs_string+0x13b/0x1a0 [ 494.755324][T26956] ? cap_capable+0x250/0x290 [ 494.759894][T26956] ? safesetid_security_capable+0x89/0xf0 [ 494.765608][T26956] legacy_get_tree+0xf9/0x1a0 [ 494.770269][T26956] ? btrfs_resize_thread_pool+0x290/0x290 [ 494.775982][T26956] vfs_get_tree+0x8b/0x2a0 [ 494.780388][T26956] do_mount+0x16c0/0x2510 [ 494.784707][T26956] ? copy_mount_options+0x308/0x3c0 [ 494.789891][T26956] ksys_mount+0xcc/0x100 [ 494.794115][T26956] __x64_sys_mount+0xbf/0xd0 [ 494.798687][T26956] do_syscall_64+0xf7/0x1c0 [ 494.803785][T26956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.809663][T26956] RIP: 0033:0x45cc6a [ 494.813536][T26956] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 494.833117][T26956] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 494.841526][T26956] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 494.849475][T26956] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 494.857420][T26956] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 494.865369][T26956] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 494.873328][T26956] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:45:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x0, 0x8}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:45:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xff', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:45:12 executing program 1 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 495.526505][T27010] FAULT_INJECTION: forcing a failure. [ 495.526505][T27010] name failslab, interval 1, probability 0, space 0, times 0 [ 495.546526][T27010] CPU: 0 PID: 27010 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 495.555236][T27010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.555241][T27010] Call Trace: [ 495.555257][T27010] dump_stack+0x1fb/0x318 [ 495.555273][T27010] should_fail+0x555/0x770 [ 495.568703][T27010] __should_failslab+0x11a/0x160 [ 495.577402][T27010] should_failslab+0x9/0x20 [ 495.577414][T27010] kmem_cache_alloc_trace+0x5d/0x2f0 [ 495.577427][T27010] ? btrfs_mount_root+0x12c/0x1040 [ 495.592095][T27010] btrfs_mount_root+0x12c/0x1040 [ 495.592110][T27010] ? vfs_parse_fs_string+0x13b/0x1a0 [ 495.592120][T27010] ? rcu_read_lock_sched_held+0x10b/0x170 [ 495.592129][T27010] ? trace_kfree+0xb2/0x110 [ 495.592141][T27010] legacy_get_tree+0xf9/0x1a0 [ 495.592149][T27010] ? btrfs_control_open+0x40/0x40 [ 495.592161][T27010] vfs_get_tree+0x8b/0x2a0 [ 495.602166][T27010] vfs_kern_mount+0xc2/0x160 [ 495.602178][T27010] btrfs_mount+0x34f/0x18e0 [ 495.602196][T27010] ? check_preemption_disabled+0x47/0x2a0 [ 495.602210][T27010] ? vfs_parse_fs_string+0x13b/0x1a0 [ 495.602221][T27010] ? cap_capable+0x250/0x290 [ 495.602231][T27010] ? safesetid_security_capable+0x89/0xf0 [ 495.602248][T27010] legacy_get_tree+0xf9/0x1a0 [ 495.666754][T27010] ? btrfs_resize_thread_pool+0x290/0x290 [ 495.672468][T27010] vfs_get_tree+0x8b/0x2a0 [ 495.676873][T27010] do_mount+0x16c0/0x2510 [ 495.681180][T27010] ? copy_mount_options+0x308/0x3c0 [ 495.686401][T27010] ksys_mount+0xcc/0x100 [ 495.690640][T27010] __x64_sys_mount+0xbf/0xd0 [ 495.695218][T27010] do_syscall_64+0xf7/0x1c0 [ 495.699764][T27010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.705631][T27010] RIP: 0033:0x45cc6a 02:45:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 495.709512][T27010] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 495.729107][T27010] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 495.737516][T27010] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 495.745475][T27010] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 495.753432][T27010] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 495.761402][T27010] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 495.769354][T27010] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x0, 0x9}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:45:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:12 executing program 1 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 496.352553][T27044] FAULT_INJECTION: forcing a failure. [ 496.352553][T27044] name failslab, interval 1, probability 0, space 0, times 0 [ 496.382931][T27044] CPU: 1 PID: 27044 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 496.390781][T27044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.400838][T27044] Call Trace: [ 496.404139][T27044] dump_stack+0x1fb/0x318 [ 496.408474][T27044] should_fail+0x555/0x770 [ 496.412899][T27044] __should_failslab+0x11a/0x160 [ 496.417835][T27044] ? getname_kernel+0x59/0x2f0 [ 496.422589][T27044] should_failslab+0x9/0x20 [ 496.427088][T27044] kmem_cache_alloc+0x56/0x2e0 [ 496.431962][T27044] getname_kernel+0x59/0x2f0 [ 496.436542][T27044] kern_path+0x1f/0x40 [ 496.440595][T27044] lookup_bdev+0x66/0x1c0 [ 496.440619][T27044] device_list_add+0x7ce/0x18e0 02:45:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 496.440638][T27044] btrfs_scan_one_device+0x2f7/0x450 [ 496.440654][T27044] btrfs_mount_root+0x4af/0x1040 [ 496.449798][T27044] ? trace_kfree+0xb2/0x110 [ 496.449815][T27044] legacy_get_tree+0xf9/0x1a0 [ 496.449826][T27044] ? btrfs_control_open+0x40/0x40 [ 496.449839][T27044] vfs_get_tree+0x8b/0x2a0 [ 496.449851][T27044] vfs_kern_mount+0xc2/0x160 [ 496.449861][T27044] btrfs_mount+0x34f/0x18e0 [ 496.449880][T27044] ? check_preemption_disabled+0x47/0x2a0 [ 496.449895][T27044] ? vfs_parse_fs_string+0x13b/0x1a0 [ 496.460071][T27044] ? cap_capable+0x250/0x290 [ 496.460085][T27044] ? safesetid_security_capable+0x89/0xf0 [ 496.460101][T27044] legacy_get_tree+0xf9/0x1a0 [ 496.460111][T27044] ? btrfs_resize_thread_pool+0x290/0x290 [ 496.460123][T27044] vfs_get_tree+0x8b/0x2a0 [ 496.460134][T27044] do_mount+0x16c0/0x2510 [ 496.460150][T27044] ? copy_mount_options+0x308/0x3c0 [ 496.460161][T27044] ksys_mount+0xcc/0x100 [ 496.460172][T27044] __x64_sys_mount+0xbf/0xd0 [ 496.474333][T27044] do_syscall_64+0xf7/0x1c0 [ 496.474350][T27044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.474360][T27044] RIP: 0033:0x45cc6a [ 496.474370][T27044] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 496.474375][T27044] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 496.483341][T27044] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 496.483347][T27044] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 02:45:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 496.483353][T27044] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 496.483359][T27044] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 496.483365][T27044] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x0, 0xa}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:45:13 executing program 1 (fault-call:0 fault-nth:80): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) 02:45:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 497.106427][T27088] FAULT_INJECTION: forcing a failure. [ 497.106427][T27088] name failslab, interval 1, probability 0, space 0, times 0 [ 497.148377][T27088] CPU: 0 PID: 27088 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 497.156244][T27088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.166389][T27088] Call Trace: [ 497.169675][T27088] dump_stack+0x1fb/0x318 [ 497.174077][T27088] should_fail+0x555/0x770 [ 497.178497][T27088] __should_failslab+0x11a/0x160 [ 497.183441][T27088] should_failslab+0x9/0x20 [ 497.187939][T27088] kmem_cache_alloc_node+0x65/0x280 [ 497.193127][T27088] ? create_task_io_context+0x32/0x3e0 [ 497.198658][T27088] create_task_io_context+0x32/0x3e0 [ 497.204085][T27088] ? generic_make_request_checks+0x14f1/0x1a60 [ 497.210247][T27088] generic_make_request_checks+0x1501/0x1a60 [ 497.216220][T27088] ? rcu_lock_release+0xd/0x30 [ 497.220960][T27088] generic_make_request+0x33/0x980 [ 497.226056][T27088] ? rcu_lock_release+0xd/0x30 [ 497.230810][T27088] submit_bio+0x26b/0x540 [ 497.235130][T27088] ? guard_bio_eod+0x2a0/0x640 [ 497.239886][T27088] submit_bh_wbc+0x619/0x700 [ 497.244471][T27088] block_read_full_page+0x9de/0xbd0 [ 497.249726][T27088] ? blkdev_direct_IO+0xd0/0xd0 [ 497.254569][T27088] ? lru_cache_add+0x2db/0x3b0 [ 497.259321][T27088] ? add_to_page_cache_lru+0x2d4/0x4a0 [ 497.264806][T27088] blkdev_readpage+0x1c/0x20 [ 497.269408][T27088] do_read_cache_page+0x798/0xcb0 [ 497.274531][T27088] read_cache_page_gfp+0x29/0x30 [ 497.279453][T27088] btrfs_scan_one_device+0x16a/0x450 [ 497.284714][T27088] ? trace_hardirqs_on+0x74/0x80 [ 497.289644][T27088] btrfs_mount_root+0x4af/0x1040 [ 497.294588][T27088] ? trace_kfree+0xb2/0x110 [ 497.299072][T27088] legacy_get_tree+0xf9/0x1a0 [ 497.303734][T27088] ? btrfs_control_open+0x40/0x40 [ 497.308733][T27088] vfs_get_tree+0x8b/0x2a0 [ 497.313134][T27088] vfs_kern_mount+0xc2/0x160 [ 497.317712][T27088] btrfs_mount+0x34f/0x18e0 [ 497.322297][T27088] ? check_preemption_disabled+0x47/0x2a0 [ 497.328008][T27088] ? vfs_parse_fs_string+0x13b/0x1a0 [ 497.333278][T27088] ? cap_capable+0x250/0x290 [ 497.337859][T27088] ? safesetid_security_capable+0x89/0xf0 [ 497.343560][T27088] legacy_get_tree+0xf9/0x1a0 [ 497.348226][T27088] ? btrfs_resize_thread_pool+0x290/0x290 [ 497.353924][T27088] vfs_get_tree+0x8b/0x2a0 [ 497.358322][T27088] do_mount+0x16c0/0x2510 [ 497.362642][T27088] ? copy_mount_options+0x308/0x3c0 [ 497.367823][T27088] ksys_mount+0xcc/0x100 [ 497.372050][T27088] __x64_sys_mount+0xbf/0xd0 [ 497.376636][T27088] do_syscall_64+0xf7/0x1c0 [ 497.381130][T27088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 497.387005][T27088] RIP: 0033:0x45cc6a [ 497.390881][T27088] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 497.410479][T27088] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 497.418882][T27088] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 497.426844][T27088] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 497.434794][T27088] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 02:45:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 497.442741][T27088] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 497.450697][T27088] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:14 executing program 1 (fault-call:0 fault-nth:81): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x0, 0xb}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:45:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 497.869412][T27121] FAULT_INJECTION: forcing a failure. [ 497.869412][T27121] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 497.883904][T27121] CPU: 0 PID: 27121 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 497.891708][T27121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.901751][T27121] Call Trace: [ 497.901779][T27121] dump_stack+0x1fb/0x318 [ 497.901795][T27121] should_fail+0x555/0x770 [ 497.901814][T27121] should_fail_alloc_page+0x55/0x60 [ 497.901825][T27121] prepare_alloc_pages+0x283/0x460 [ 497.909414][T27121] __alloc_pages_nodemask+0xb2/0x5d0 [ 497.909441][T27121] kmem_getpages+0x4d/0xa00 [ 497.909455][T27121] cache_grow_begin+0x7e/0x2c0 [ 497.909468][T27121] cache_alloc_refill+0x311/0x3f0 [ 497.909480][T27121] ? check_preemption_disabled+0xb7/0x2a0 [ 497.909495][T27121] kmem_cache_alloc+0x2b9/0x2e0 [ 497.909503][T27121] ? getname_kernel+0x59/0x2f0 [ 497.909515][T27121] getname_kernel+0x59/0x2f0 [ 497.919086][T27121] kern_path+0x1f/0x40 [ 497.919099][T27121] blkdev_get_by_path+0x71/0x270 [ 497.919116][T27121] btrfs_scan_one_device+0xbd/0x450 [ 497.919126][T27121] ? btrfs_mount_root+0x477/0x1040 [ 497.919135][T27121] ? trace_hardirqs_on+0x74/0x80 [ 497.919148][T27121] btrfs_mount_root+0x4af/0x1040 [ 497.919165][T27121] ? trace_kfree+0xb2/0x110 [ 497.919177][T27121] legacy_get_tree+0xf9/0x1a0 [ 497.919185][T27121] ? btrfs_control_open+0x40/0x40 [ 497.919195][T27121] vfs_get_tree+0x8b/0x2a0 [ 497.919208][T27121] vfs_kern_mount+0xc2/0x160 [ 497.919218][T27121] btrfs_mount+0x34f/0x18e0 [ 497.919234][T27121] ? check_preemption_disabled+0x47/0x2a0 [ 497.919248][T27121] ? vfs_parse_fs_string+0x13b/0x1a0 [ 497.919260][T27121] ? cap_capable+0x250/0x290 [ 497.929633][T27121] ? safesetid_security_capable+0x89/0xf0 [ 497.938882][T27121] legacy_get_tree+0xf9/0x1a0 [ 497.938894][T27121] ? btrfs_resize_thread_pool+0x290/0x290 [ 497.938908][T27121] vfs_get_tree+0x8b/0x2a0 [ 497.938921][T27121] do_mount+0x16c0/0x2510 [ 497.938935][T27121] ? copy_mount_options+0x308/0x3c0 [ 497.938946][T27121] ksys_mount+0xcc/0x100 [ 497.938958][T27121] __x64_sys_mount+0xbf/0xd0 [ 497.938972][T27121] do_syscall_64+0xf7/0x1c0 [ 497.938983][T27121] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 497.938992][T27121] RIP: 0033:0x45cc6a [ 497.939002][T27121] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 497.939007][T27121] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 497.939016][T27121] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 497.939021][T27121] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 497.939029][T27121] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 497.949727][T27121] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 497.949734][T27121] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 02:45:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs<', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:45:15 executing program 1 (fault-call:0 fault-nth:82): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) 02:45:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 02:45:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs ', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 02:45:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023002908000000000000000004000000080011008066db00"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2805, 0x0, 0xc}, [@nested={0x8, 0x11, [@generic="80"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:45:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 498.806446][T27157] FAULT_INJECTION: forcing a failure. [ 498.806446][T27157] name failslab, interval 1, probability 0, space 0, times 0 02:45:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7e00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) [ 498.884018][T27157] CPU: 1 PID: 27157 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 498.891954][T27157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.902011][T27157] Call Trace: [ 498.905303][T27157] dump_stack+0x1fb/0x318 [ 498.909626][T27157] should_fail+0x555/0x770 [ 498.909646][T27157] __should_failslab+0x11a/0x160 [ 498.909662][T27157] ? bio_alloc_bioset+0x126/0x5e0 [ 498.909672][T27157] should_failslab+0x9/0x20 [ 498.909682][T27157] __kmalloc+0x7a/0x340 [ 498.909696][T27157] bio_alloc_bioset+0x126/0x5e0 [ 498.909704][T27157] ? trace_kmalloc+0xcd/0x130 [ 498.909720][T27157] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 498.924329][T27157] btrfs_alloc_device+0xa7/0x580 [ 498.924346][T27157] ? blkdev_put+0x2c8/0x3b0 [ 498.924360][T27157] close_fs_devices+0x4ae/0x8d0 [ 498.953085][T27157] btrfs_close_devices+0x33/0x130 [ 498.953098][T27157] btrfs_mount_root+0xa9d/0x1040 [ 498.953118][T27157] ? trace_kfree+0xb2/0x110 [ 498.953133][T27157] legacy_get_tree+0xf9/0x1a0 [ 498.953142][T27157] ? btrfs_control_open+0x40/0x40 [ 498.953155][T27157] vfs_get_tree+0x8b/0x2a0 [ 498.953174][T27157] vfs_kern_mount+0xc2/0x160 [ 498.996130][T27157] btrfs_mount+0x34f/0x18e0 [ 499.000641][T27157] ? check_preemption_disabled+0x47/0x2a0 [ 499.006372][T27157] ? vfs_parse_fs_string+0x13b/0x1a0 [ 499.011658][T27157] ? cap_capable+0x250/0x290 [ 499.016254][T27157] ? safesetid_security_capable+0x89/0xf0 [ 499.021983][T27157] legacy_get_tree+0xf9/0x1a0 [ 499.026656][T27157] ? btrfs_resize_thread_pool+0x290/0x290 [ 499.032377][T27157] vfs_get_tree+0x8b/0x2a0 [ 499.036865][T27157] do_mount+0x16c0/0x2510 [ 499.041206][T27157] ? copy_mount_options+0x308/0x3c0 [ 499.046507][T27157] ksys_mount+0xcc/0x100 [ 499.050737][T27157] __x64_sys_mount+0xbf/0xd0 [ 499.055314][T27157] do_syscall_64+0xf7/0x1c0 [ 499.059811][T27157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 499.065753][T27157] RIP: 0033:0x45cc6a [ 499.069788][T27157] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 499.089646][T27157] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 499.098826][T27157] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 499.107134][T27157] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 499.115101][T27157] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 499.123062][T27157] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 499.131038][T27157] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 499.143877][T27157] ------------[ cut here ]------------ [ 499.149453][T27157] kernel BUG at fs/btrfs/volumes.c:1266! [ 499.155179][T27157] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 499.161248][T27157] CPU: 1 PID: 27157 Comm: syz-executor.1 Not tainted 5.4.0-rc7 #0 [ 499.169062][T27157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.179126][T27157] RIP: 0010:close_fs_devices+0x8c1/0x8d0 02:45:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 499.184747][T27157] Code: 73 f9 fe 48 8b 5d c0 e9 73 ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 7c 87 48 89 df e8 09 73 f9 fe e9 7a ff ff ff e8 7f 34 c0 fe <0f> 0b e8 78 34 c0 fe 0f 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 [ 499.204619][T27157] RSP: 0018:ffff88803ff379a0 EFLAGS: 00010246 [ 499.213544][T27157] RAX: ffffffff82b32261 RBX: ffff88809fe090e8 RCX: 0000000000040000 [ 499.221506][T27157] RDX: ffffc9000f410000 RSI: 000000000003ffff RDI: 0000000000040000 [ 499.229472][T27157] RBP: ffff88803ff37a30 R08: ffff888052f54918 R09: fffffbfff12bc0cb [ 499.237435][T27157] R10: fffffbfff12bc0cb R11: 0000000000000000 R12: dffffc0000000000 [ 499.244025][T27186] kobject: 'loop5' (0000000090d11a21): kobject_uevent_env [ 499.245384][T27157] R13: ffff88809fe090f0 R14: ffff88809fe09000 R15: ffff888054f54000 [ 499.245393][T27157] FS: 00007f9f02bda700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 499.245399][T27157] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 499.245405][T27157] CR2: 0000000000625208 CR3: 000000009c3d1000 CR4: 00000000001406e0 [ 499.245414][T27157] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 499.245419][T27157] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 499.245423][T27157] Call Trace: [ 499.245448][T27157] btrfs_close_devices+0x33/0x130 [ 499.252732][T27186] kobject: 'loop5' (0000000090d11a21): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 499.260517][T27157] btrfs_mount_root+0xa9d/0x1040 [ 499.260532][T27157] ? trace_kfree+0xb2/0x110 [ 499.260544][T27157] legacy_get_tree+0xf9/0x1a0 [ 499.260552][T27157] ? btrfs_control_open+0x40/0x40 [ 499.260562][T27157] vfs_get_tree+0x8b/0x2a0 [ 499.260573][T27157] vfs_kern_mount+0xc2/0x160 [ 499.260586][T27157] btrfs_mount+0x34f/0x18e0 [ 499.360944][T27157] ? check_preemption_disabled+0x47/0x2a0 [ 499.366641][T27157] ? vfs_parse_fs_string+0x13b/0x1a0 [ 499.371908][T27157] ? cap_capable+0x250/0x290 [ 499.376481][T27157] ? safesetid_security_capable+0x89/0xf0 [ 499.382360][T27157] legacy_get_tree+0xf9/0x1a0 [ 499.387018][T27157] ? btrfs_resize_thread_pool+0x290/0x290 [ 499.392724][T27157] vfs_get_tree+0x8b/0x2a0 [ 499.397467][T27157] do_mount+0x16c0/0x2510 [ 499.401776][T27157] ? copy_mount_options+0x308/0x3c0 [ 499.406952][T27157] ksys_mount+0xcc/0x100 [ 499.411615][T27157] __x64_sys_mount+0xbf/0xd0 [ 499.416878][T27157] do_syscall_64+0xf7/0x1c0 [ 499.422238][T27157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 499.428122][T27157] RIP: 0033:0x45cc6a [ 499.432002][T27157] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 499.451600][T27157] RSP: 002b:00007f9f02bd9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 499.459986][T27157] RAX: ffffffffffffffda RBX: 00007f9f02bd9b40 RCX: 000000000045cc6a [ 499.467933][T27157] RDX: 00007f9f02bd9ae0 RSI: 0000000020000080 RDI: 00007f9f02bd9b00 [ 499.475896][T27157] RBP: 0000000000000001 R08: 00007f9f02bd9b40 R09: 00007f9f02bd9ae0 [ 499.483851][T27157] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 499.491798][T27157] R13: 00000000004c9a22 R14: 00000000004e1710 R15: 0000000000000003 [ 499.499748][T27157] Modules linked in: [ 499.506801][ T3901] kobject: 'loop1' (00000000405e85ee): kobject_uevent_env [ 499.519523][T27190] kobject: 'loop4' (00000000617f39fb): kobject_uevent_env [ 499.522834][T27157] ---[ end trace 10803d4de2ec806f ]--- [ 499.528006][T27190] kobject: 'loop4' (00000000617f39fb): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 499.537848][T27157] RIP: 0010:close_fs_devices+0x8c1/0x8d0 [ 499.544823][ T3901] kobject: 'loop1' (00000000405e85ee): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 499.548446][T27157] Code: 73 f9 fe 48 8b 5d c0 e9 73 ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 7c 87 48 89 df e8 09 73 f9 fe e9 7a ff ff ff e8 7f 34 c0 fe <0f> 0b e8 78 34 c0 fe 0f 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 [ 499.584529][T27157] RSP: 0018:ffff88803ff379a0 EFLAGS: 00010246 [ 499.589762][T27179] kobject: 'batman_adv' (00000000dff7f094): kobject_uevent_env [ 499.590971][T27157] RAX: ffffffff82b32261 RBX: ffff88809fe090e8 RCX: 0000000000040000 [ 499.602665][T27179] kobject: 'batman_adv' (00000000dff7f094): kobject_uevent_env: filter function caused the event to drop! [ 499.608504][T27157] RDX: ffffc9000f410000 RSI: 000000000003ffff RDI: 0000000000040000 [ 499.608515][T27157] RBP: ffff88803ff37a30 R08: ffff888052f54918 R09: fffffbfff12bc0cb [ 499.623462][T27179] kobject: 'batman_adv' (00000000dff7f094): kobject_cleanup, parent 0000000054eaea5f [ 499.648459][T27179] kobject: 'batman_adv' (00000000dff7f094): calling ktype release [ 499.652764][T27157] R10: fffffbfff12bc0cb R11: 0000000000000000 R12: dffffc0000000000 [ 499.664069][T27179] kobject: (00000000dff7f094): dynamic_kobj_release [ 499.664636][T27157] R13: ffff88809fe090f0 R14: ffff88809fe09000 R15: ffff888054f54000 [ 499.673479][T27179] kobject: 'batman_adv': free name [ 499.680739][T27157] FS: 00007f9f02bda700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 499.688219][T27179] kobject: 'rx-0' (00000000c987dbe4): kobject_cleanup, parent 00000000aab01a4c [ 499.693534][T27157] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 499.704524][T27179] kobject: 'rx-0' (00000000c987dbe4): auto cleanup 'remove' event [ 499.709137][T27157] CR2: 00007f6c04801518 CR3: 000000009c3d1000 CR4: 00000000001406e0 [ 499.717015][T27179] kobject: 'rx-0' (00000000c987dbe4): kobject_uevent_env [ 499.725557][T27157] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 499.735127][T27179] kobject: 'rx-0' (00000000c987dbe4): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim736/net/wlan118/queues/rx-0' [ 499.741224][T27157] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 499.756293][T27179] kobject: 'rx-0' (00000000c987dbe4): auto cleanup kobject_del [ 499.763798][T27189] kobject: 'loop2' (000000000f544a3d): kobject_uevent_env [ 499.773980][T27179] kobject: 'rx-0' (00000000c987dbe4): calling ktype release [ 499.778435][T27189] kobject: 'loop2' (000000000f544a3d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 499.786030][T27179] kobject: 'rx-0': free name [ 499.800572][T27157] Kernel panic - not syncing: Fatal exception [ 499.808001][T27157] Kernel Offset: disabled [ 499.812333][T27157] Rebooting in 86400 seconds..